From ba1589007601a9a5d36049b4ce1704edd9b50af0 Mon Sep 17 00:00:00 2001 From: huiquanjiang Date: Thu, 4 Jul 2024 11:33:17 +0800 Subject: [PATCH] test cases --- src/acat/azext_acat/tests/__init__.py | 6 + src/acat/azext_acat/tests/latest/__init__.py | 6 + .../latest/recordings/test_create_report.yaml | 647 + .../recordings/test_create_webhook.yaml | 258 + .../latest/recordings/test_delete_report.yaml | 650 + .../recordings/test_delete_webhook.yaml | 199 + .../recordings/test_download_report.yaml | 11489 ++++++++++++++++ .../test_get_control_assessments.yaml | 1776 +++ ...t_get_control_assessments_no_snapshot.yaml | 647 + .../latest/recordings/test_list_report.yaml | 69 + .../recordings/test_quick_evaluation.yaml | 1035 ++ .../latest/recordings/test_update_report.yaml | 823 ++ .../recordings/test_update_webhook.yaml | 204 + src/acat/azext_acat/tests/latest/test_acat.py | 13 + .../tests/latest/test_acat_report.py | 119 + .../latest/test_acat_trigger_evaluation.py | 31 + .../tests/latest/test_acat_webhook.py | 76 + 17 files changed, 18048 insertions(+) create mode 100644 src/acat/azext_acat/tests/__init__.py create mode 100644 src/acat/azext_acat/tests/latest/__init__.py create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_create_report.yaml create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_create_webhook.yaml create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_delete_report.yaml create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_delete_webhook.yaml create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_download_report.yaml create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_get_control_assessments.yaml create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_get_control_assessments_no_snapshot.yaml create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_list_report.yaml create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_quick_evaluation.yaml create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_update_report.yaml create mode 100644 src/acat/azext_acat/tests/latest/recordings/test_update_webhook.yaml create mode 100644 src/acat/azext_acat/tests/latest/test_acat.py create mode 100644 src/acat/azext_acat/tests/latest/test_acat_report.py create mode 100644 src/acat/azext_acat/tests/latest/test_acat_trigger_evaluation.py create mode 100644 src/acat/azext_acat/tests/latest/test_acat_webhook.py diff --git a/src/acat/azext_acat/tests/__init__.py b/src/acat/azext_acat/tests/__init__.py new file mode 100644 index 00000000000..0992939b5ef --- /dev/null +++ b/src/acat/azext_acat/tests/__init__.py @@ -0,0 +1,6 @@ +# -------------------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# +# Code generated by aaz-dev-tools +# -------------------------------------------------------------------------------------------- diff --git a/src/acat/azext_acat/tests/latest/__init__.py b/src/acat/azext_acat/tests/latest/__init__.py new file mode 100644 index 00000000000..0992939b5ef --- /dev/null +++ b/src/acat/azext_acat/tests/latest/__init__.py @@ -0,0 +1,6 @@ +# -------------------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# +# Code generated by aaz-dev-tools +# -------------------------------------------------------------------------------------------- diff --git a/src/acat/azext_acat/tests/latest/recordings/test_create_report.yaml b/src/acat/azext_acat/tests/latest/recordings/test_create_report.yaml new file mode 100644 index 00000000000..a12ff382e40 --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_create_report.yaml @@ -0,0 +1,647 @@ +interactions: +- request: + body: '{"subscriptionIds": ["f744fbde-a95f-437e-8fcf-38f9324e3d9c"]}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Content-Length: + - '61' + Content-Type: + - application/json + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: POST + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/onboard?api-version=2024-06-27 + response: + body: + string: '{"subscriptionIds":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"]}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/8accf1e6-f80a-4811-8ffb-327a0a64cdcb*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374352045243&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=jVrD31CCgvf2U2JyT-x8G00h_EDPic5W38t-vpPLY7sg2FE-uBGDCspOvcvqbU-FYoVgsIcnfHgXfR3X_sDkd3mVf6GurHMcI3rEox4xNfEwgQ6feFEfJQqmhKTEsYtOTV46CjY4VBPcSJg2BrBVqPuA-PI55oSFppwC6HqckCe9XRpoF8Zo1jh0utUrQKlDUGoq2tYcPlAThvNcghV14EuhO_qo2fO25XjVGb8ebLdTbJ4HWprre4vEuKmeOcyj0Kcxle8D-mx7f1PPgfk3EW5oWar7yGQyMW_RgTPc1lV2CBcu5V8emBEjTeNxH73I_WEnbKnhr54XacLR9pjoPQ&h=oPQa3-XLYZApFVJB3SpwIlziwBXcy7SC-5P3_-61sSU + cache-control: + - no-store, no-cache + content-length: + - '60' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:50:34 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/8accf1e6-f80a-4811-8ffb-327a0a64cdcb*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374352045243&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9DTzFQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA1LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MB0GA1UdDgQWBBShTe46dn7V-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=jVrD31CCgvf2U2JyT-x8G00h_EDPic5W38t-vpPLY7sg2FE-uBGDCspOvcvqbU-FYoVgsIcnfHgXfR3X_sDkd3mVf6GurHMcI3rEox4xNfEwgQ6feFEfJQqmhKTEsYtOTV46CjY4VBPcSJg2BrBVqPuA-PI55oSFppwC6HqckCe9XRpoF8Zo1jh0utUrQKlDUGoq2tYcPlAThvNcghV14EuhO_qo2fO25XjVGb8ebLdTbJ4HWprre4vEuKmeOcyj0Kcxle8D-mx7f1PPgfk3EW5oWar7yGQyMW_RgTPc1lV2CBcu5V8emBEjTeNxH73I_WEnbKnhr54XacLR9pjoPQ&h=oPQa3-XLYZApFVJB3SpwIlziwBXcy7SC-5P3_-61sSU + mise-correlation-id: + - 011a1621-863b-4160-baa1-e02ee0f906cf + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045034Z-168779fcbd64l8jhvysuytxztw00000000d000000000mq20 + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - fd38c99bbe4f98f7b404e25d4ed0c30d + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1198' + x-msedge-ref: + - 'Ref A: 6F7FDE2255B543CBB82673B938EB5D74 Ref B: TYO201100115011 Ref C: 2024-06-14T04:50:34Z' + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/8accf1e6-f80a-4811-8ffb-327a0a64cdcb*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374352045243&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9DTzFQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA1LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MB0GA1UdDgQWBBShTe46dn7V-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=jVrD31CCgvf2U2JyT-x8G00h_EDPic5W38t-vpPLY7sg2FE-uBGDCspOvcvqbU-FYoVgsIcnfHgXfR3X_sDkd3mVf6GurHMcI3rEox4xNfEwgQ6feFEfJQqmhKTEsYtOTV46CjY4VBPcSJg2BrBVqPuA-PI55oSFppwC6HqckCe9XRpoF8Zo1jh0utUrQKlDUGoq2tYcPlAThvNcghV14EuhO_qo2fO25XjVGb8ebLdTbJ4HWprre4vEuKmeOcyj0Kcxle8D-mx7f1PPgfk3EW5oWar7yGQyMW_RgTPc1lV2CBcu5V8emBEjTeNxH73I_WEnbKnhr54XacLR9pjoPQ&h=oPQa3-XLYZApFVJB3SpwIlziwBXcy7SC-5P3_-61sSU + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/8accf1e6-f80a-4811-8ffb-327a0a64cdcb*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"8accf1e6-f80a-4811-8ffb-327a0a64cdcb*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Accepted","startTime":"2024-06-14T04:50:34.242184Z"}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/8accf1e6-f80a-4811-8ffb-327a0a64cdcb*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374356260841&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=K2380n2yQJJVmCerdcfTLdlEIj9o_2TRqS2NNpeqCsUkmWH7CACfc7XOoTof6dTbYXy0lRjAM8kradfyfiLrrSeikV6LzOy0nsgISE0aNh-3WOHyqJ76XU42mbJvb_GoYNz--Ugi0xfo1U--ywOXdHYwBNYSBwHjM4RtUl0dTTKfgMCeG9mh7fttSqMK5FET75oU3mYXILIw0dGtGzIpywc8VIzqELST_kKQgb4nO3LiaUxemLHHIwYdCMWPk_80nZGRM30TksAb-BuHJF-phabky2nTIqSTBT-xiyNGjKHV1Bg8XIc5ZPizCCW_u-_udBxkAp3Km3gC8zf10ohcZg&h=keHoH2_RVGpWdEnOPfR7xe6SK7zTFkCVqdYTZZkx-hA + cache-control: + - no-cache + content-length: + - '391' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:50:34 GMT + etag: + - '"0b011701-0000-4d00-0000-666bcc1a0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/8accf1e6-f80a-4811-8ffb-327a0a64cdcb*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374356416473&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=EOZNnHOGt_cSpPFvgQjffnXRNl1zojW58q5UwGF9IHGXCoU8WNYErCJSie-kRIf-B2pmZvwU00bWHuOS_eXsdB-fs_vo_vVeSSr9r_G3BuiV3m9hHXberPl8dPRpiiG0ovj0GRj_jpKtTlxJYvzrZcC5qkfR01fsnHxXkILXR9T75XoTbV-IhcJ-pWns8-mlJtgT4E7DrjCTlQTEbz9jB5P0hpW8J_wCoCE0pwExzcIIauZbeq-fp-v3_N4OfpWf_CFunZtaX6p8otuu0rBwZ3xkzv9ptQG-EUs6yYMtho-Em_eAD0erU-TNl_hOZkYpc-Un2oftk9kVOMOIKxBbSw&h=P5Fe0e3_GlvstJ_tmZ1kQkfWd5xGP_1iz8ptXNhvRwE + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 119C5293F93F4CEAA011174B46796CB2 Ref B: TYO201100115011 Ref C: 2024-06-14T04:50:35Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/8accf1e6-f80a-4811-8ffb-327a0a64cdcb*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374352045243&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=jVrD31CCgvf2U2JyT-x8G00h_EDPic5W38t-vpPLY7sg2FE-uBGDCspOvcvqbU-FYoVgsIcnfHgXfR3X_sDkd3mVf6GurHMcI3rEox4xNfEwgQ6feFEfJQqmhKTEsYtOTV46CjY4VBPcSJg2BrBVqPuA-PI55oSFppwC6HqckCe9XRpoF8Zo1jh0utUrQKlDUGoq2tYcPlAThvNcghV14EuhO_qo2fO25XjVGb8ebLdTbJ4HWprre4vEuKmeOcyj0Kcxle8D-mx7f1PPgfk3EW5oWar7yGQyMW_RgTPc1lV2CBcu5V8emBEjTeNxH73I_WEnbKnhr54XacLR9pjoPQ&h=oPQa3-XLYZApFVJB3SpwIlziwBXcy7SC-5P3_-61sSU + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/8accf1e6-f80a-4811-8ffb-327a0a64cdcb*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"8accf1e6-f80a-4811-8ffb-327a0a64cdcb*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Succeeded","startTime":"2024-06-14T04:50:34.242184Z","endTime":"2024-06-14T04:50:35.9225361Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '462' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:05 GMT + etag: + - '"0b013001-0000-4d00-0000-666bcc1b0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 4EF0FF561B364727AFE9FA659185454D Ref B: TYO201100115011 Ref C: 2024-06-14T04:51:05Z' + status: + code: 200 + message: OK +- request: + body: '{"properties": {"resources": [{"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08"}], + "timeZone": "UTC", "triggerTime": "2021-09-01T00:00:00.000Z"}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Content-Length: + - '273' + Content-Type: + - application/json + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: PUT + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create","name":"CLI_test_report_create","type":"microsoft.appcomplianceautomation/reports","systemData":{"createdBy":"huiquanjiang@microsoft.com","createdByType":"User","createdAt":"2024-06-14T04:51:06.5650517Z","lastModifiedBy":"huiquanjiang@microsoft.com","lastModifiedByType":"User","lastModifiedAt":"2024-06-14T04:51:06.5650517Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-15T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Accepted"}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/83176075-58d9-4f86-a976-1d7929f156f9*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C?api-version=2024-06-27&t=638539374674399810&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=Tj1f_urBzaDvMD1aZHuSEE4Hy6o03FRU_XFyN4KUkrbHByjZ-NWxxIUcSFdeenLPFrRbCvr21bJVpPR1vAijVLSBOcJ1lfmNoTpwrpuy39qa-BnReOJ1aDN34zVTsH4AZ_suYo6a8VRP5Lx7fiwCBXelPFrGJMzXtszQoAiqimzVSqtJ7iWROINrAEev9M-4yyFjvDq37LwokPjwtyZWc6yEWsyhGJ2ZstJDwvbXYGZhs5B-_iXWBkezXslnMP47Ycm2Dfl-gXtJorBjlbnRg-hFgKRCOXtkvrRr3gR8uMfD01_GwAsiOtNfcpSFSLsEyUsgmNiswpWTZxlVmcnwug&h=QO15ehWKVeBCNW_kGzoylMD4YSGZZaHvLJnluxvuEp0 + cache-control: + - no-store, no-cache + content-length: + - '1082' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:06 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/83176075-58d9-4f86-a976-1d7929f156f9*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C?api-version=2024-06-27&t=638539374674555594&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=eTS5vJl5OOC0B6SGpMKF7OVfrfhDUuqQm0PaWIOi3E3sUg9VyzSu4Tedv26Y9IDYtydwWTFxSq7DaHaNjbDnT97Vxnemi_w8jXsJLkEvsMebPDfGhWiQN-CLX7UY00-AC0YpsDn9voG8-p4bJGtm2QEwAAcCw8KaWELDYD9BOBsBN0Ur_FMTfX-Ctd1DIpsdBYfYwPyka0wH8UXc-y9a6u7yU8EwOJ2HuwrR1xTUvpTudW-qZfd60WnpvhdxQP1JNpok-bfWK6hLrMU8RYnUp26uYcpkTG21-5-yHi6qCdYFf-3-r8O5fW9nenbpcDzHR-AHKMA9y7CCDrSE0xEbKA&h=xNJeys9wm1gzOpPANsOFM-LU_72XDlsmhCBz1Tnr7f8 + mise-correlation-id: + - df3f16cb-9961-4220-a944-1682ae5fb576 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045106Z-r15f4699bb7z4vrvkkyy6vu91g0000000nc000000000wcg9 + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - c86b0ce006d56c0c0c91eeb499cf6ae1 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: 1CEE016E8D1A489B86F89A2A2A690220 Ref B: TYO201151006054 Ref C: 2024-06-14T04:51:06Z' + x-powered-by: + - ASP.NET + status: + code: 201 + message: Created +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/83176075-58d9-4f86-a976-1d7929f156f9*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C?api-version=2024-06-27&t=638539374674399810&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=Tj1f_urBzaDvMD1aZHuSEE4Hy6o03FRU_XFyN4KUkrbHByjZ-NWxxIUcSFdeenLPFrRbCvr21bJVpPR1vAijVLSBOcJ1lfmNoTpwrpuy39qa-BnReOJ1aDN34zVTsH4AZ_suYo6a8VRP5Lx7fiwCBXelPFrGJMzXtszQoAiqimzVSqtJ7iWROINrAEev9M-4yyFjvDq37LwokPjwtyZWc6yEWsyhGJ2ZstJDwvbXYGZhs5B-_iXWBkezXslnMP47Ycm2Dfl-gXtJorBjlbnRg-hFgKRCOXtkvrRr3gR8uMfD01_GwAsiOtNfcpSFSLsEyUsgmNiswpWTZxlVmcnwug&h=QO15ehWKVeBCNW_kGzoylMD4YSGZZaHvLJnluxvuEp0 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/83176075-58d9-4f86-a976-1d7929f156f9*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C","name":"83176075-58d9-4f86-a976-1d7929f156f9*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create","status":"Accepted","startTime":"2024-06-14T04:51:06.6357696Z"}' + headers: + cache-control: + - no-cache + content-length: + - '456' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:07 GMT + etag: + - '"0b01cc02-0000-4d00-0000-666bcc3a0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 9B00337A5D44452492F2F3BD7C1B8847 Ref B: TYO201151006054 Ref C: 2024-06-14T04:51:07Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/83176075-58d9-4f86-a976-1d7929f156f9*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C?api-version=2024-06-27&t=638539374674399810&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=Tj1f_urBzaDvMD1aZHuSEE4Hy6o03FRU_XFyN4KUkrbHByjZ-NWxxIUcSFdeenLPFrRbCvr21bJVpPR1vAijVLSBOcJ1lfmNoTpwrpuy39qa-BnReOJ1aDN34zVTsH4AZ_suYo6a8VRP5Lx7fiwCBXelPFrGJMzXtszQoAiqimzVSqtJ7iWROINrAEev9M-4yyFjvDq37LwokPjwtyZWc6yEWsyhGJ2ZstJDwvbXYGZhs5B-_iXWBkezXslnMP47Ycm2Dfl-gXtJorBjlbnRg-hFgKRCOXtkvrRr3gR8uMfD01_GwAsiOtNfcpSFSLsEyUsgmNiswpWTZxlVmcnwug&h=QO15ehWKVeBCNW_kGzoylMD4YSGZZaHvLJnluxvuEp0 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/83176075-58d9-4f86-a976-1d7929f156f9*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C","name":"83176075-58d9-4f86-a976-1d7929f156f9*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create","status":"Succeeded","startTime":"2024-06-14T04:51:06.6357696Z","endTime":"2024-06-14T04:51:08.0279557Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '527' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:37 GMT + etag: + - '"0b01dc02-0000-4d00-0000-666bcc3c0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: DD85C686072E4BDFA2ADDDA103481843 Ref B: TYO201151006054 Ref C: 2024-06-14T04:51:37Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create","name":"CLI_test_report_create","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-14T04:51:06.5650517Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-14T04:51:06.5650517Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-15T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1031' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:37 GMT + mise-correlation-id: + - f2e9cf27-121e-4aed-9297-d2204d7a8b31 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045138Z-r15f4699bb7z4vrvkkyy6vu91g0000000nc000000000wg6c + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 31772c180ecc6df40a29098f14eb6d81 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 7F3A597AD44D4D30A7E760970851EA0E Ref B: TYO201151006054 Ref C: 2024-06-14T04:51:38Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report show + Connection: + - keep-alive + ParameterSetName: + - --report-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create","name":"CLI_test_report_create","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-14T04:51:06.5650517Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-14T04:51:06.5650517Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-15T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1031' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:38 GMT + mise-correlation-id: + - 446989fe-b2f2-4994-9286-b940de2fb5fa + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045139Z-r15f4699bb7z4vrvkkyy6vu91g0000000nc000000000wgad + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 0ab9aab9e12e0e8048a7c3011530c09c + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: D5A913C19FF041D39EAABDFB131E75ED Ref B: TYO201151001031 Ref C: 2024-06-14T04:51:38Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Content-Length: + - '0' + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: DELETE + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create?api-version=2024-06-27 + response: + body: + string: 'null' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bd46d341-6587-4539-ab9f-42631519c7c3*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C?api-version=2024-06-27&t=638539375003250356&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=QxdIp2kh1firdfEaExjQAxwjDldfyRm179qVaSn0pUW3Riiaf-qVbTqV-AXtyb0xr_KmbtU-N39hjcZkuuoaQ_ZqJm5tnji68iCdtnJxE-_pEDOP6Tk8FSUXnXT4tcrmbztTUOM3R_8H_IiiR4m9CIQY43-cyN4QEaC6VYgcIlDLLfI-8DIRgiH-I5MOk4DU0g2DlIyPkSzRZfX44I1Rwdvb8wVG1dkxlveWhPU5HoutLADR1jRmUDnXY-FTchJIdKZSES0gzJF7pBq2V0UXCiwtKY0FHuvKEWyzqNAkxzTvix-wXmTsMhl9aQa00L5MK23BVgWem4GQU7XuS1Wimg&h=eJSPFJprY8FMfldZKpyAjPCJq5kyGujZLv1A-3dz9W0 + cache-control: + - no-store, no-cache + content-length: + - '4' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:39 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bd46d341-6587-4539-ab9f-42631519c7c3*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C?api-version=2024-06-27&t=638539375003250356&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=QxdIp2kh1firdfEaExjQAxwjDldfyRm179qVaSn0pUW3Riiaf-qVbTqV-AXtyb0xr_KmbtU-N39hjcZkuuoaQ_ZqJm5tnji68iCdtnJxE-_pEDOP6Tk8FSUXnXT4tcrmbztTUOM3R_8H_IiiR4m9CIQY43-cyN4QEaC6VYgcIlDLLfI-8DIRgiH-I5MOk4DU0g2DlIyPkSzRZfX44I1Rwdvb8wVG1dkxlveWhPU5HoutLADR1jRmUDnXY-FTchJIdKZSES0gzJF7pBq2V0UXCiwtKY0FHuvKEWyzqNAkxzTvix-wXmTsMhl9aQa00L5MK23BVgWem4GQU7XuS1Wimg&h=eJSPFJprY8FMfldZKpyAjPCJq5kyGujZLv1A-3dz9W0 + mise-correlation-id: + - d7915ee0-ce9d-4d93-8e3d-9c7e6fbd739f + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + x-azure-ref: + - 20240614T045139Z-168779fcbd62qqz6d9ebhg58xc0000000ngg00000000x8xg + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 76333820b2a90593320111b0cf4f3c01 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-deletes: + - '14999' + x-msedge-ref: + - 'Ref A: BE8DF736542D4131AC44BB0799E043BC Ref B: TYO201100117049 Ref C: 2024-06-14T04:51:39Z' + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bd46d341-6587-4539-ab9f-42631519c7c3*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C?api-version=2024-06-27&t=638539375003250356&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=QxdIp2kh1firdfEaExjQAxwjDldfyRm179qVaSn0pUW3Riiaf-qVbTqV-AXtyb0xr_KmbtU-N39hjcZkuuoaQ_ZqJm5tnji68iCdtnJxE-_pEDOP6Tk8FSUXnXT4tcrmbztTUOM3R_8H_IiiR4m9CIQY43-cyN4QEaC6VYgcIlDLLfI-8DIRgiH-I5MOk4DU0g2DlIyPkSzRZfX44I1Rwdvb8wVG1dkxlveWhPU5HoutLADR1jRmUDnXY-FTchJIdKZSES0gzJF7pBq2V0UXCiwtKY0FHuvKEWyzqNAkxzTvix-wXmTsMhl9aQa00L5MK23BVgWem4GQU7XuS1Wimg&h=eJSPFJprY8FMfldZKpyAjPCJq5kyGujZLv1A-3dz9W0 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bd46d341-6587-4539-ab9f-42631519c7c3*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C","name":"bd46d341-6587-4539-ab9f-42631519c7c3*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create","status":"Deleting","startTime":"2024-06-14T04:51:39.8455537Z"}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/bd46d341-6587-4539-ab9f-42631519c7c3*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C?api-version=2024-06-27&t=638539375008464196&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9DTzFQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA1LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MB0GA1UdDgQWBBShTe46dn7V-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=axfY5pCTOiWQ3sd0-RpgsAbC61gkudn0Y5UfktHBrlRTYoE5D_9X7sLetpOaiWTHXhKJdGNQVmysGDVq4XBMk3s8oJMqVbLOrv7MmtaSIOUJUW6ijzkUHciVYDbBClJreRnGjmw-E7VqoIxA_yTLYe5pU-I2GEZ2DkVsM7cpEAHUqkzYBazlRLGQHtAVvQ-bFQHj31mtycXsFskOxcuwlD0woZrCkauHfIxVf1ovn9X305XyKRvmpDuJGAt_IQwXnxatWp_LLQVtBb6-BkJkO6k0HnaBu0DenM9x_qu4zkjNttgqcQOY3-QofSfOf0JWG2wLsN6MADKLC4hSk8nxlw&h=ayyHkO9PgRE5HMI83CvAUGUtjHhJeobOd9VexSQbSQg + cache-control: + - no-cache + content-length: + - '456' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:39 GMT + etag: + - '"0b01a304-0000-4d00-0000-666bcc5b0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/bd46d341-6587-4539-ab9f-42631519c7c3*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C?api-version=2024-06-27&t=638539375008620481&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=u57lXMV2urrUeyNCBH0G3CWFJWkcO9GOJtkCckrVJoLothBPWKlKt7MTft9PpPW-8P42FqRPA-POw884k1BeKFXkI253lqlT1JW5h2ffwMvcnURTNlIWD7Tz5efcBbUOAGLQEE1wJFc-hmY99lXBNBh8-kRaXxiKFf-8L5mwJu4JHzRtbnaxWD8OPKvl58eJzsQCdVzL5SW403xMtkm17AT6o6K3v_BMc8oV6TB-3O9Ikq8HboXjX_QNAcyMHUhdL_9xLHECuUbfX1mSmt8CYNlt-y86QGQfIJIH7ANuVKw0fXVsWaMlgTtuuZOL4U2yBoPgGUSPIwSC8iqe91UiGw&h=HJozBgDACgSnj26JIIWnbzSRRr5SY97kjW5Pv1pnaKA + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 9EC8EA0FA5EE45ACB51B920799341A07 Ref B: TYO201100117049 Ref C: 2024-06-14T04:51:40Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bd46d341-6587-4539-ab9f-42631519c7c3*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C?api-version=2024-06-27&t=638539375003250356&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9DTzFQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA1LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MB0GA1UdDgQWBBShTe46dn7V-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=QxdIp2kh1firdfEaExjQAxwjDldfyRm179qVaSn0pUW3Riiaf-qVbTqV-AXtyb0xr_KmbtU-N39hjcZkuuoaQ_ZqJm5tnji68iCdtnJxE-_pEDOP6Tk8FSUXnXT4tcrmbztTUOM3R_8H_IiiR4m9CIQY43-cyN4QEaC6VYgcIlDLLfI-8DIRgiH-I5MOk4DU0g2DlIyPkSzRZfX44I1Rwdvb8wVG1dkxlveWhPU5HoutLADR1jRmUDnXY-FTchJIdKZSES0gzJF7pBq2V0UXCiwtKY0FHuvKEWyzqNAkxzTvix-wXmTsMhl9aQa00L5MK23BVgWem4GQU7XuS1Wimg&h=eJSPFJprY8FMfldZKpyAjPCJq5kyGujZLv1A-3dz9W0 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bd46d341-6587-4539-ab9f-42631519c7c3*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C","name":"bd46d341-6587-4539-ab9f-42631519c7c3*A8D4389BEA4D42BB1D731A3F6AB340413F1D816325DF9C3FD81810FDBDE9C02C","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_create","status":"Succeeded","startTime":"2024-06-14T04:51:39.8455537Z","endTime":"2024-06-14T04:51:41.4162004Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '527' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:52:10 GMT + etag: + - '"0b01c504-0000-4d00-0000-666bcc5d0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 8876610F33614DFBADAA174F871425B4 Ref B: TYO201100117049 Ref C: 2024-06-14T04:52:10Z' + status: + code: 200 + message: OK +version: 1 diff --git a/src/acat/azext_acat/tests/latest/recordings/test_create_webhook.yaml b/src/acat/azext_acat/tests/latest/recordings/test_create_webhook.yaml new file mode 100644 index 00000000000..5de117611e8 --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_create_webhook.yaml @@ -0,0 +1,258 @@ +interactions: +- request: + body: '{"properties": {"contentType": "application/json", "events": [], "payloadUrl": + "https://CLI-test", "sendAllEvents": "all", "enableSslVerification": "true", + "status": "enalbe", "webhookKey": "", "updateWebhookKey": "false"}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report webhook create + Connection: + - keep-alive + Content-Length: + - '223' + Content-Type: + - application/json + ParameterSetName: + - --report-name --webhook-name --payload-url + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: PUT + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_create?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_create","name":"CLI_test_webhook_create","type":"microsoft.appcomplianceautomation/reports/webhooks","systemData":{"createdBy":"huiquanjiang@microsoft.com","createdByType":"User","createdAt":"2024-06-17T02:39:14.5310063Z","lastModifiedBy":"huiquanjiang@microsoft.com","lastModifiedByType":"User","lastModifiedAt":"2024-06-17T02:39:14.5310063Z"},"properties":{"webhookId":"b00cd538-58a5-4296-994e-71ad6fc41cb1","status":"enalbe","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","sendAllEvents":"all","events":[],"payloadUrl":"https://CLI-test","contentType":"application/json","webhookKeyEnabled":"false","enableSslVerification":"true","deliveryStatus":"NotStarted","provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '824' + content-type: + - application/json; charset=utf-8 + date: + - Mon, 17 Jun 2024 02:39:15 GMT + mise-correlation-id: + - b1a23b33-2fb5-4b66-bccd-35e1104c2d32 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240617T023914Z-r15f4699bb7jrsqq0yq5w8mxsn000000048g0000000177rf + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - c9da75bf4e7598a4c7aafe7d221adfbe + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: 70423CB2C9B94C459E4E046D8116FDCB Ref B: TYO201151004040 Ref C: 2024-06-17T02:39:14Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report webhook list + Connection: + - keep-alive + ParameterSetName: + - --report-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks?api-version=2024-06-27 + response: + body: + string: '{"value":[{"id":"/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_create","name":"CLI_test_webhook_create","type":"Microsoft.AppComplianceAutomation/reports/webhooks","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-17T02:39:14.5310063Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-17T02:39:14.5310063Z"},"properties":{"webhookId":"b00cd538-58a5-4296-994e-71ad6fc41cb1","status":"enalbe","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","sendAllEvents":"all","events":[],"payloadUrl":"https://CLI-test","contentType":"application/json","webhookKeyEnabled":"false","enableSslVerification":"true","deliveryStatus":"NotStarted","provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_update","name":"CLI_test_webhook_update","type":"Microsoft.AppComplianceAutomation/reports/webhooks","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-17T02:36:34.2955592Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-17T02:36:34.2955592Z"},"properties":{"webhookId":"b804cd59-4530-4500-9443-8080e23169f8","status":"enalbe","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","sendAllEvents":"all","events":[],"payloadUrl":"https://CLI-test","contentType":"application/json","webhookKeyEnabled":"false","enableSslVerification":"true","deliveryStatus":"NotStarted","provisioningState":"Succeeded"}}]}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1557' + content-type: + - application/json; charset=utf-8 + date: + - Mon, 17 Jun 2024 02:39:15 GMT + mise-correlation-id: + - e5dd4045-6dfc-4ed1-9d9f-01d49313ad24 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240617T023916Z-r15f4699bb78cdn6d3n3b1v90000000003ng00000000ry2g + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 910acd83f4a6ba029766c39b165d456a + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: E06D467AB4D54E328601C2E08FB7F9AE Ref B: TYO201151005036 Ref C: 2024-06-17T02:39:16Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report webhook show + Connection: + - keep-alive + ParameterSetName: + - --report-name --webhook-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_create?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_create","name":"CLI_test_webhook_create","type":"Microsoft.AppComplianceAutomation/reports/webhooks","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-17T02:39:14.5310063Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-17T02:39:14.5310063Z"},"properties":{"webhookId":"b00cd538-58a5-4296-994e-71ad6fc41cb1","status":"enalbe","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","sendAllEvents":"all","events":[],"payloadUrl":"https://CLI-test","contentType":"application/json","webhookKeyEnabled":"false","enableSslVerification":"true","deliveryStatus":"NotStarted","provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '772' + content-type: + - application/json; charset=utf-8 + date: + - Mon, 17 Jun 2024 02:39:17 GMT + mise-correlation-id: + - dee2cdc3-d5a6-40a7-b8be-6b3dba859779 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240617T023916Z-168779fcbd6hdg5qk309gcmb7n000000037000000001f69s + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 7617a3fe86685d674c79dea02d100b15 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: E8DC85721A5C4B3C9DBB1C2D3CFFF3BD Ref B: TYO201151004034 Ref C: 2024-06-17T02:39:16Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report webhook delete + Connection: + - keep-alive + Content-Length: + - '0' + ParameterSetName: + - --report-name --webhook-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: DELETE + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_create?api-version=2024-06-27 + response: + body: + string: 'null' + headers: + accept-ranges: + - bytes + cache-control: + - no-store, no-cache + content-length: + - '4' + content-type: + - application/json; charset=utf-8 + date: + - Mon, 17 Jun 2024 02:39:17 GMT + mise-correlation-id: + - c60962fa-f539-4023-bdd3-e41cd7e7e90e + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + x-azure-ref: + - 20240617T023918Z-r15f4699bb7hl5r88v9vd5yk1w00000004pg000000008z1f + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - bc639c062af0c6a15ae4b62e4c1c983e + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-deletes: + - '14999' + x-msedge-ref: + - 'Ref A: 40270096971A43FB8482FBABAB136650 Ref B: TYO201151001054 Ref C: 2024-06-17T02:39:18Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +version: 1 diff --git a/src/acat/azext_acat/tests/latest/recordings/test_delete_report.yaml b/src/acat/azext_acat/tests/latest/recordings/test_delete_report.yaml new file mode 100644 index 00000000000..a56f8e6957c --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_delete_report.yaml @@ -0,0 +1,650 @@ +interactions: +- request: + body: '{"subscriptionIds": ["f744fbde-a95f-437e-8fcf-38f9324e3d9c"]}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Content-Length: + - '61' + Content-Type: + - application/json + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: POST + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/onboard?api-version=2024-06-27 + response: + body: + string: '{"subscriptionIds":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"]}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bb4b09c8-00c9-4563-bf23-73975bb13a7e*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374352814082&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=ooUnzYnSAd2-UnGAKLIu3QoPF2TYl6DgbvK2Iz9YYAovy0HPdcBY6K9im66sLkeDLiwzCfqvUK4gcW3VvNVNHxXORM7MM2_TamVf5_HGJqJxrQmNPtN1l9CIFM9PuM8BppUuqijTI90FaKsfmHLY0fpkCajhlcZByo5c5ygsaR2ENth6zu2gwrwGmlqCFHBq1Pvch430oK6Wlhlr1QJoqveD9KYFo4Cv7q2N_5h4F4G2792ErgL7otaMd8kR2aUt2clxtkacc6bfyQ3u5GcYGZcoGHwn7-MIBdpX_IKd0X_dQrn-kZVGcIRO11ez9pG5BtY0yPCSyUw7iCamPsNhMg&h=xKJ6IXXl-2wWpawVJdINnTTNzwaE4o7eZxU6GmdnNv8 + cache-control: + - no-store, no-cache + content-length: + - '60' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:50:34 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bb4b09c8-00c9-4563-bf23-73975bb13a7e*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374352814082&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=ooUnzYnSAd2-UnGAKLIu3QoPF2TYl6DgbvK2Iz9YYAovy0HPdcBY6K9im66sLkeDLiwzCfqvUK4gcW3VvNVNHxXORM7MM2_TamVf5_HGJqJxrQmNPtN1l9CIFM9PuM8BppUuqijTI90FaKsfmHLY0fpkCajhlcZByo5c5ygsaR2ENth6zu2gwrwGmlqCFHBq1Pvch430oK6Wlhlr1QJoqveD9KYFo4Cv7q2N_5h4F4G2792ErgL7otaMd8kR2aUt2clxtkacc6bfyQ3u5GcYGZcoGHwn7-MIBdpX_IKd0X_dQrn-kZVGcIRO11ez9pG5BtY0yPCSyUw7iCamPsNhMg&h=xKJ6IXXl-2wWpawVJdINnTTNzwaE4o7eZxU6GmdnNv8 + mise-correlation-id: + - df5ed4bb-9026-42d0-b26d-d5015b55f709 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045034Z-r15f4699bb7ggls9yfg7eq2n0n0000000gpg000000013n5r + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 5213b1a1df70b2d63ea5fb56d11845f8 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1198' + x-msedge-ref: + - 'Ref A: ED59E2A9E7344A95947D6C4184312CC3 Ref B: TYO201100117035 Ref C: 2024-06-14T04:50:34Z' + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bb4b09c8-00c9-4563-bf23-73975bb13a7e*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374352814082&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=ooUnzYnSAd2-UnGAKLIu3QoPF2TYl6DgbvK2Iz9YYAovy0HPdcBY6K9im66sLkeDLiwzCfqvUK4gcW3VvNVNHxXORM7MM2_TamVf5_HGJqJxrQmNPtN1l9CIFM9PuM8BppUuqijTI90FaKsfmHLY0fpkCajhlcZByo5c5ygsaR2ENth6zu2gwrwGmlqCFHBq1Pvch430oK6Wlhlr1QJoqveD9KYFo4Cv7q2N_5h4F4G2792ErgL7otaMd8kR2aUt2clxtkacc6bfyQ3u5GcYGZcoGHwn7-MIBdpX_IKd0X_dQrn-kZVGcIRO11ez9pG5BtY0yPCSyUw7iCamPsNhMg&h=xKJ6IXXl-2wWpawVJdINnTTNzwaE4o7eZxU6GmdnNv8 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bb4b09c8-00c9-4563-bf23-73975bb13a7e*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"bb4b09c8-00c9-4563-bf23-73975bb13a7e*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Accepted","startTime":"2024-06-14T04:50:34.159984Z"}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/bb4b09c8-00c9-4563-bf23-73975bb13a7e*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374357657993&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=PKB5WiZzuAMoPeqmpE7vaC5GfdNzNJtLR2CIILnOFN_LeLr55pLTdYWMNLxrRva5vraPfnsyukwNUmfyMsy1cLd6bijnSgNdKL8y2BTllunpzehqahj_Xb13btZuv1GalEaGT7cdpw1zW3dPsXse2ZuMDGkIFNHSvOWSG0XDnf0y6wZt9zAFneHhFzR0_wBTMIfMUWDTzY93h3d2UWppA3rNRYiyZEclZ-RiFJobJZf1HqOJV3AR5xx3STwUF9VBVSPrEdQC589GpSfyCE2rIEzmLo8gisu2mzYi8YaVTXEztiKwO3PQ57nnoQH5-MpcOF7GqH-rTON8kWgSbbYgPw&h=e9ly_MfaPnkx8JlldR3CDCvOeiQoWH1Ubhxt0T7jnLE + cache-control: + - no-cache + content-length: + - '391' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:50:35 GMT + etag: + - '"0b011601-0000-4d00-0000-666bcc1a0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/bb4b09c8-00c9-4563-bf23-73975bb13a7e*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374357657993&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9DTzFQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA1LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MB0GA1UdDgQWBBShTe46dn7V-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=PKB5WiZzuAMoPeqmpE7vaC5GfdNzNJtLR2CIILnOFN_LeLr55pLTdYWMNLxrRva5vraPfnsyukwNUmfyMsy1cLd6bijnSgNdKL8y2BTllunpzehqahj_Xb13btZuv1GalEaGT7cdpw1zW3dPsXse2ZuMDGkIFNHSvOWSG0XDnf0y6wZt9zAFneHhFzR0_wBTMIfMUWDTzY93h3d2UWppA3rNRYiyZEclZ-RiFJobJZf1HqOJV3AR5xx3STwUF9VBVSPrEdQC589GpSfyCE2rIEzmLo8gisu2mzYi8YaVTXEztiKwO3PQ57nnoQH5-MpcOF7GqH-rTON8kWgSbbYgPw&h=e9ly_MfaPnkx8JlldR3CDCvOeiQoWH1Ubhxt0T7jnLE + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: EF35C8EDF7D842F090619D76A39C09E4 Ref B: TYO201100117035 Ref C: 2024-06-14T04:50:35Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bb4b09c8-00c9-4563-bf23-73975bb13a7e*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374352814082&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=ooUnzYnSAd2-UnGAKLIu3QoPF2TYl6DgbvK2Iz9YYAovy0HPdcBY6K9im66sLkeDLiwzCfqvUK4gcW3VvNVNHxXORM7MM2_TamVf5_HGJqJxrQmNPtN1l9CIFM9PuM8BppUuqijTI90FaKsfmHLY0fpkCajhlcZByo5c5ygsaR2ENth6zu2gwrwGmlqCFHBq1Pvch430oK6Wlhlr1QJoqveD9KYFo4Cv7q2N_5h4F4G2792ErgL7otaMd8kR2aUt2clxtkacc6bfyQ3u5GcYGZcoGHwn7-MIBdpX_IKd0X_dQrn-kZVGcIRO11ez9pG5BtY0yPCSyUw7iCamPsNhMg&h=xKJ6IXXl-2wWpawVJdINnTTNzwaE4o7eZxU6GmdnNv8 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/bb4b09c8-00c9-4563-bf23-73975bb13a7e*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"bb4b09c8-00c9-4563-bf23-73975bb13a7e*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Succeeded","startTime":"2024-06-14T04:50:34.159984Z","endTime":"2024-06-14T04:50:36.4055704Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '462' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:05 GMT + etag: + - '"0b013701-0000-4d00-0000-666bcc1c0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 03E3150AB8F5409A827B45836C4C0917 Ref B: TYO201100117035 Ref C: 2024-06-14T04:51:05Z' + status: + code: 200 + message: OK +- request: + body: '{"properties": {"resources": [{"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08"}], + "timeZone": "UTC", "triggerTime": "2021-09-01T00:00:00.000Z"}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Content-Length: + - '273' + Content-Type: + - application/json + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: PUT + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete","name":"CLI_test_report_delete","type":"microsoft.appcomplianceautomation/reports","systemData":{"createdBy":"huiquanjiang@microsoft.com","createdByType":"User","createdAt":"2024-06-14T04:51:07.0983792Z","lastModifiedBy":"huiquanjiang@microsoft.com","lastModifiedByType":"User","lastModifiedAt":"2024-06-14T04:51:07.0983792Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-15T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Accepted"}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/46c0ed6f-a747-4b14-bb8c-897ad8c54b87*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395?api-version=2024-06-27&t=638539374679265087&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=HEm3L2OXC6SQD-1HHjdX2SMCAQwaJZEkuYCMBYOXivhaW4fuBmDlyJP0lczrjGkZmS2A4KPyV-YbglO0ahMOLlXxTcGLr7LASnZg_jEuIgcCdPrSSPVEihK--FufXvvLqMKjkD-lPdPjerAMKo_rq4j3wnDOsCEjtCkG06reRM4ipgBK0trMjZyG6dNMOYkdPVu6ElChHtz1uEApdVcFRHzKiGERb19A97qdB4yhtLtzYO4d8nYD4wK8JjOwZeOiWZgipUfDzzSjIyHR4HD4vz-N3bDP9NtQUEXrDkbsdMlVNQbKvkqhrATdly3ZneNmVwtoSSQUynsvzL_KuSPHoQ&h=h0DR6NWyEY930CIWvE_qkDrt8h0lK2miP1dnew4_CN8 + cache-control: + - no-store, no-cache + content-length: + - '1082' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:07 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/46c0ed6f-a747-4b14-bb8c-897ad8c54b87*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395?api-version=2024-06-27&t=638539374679265087&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=HEm3L2OXC6SQD-1HHjdX2SMCAQwaJZEkuYCMBYOXivhaW4fuBmDlyJP0lczrjGkZmS2A4KPyV-YbglO0ahMOLlXxTcGLr7LASnZg_jEuIgcCdPrSSPVEihK--FufXvvLqMKjkD-lPdPjerAMKo_rq4j3wnDOsCEjtCkG06reRM4ipgBK0trMjZyG6dNMOYkdPVu6ElChHtz1uEApdVcFRHzKiGERb19A97qdB4yhtLtzYO4d8nYD4wK8JjOwZeOiWZgipUfDzzSjIyHR4HD4vz-N3bDP9NtQUEXrDkbsdMlVNQbKvkqhrATdly3ZneNmVwtoSSQUynsvzL_KuSPHoQ&h=h0DR6NWyEY930CIWvE_qkDrt8h0lK2miP1dnew4_CN8 + mise-correlation-id: + - f25941ce-9b46-4eab-b9b5-d20fd269bdfd + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045107Z-r15f4699bb7z4vrvkkyy6vu91g0000000nc000000000wckk + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 39ee899591715eb5e0137d7437d1ae7f + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: A72DE4D7FD0A443DB00330E93DD21490 Ref B: TYO201151002054 Ref C: 2024-06-14T04:51:07Z' + x-powered-by: + - ASP.NET + status: + code: 201 + message: Created +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/46c0ed6f-a747-4b14-bb8c-897ad8c54b87*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395?api-version=2024-06-27&t=638539374679265087&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=HEm3L2OXC6SQD-1HHjdX2SMCAQwaJZEkuYCMBYOXivhaW4fuBmDlyJP0lczrjGkZmS2A4KPyV-YbglO0ahMOLlXxTcGLr7LASnZg_jEuIgcCdPrSSPVEihK--FufXvvLqMKjkD-lPdPjerAMKo_rq4j3wnDOsCEjtCkG06reRM4ipgBK0trMjZyG6dNMOYkdPVu6ElChHtz1uEApdVcFRHzKiGERb19A97qdB4yhtLtzYO4d8nYD4wK8JjOwZeOiWZgipUfDzzSjIyHR4HD4vz-N3bDP9NtQUEXrDkbsdMlVNQbKvkqhrATdly3ZneNmVwtoSSQUynsvzL_KuSPHoQ&h=h0DR6NWyEY930CIWvE_qkDrt8h0lK2miP1dnew4_CN8 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/46c0ed6f-a747-4b14-bb8c-897ad8c54b87*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395","name":"46c0ed6f-a747-4b14-bb8c-897ad8c54b87*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete","status":"Accepted","startTime":"2024-06-14T04:51:07.2475158Z"}' + headers: + cache-control: + - no-cache + content-length: + - '456' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:07 GMT + etag: + - '"0b01cf02-0000-4d00-0000-666bcc3b0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: F619135351104416A9058DD34208698F Ref B: TYO201151002054 Ref C: 2024-06-14T04:51:07Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/46c0ed6f-a747-4b14-bb8c-897ad8c54b87*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395?api-version=2024-06-27&t=638539374679265087&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=HEm3L2OXC6SQD-1HHjdX2SMCAQwaJZEkuYCMBYOXivhaW4fuBmDlyJP0lczrjGkZmS2A4KPyV-YbglO0ahMOLlXxTcGLr7LASnZg_jEuIgcCdPrSSPVEihK--FufXvvLqMKjkD-lPdPjerAMKo_rq4j3wnDOsCEjtCkG06reRM4ipgBK0trMjZyG6dNMOYkdPVu6ElChHtz1uEApdVcFRHzKiGERb19A97qdB4yhtLtzYO4d8nYD4wK8JjOwZeOiWZgipUfDzzSjIyHR4HD4vz-N3bDP9NtQUEXrDkbsdMlVNQbKvkqhrATdly3ZneNmVwtoSSQUynsvzL_KuSPHoQ&h=h0DR6NWyEY930CIWvE_qkDrt8h0lK2miP1dnew4_CN8 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/46c0ed6f-a747-4b14-bb8c-897ad8c54b87*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395","name":"46c0ed6f-a747-4b14-bb8c-897ad8c54b87*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete","status":"Succeeded","startTime":"2024-06-14T04:51:07.2475158Z","endTime":"2024-06-14T04:51:08.5844919Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '527' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:37 GMT + etag: + - '"0b01ef02-0000-4d00-0000-666bcc3c0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: BDFD286F02AB4571A60DD68A484AA5AB Ref B: TYO201151002054 Ref C: 2024-06-14T04:51:38Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete","name":"CLI_test_report_delete","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-14T04:51:07.0983792Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-14T04:51:07.0983792Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-15T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1031' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:37 GMT + mise-correlation-id: + - 791598a4-94f9-4a38-ba99-da1e5ae87866 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045138Z-r15f4699bb7rfjmjupqcm1ntd800000001zg00000000vq5e + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 5666c7d11f3cbd7cfff236727d526d17 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 56F824F0BCA142449262C562FCDFCEC5 Ref B: TYO201151002054 Ref C: 2024-06-14T04:51:38Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Content-Length: + - '0' + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: DELETE + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete?api-version=2024-06-27 + response: + body: + string: 'null' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/0b05740c-a207-4cdc-993f-10e19ce7ea7b*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395?api-version=2024-06-27&t=638539374999923991&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=FQ-orfZyXS9-Hl4gkuaLwhMwHPKa5M_q7ka_t6UWOyvnwzPe4yBYckAFFjSBbOaa_Q-JGvjVmRgKxpm-i6ME6v_gyp5mB6GK2yIrJzeW5uCL7_DBYnLLKk7zknFvD9qIFFBhX7Mqv9TA1JLc_z1xCe8ba79DLKFQyV1UlSEOrRP5QmJuXDyLrbaVRatG8pzxvETW8JddwYffTH7AzTKWVvWekr1Ygd7X3LezxAXvIOHM7gSNvDq2WfDYWy5gz0c9bY9PDuBHvxbXu-whwenn0MDkxeahEv2kET2fLR-WO8wRgFfevCHmHw4-zBc1sBVgrMaKMb_-2FkVb6-825XKUw&h=uJZyMzc03uylCxt_V_S3gvhz_GSUbnG-clxVFlOBKFI + cache-control: + - no-store, no-cache + content-length: + - '4' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:39 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/0b05740c-a207-4cdc-993f-10e19ce7ea7b*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395?api-version=2024-06-27&t=638539375000080223&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=JS6kNCcbDGOrlp6kQf9y37dPZt0pq2AlmjRQC9I8UWGQXVEiCDqTA_96kP8RBLae6y7tx8JJC6sFF7p27jwNbOSrUQdBCu4NvtCE_vndmejyCx5HAj50moauI23pGGfvUSGoSbeygaZn4pp2gtOsRvYMmpkamDi6McGviGDaJLJgcgCtDYwY-PjS_W3ALXMZA9DRfnWzGxhjS5-zVMTcZVVnW9uM-9jQ4GI_JxacsQVEWtfVZqM1-QMFW6YFgbdBK4iWtPwc7-iQDwaN7uu-mln7hc4FSHnrWnLkuyTGtVJVOU8Iu_EeNEbpG0B6oGHXDHe54q0ETy_LDdSl7cusfw&h=qp0dYdle8PgnKft4j9qn4Pffi0MmXBWUrPjKqJ22qAA + mise-correlation-id: + - bdf37557-eb97-4439-b1e8-bf3856150017 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + x-azure-ref: + - 20240614T045139Z-168779fcbd62qqz6d9ebhg58xc0000000ngg00000000x8wd + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 05f5679c645802ac039e4a6883217874 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-deletes: + - '14999' + x-msedge-ref: + - 'Ref A: D84D04EA371C438CBED1837E21AF8A15 Ref B: TYO201151004009 Ref C: 2024-06-14T04:51:39Z' + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/0b05740c-a207-4cdc-993f-10e19ce7ea7b*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395?api-version=2024-06-27&t=638539374999923991&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=FQ-orfZyXS9-Hl4gkuaLwhMwHPKa5M_q7ka_t6UWOyvnwzPe4yBYckAFFjSBbOaa_Q-JGvjVmRgKxpm-i6ME6v_gyp5mB6GK2yIrJzeW5uCL7_DBYnLLKk7zknFvD9qIFFBhX7Mqv9TA1JLc_z1xCe8ba79DLKFQyV1UlSEOrRP5QmJuXDyLrbaVRatG8pzxvETW8JddwYffTH7AzTKWVvWekr1Ygd7X3LezxAXvIOHM7gSNvDq2WfDYWy5gz0c9bY9PDuBHvxbXu-whwenn0MDkxeahEv2kET2fLR-WO8wRgFfevCHmHw4-zBc1sBVgrMaKMb_-2FkVb6-825XKUw&h=uJZyMzc03uylCxt_V_S3gvhz_GSUbnG-clxVFlOBKFI + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/0b05740c-a207-4cdc-993f-10e19ce7ea7b*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395","name":"0b05740c-a207-4cdc-993f-10e19ce7ea7b*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete","status":"Deleting","startTime":"2024-06-14T04:51:39.4339466Z"}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/0b05740c-a207-4cdc-993f-10e19ce7ea7b*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395?api-version=2024-06-27&t=638539375004455473&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=zYnTz7NSNdUOMWS_NI9_DPpuJ4Dm7GL8wSMixHh8Ub_XejhGVOfDtGpHdtNptDcRNYFIT6XUaWUvAvwwHunZKmZYg1KGntWrFPIbI-nQ9OOar_La98EaBHwfGSQncg_ggDtuvV8bw_VJQQLEO4aqZJhWN9chb9TzoNYHfPgFew2FoNxXxCakxbh1ZT7eJy5zOOCD0iNE6-Y0RMsGGDdNF2-MUGvX8lZqek3qw4SyWU-RVOT3esOIqfNOzcw7X2Xniib54YYQIEevExGrujPPYu0kLvSuSQKspFwO3qePv6ImwV60KPUWm5QCb1Ym2KAP9yPlW0R-FFksPpoKaMlPvA&h=pucBf-WdDlbqRZ7I9UcQBL1i594wc8eEaIlu14r_rSc + cache-control: + - no-cache + content-length: + - '456' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:40 GMT + etag: + - '"0b019b04-0000-4d00-0000-666bcc5b0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/0b05740c-a207-4cdc-993f-10e19ce7ea7b*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395?api-version=2024-06-27&t=638539375004611684&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=cLwFKoYfOjP0incBKXzDurX3xAUAjTv6akJ9rQy2q8JiFNrm4GCyHo6uqEqsJfPHQBwCGx_THI7GYUFl2UuzcJUMh8JaHUe8nq_PvDr4nTN_O1BUUKF4qWAw594QrETWrkzhzP1ftpTRk3fznVYVE3a3gPGFfH8Ta3AIotQ1yu0FdreYUIJ4PTvUESCYuZNc2gmM2t92Dsv68qBBGV6X8oPU3I4bii12oHT7F_9d87PH4jt5tMyx-MRC36-4N66CzsWX8FY0KLOzNW4oFozuQdA4Xv1uRc7zktDzUsaSWSXuV32HHiffAv6rDUdkgXCx2uCmxw_H9-k_-P1cciT5_w&h=9psT8IkjckYMQuoBLqxBJmcwAxqClXUYdA3h5OqGM88 + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 3E128665A5EE4F0A98C80989DBCD894C Ref B: TYO201151004009 Ref C: 2024-06-14T04:51:40Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/0b05740c-a207-4cdc-993f-10e19ce7ea7b*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395?api-version=2024-06-27&t=638539374999923991&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=FQ-orfZyXS9-Hl4gkuaLwhMwHPKa5M_q7ka_t6UWOyvnwzPe4yBYckAFFjSBbOaa_Q-JGvjVmRgKxpm-i6ME6v_gyp5mB6GK2yIrJzeW5uCL7_DBYnLLKk7zknFvD9qIFFBhX7Mqv9TA1JLc_z1xCe8ba79DLKFQyV1UlSEOrRP5QmJuXDyLrbaVRatG8pzxvETW8JddwYffTH7AzTKWVvWekr1Ygd7X3LezxAXvIOHM7gSNvDq2WfDYWy5gz0c9bY9PDuBHvxbXu-whwenn0MDkxeahEv2kET2fLR-WO8wRgFfevCHmHw4-zBc1sBVgrMaKMb_-2FkVb6-825XKUw&h=uJZyMzc03uylCxt_V_S3gvhz_GSUbnG-clxVFlOBKFI + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/0b05740c-a207-4cdc-993f-10e19ce7ea7b*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395","name":"0b05740c-a207-4cdc-993f-10e19ce7ea7b*BF0947348A2767CD3E9F848E7569819E65F86E37C3B9D9C11378FB3C64521395","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete","status":"Succeeded","startTime":"2024-06-14T04:51:39.4339466Z","endTime":"2024-06-14T04:51:40.8957155Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '527' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:52:10 GMT + etag: + - '"0b01b804-0000-4d00-0000-666bcc5c0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 28360C50EE894B17B92719D3E4C5F045 Ref B: TYO201151004009 Ref C: 2024-06-14T04:52:10Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report show + Connection: + - keep-alive + ParameterSetName: + - --report-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete?api-version=2024-06-27 + response: + body: + string: '{"error":{"code":"NotFound","target":"/tenant/72f988bf-86f1-41af-91ab-2d7cd011db47/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_delete","message":"Report + not found"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '189' + content-type: + - application/json + date: + - Fri, 14 Jun 2024 04:52:11 GMT + mise-correlation-id: + - f2c0e719-cf42-4dbe-8148-1c9cda9951ba + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045211Z-r15f4699bb7rfjmjupqcm1ntd800000001zg00000000vt1a + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-failure-cause: + - service + x-ms-operation-id: + - b258e3c039d7a5a40d72566c8485fd5e + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: F208D66D1A95433DA68061DAF0473F71 Ref B: TYO201100116017 Ref C: 2024-06-14T04:52:11Z' + x-powered-by: + - ASP.NET + status: + code: 404 + message: Not Found +version: 1 diff --git a/src/acat/azext_acat/tests/latest/recordings/test_delete_webhook.yaml b/src/acat/azext_acat/tests/latest/recordings/test_delete_webhook.yaml new file mode 100644 index 00000000000..c6d33c666e3 --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_delete_webhook.yaml @@ -0,0 +1,199 @@ +interactions: +- request: + body: '{"properties": {"contentType": "application/json", "events": [], "payloadUrl": + "https://CLI-test", "sendAllEvents": "all", "enableSslVerification": "true", + "status": "enalbe", "webhookKey": "", "updateWebhookKey": "false"}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report webhook create + Connection: + - keep-alive + Content-Length: + - '223' + Content-Type: + - application/json + ParameterSetName: + - --report-name --webhook-name --payload-url + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: PUT + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_delete?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_delete","name":"CLI_test_webhook_delete","type":"microsoft.appcomplianceautomation/reports/webhooks","systemData":{"createdBy":"huiquanjiang@microsoft.com","createdByType":"User","createdAt":"2024-06-17T02:40:52.5925285Z","lastModifiedBy":"huiquanjiang@microsoft.com","lastModifiedByType":"User","lastModifiedAt":"2024-06-17T02:40:52.5925285Z"},"properties":{"webhookId":"2cc17d36-734a-498c-a6e8-fee3a1883657","status":"enalbe","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","sendAllEvents":"all","events":[],"payloadUrl":"https://CLI-test","contentType":"application/json","webhookKeyEnabled":"false","enableSslVerification":"true","deliveryStatus":"NotStarted","provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '824' + content-type: + - application/json; charset=utf-8 + date: + - Mon, 17 Jun 2024 02:40:52 GMT + mise-correlation-id: + - 739edd58-d211-480c-a02a-c1c5c1ae52ee + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240617T024052Z-168779fcbd6q9fsdpfkchp58as00000002ag000000013rkz + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - f7102f92f822847518e3ffe2c6b0e7a9 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: D15CB434BA704DE5B32945C7E47905DB Ref B: TYO201100117039 Ref C: 2024-06-17T02:40:52Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report webhook delete + Connection: + - keep-alive + Content-Length: + - '0' + ParameterSetName: + - --report-name --webhook-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: DELETE + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_delete?api-version=2024-06-27 + response: + body: + string: 'null' + headers: + accept-ranges: + - bytes + cache-control: + - no-store, no-cache + content-length: + - '4' + content-type: + - application/json; charset=utf-8 + date: + - Mon, 17 Jun 2024 02:40:53 GMT + mise-correlation-id: + - 0e9773f4-4150-4ce7-9671-52b1e764f2d6 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + x-azure-ref: + - 20240617T024053Z-168779fcbd6gvc22gke6dan7ns00000001x000000000dbvg + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - a89c1e6817c9672b97d6a86d8068c53a + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-deletes: + - '14998' + x-msedge-ref: + - 'Ref A: 425C17F9BA8C4DA696AD118072FCBF9F Ref B: TYO201151001042 Ref C: 2024-06-17T02:40:53Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report webhook show + Connection: + - keep-alive + ParameterSetName: + - --report-name --webhook-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_delete?api-version=2024-06-27 + response: + body: + string: '{"error":{"code":"ResourceReadFailed","message":"Failed to read resource + ''/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_delete'' + with error: Not Found"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '224' + content-type: + - application/json + date: + - Mon, 17 Jun 2024 02:40:54 GMT + mise-correlation-id: + - 828a13cc-846b-4443-be82-60978fb32da0 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + x-azure-ref: + - 20240617T024054Z-168779fcbd6q9fsdpfkchp58as00000002ag000000013rtr + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-failure-cause: + - service + x-ms-operation-id: + - f46aa77cc330699b0c1ab861100666c9 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 32779F3AB64449EBB493AB2351B70A86 Ref B: TYO201151002025 Ref C: 2024-06-17T02:40:54Z' + x-powered-by: + - ASP.NET + status: + code: 404 + message: Not Found +version: 1 diff --git a/src/acat/azext_acat/tests/latest/recordings/test_download_report.yaml b/src/acat/azext_acat/tests/latest/recordings/test_download_report.yaml new file mode 100644 index 00000000000..7fabbbe589f --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_download_report.yaml @@ -0,0 +1,11489 @@ +interactions: +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report show + Connection: + - keep-alive + ParameterSetName: + - --report-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351","name":"crstatustest-prod-20240617200351","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-17T20:06:17.8922461Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-17T20:06:17.8922461Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-18T23:00:00Z","lastTriggerTime":"2024-06-17T23:03:14.127Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CRStatusRG-prod-20240617200351/providers/Microsoft.Storage/storageAccounts/appprod20240617200351","resourceType":"Microsoft.Storage/storageAccounts","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1174' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:22:11 GMT + mise-correlation-id: + - f69ce8d7-54de-4c40-b610-e0cab28f32aa + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062210Z-168779fcbd648xwrd2mwcm192s000000034g00000001956h + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 16c9ec829dadb302fcf74b038a022790 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 7EBC8AC4BB61477D925E42BAEC358C3F Ref B: TYO201151001052 Ref C: 2024-06-18T06:22:10Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report download + Connection: + - keep-alive + ParameterSetName: + - --report-name --download-type + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots?$skipToken=0&$top=1&api-version=2024-06-27 + response: + body: + string: "{\"value\":[{\"id\":\"/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots/crstatustest-prod-20240617200351-20240617T230307-487Z\",\"name\":\"crstatustest-prod-20240617200351-20240617T230307-487Z\",\"type\":\"Microsoft.AppComplianceAutomation/reports/snapshots\",\"properties\":{\"snapshotName\":\"crstatustest-prod-20240617200351-20240617T230307-487Z\",\"createdAt\":\"2024-06-17T23:03:08.288Z\",\"provisioningState\":\"Succeeded\",\"reportProperties\":{\"timeZone\":\"China + Standard Time\",\"triggerTime\":\"2023-01-08T23:00:00Z\",\"resources\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CRStatusRG-prod-20240617200351/providers/Microsoft.Storage/storageAccounts/appprod20240617200351\",\"resourceType\":\"Microsoft.Storage/storageAccounts\",\"resourceOrigin\":null,\"accountId\":null}],\"status\":\"Active\",\"errors\":[],\"tenantId\":\"72f988bf-86f1-41af-91ab-2d7cd011db47\",\"offerGuid\":\"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf\",\"nextTriggerTime\":\"2024-06-18T23:00:00Z\",\"lastTriggerTime\":\"2024-06-17T23:03:08.194Z\",\"subscriptions\":[\"120b982f-6bd3-4b60-98d2-a7b7ecd6c78e\"],\"complianceStatus\":{\"m365\":{\"passedCount\":1,\"failedCount\":37,\"manualCount\":0,\"notApplicableCount\":6,\"pendingCount\":1}},\"provisioningState\":\"Succeeded\"},\"reportSystemData\":{\"createdBy\":\"\",\"createdByType\":\"User\",\"createdAt\":\"2024-06-17T20:06:17.8922461Z\",\"lastModifiedBy\":\"\",\"lastModifiedByType\":\"User\",\"lastModifiedAt\":\"2024-06-17T20:06:17.8922461Z\"},\"complianceResults\":[{\"complianceName\":\"M365\",\"categories\":[{\"categoryName\":\"Operational + Security\",\"categoryStatus\":\"Failed\",\"controlFamilies\":[{\"controlFamilyName\":\"Awareness + Training\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_1\",\"controlName\":\"Provide + evidence of established security awareness training, frequency and records + monitoring for all information system users\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The organization provides established security awareness + training to information system users (including managers, senior executives, + and contractors) :
(i) As part of initial training for new users
OR
(ii) + When required by information system changes

B) You have organization-defined + frequency of awareness training

C) You document and monitor individual + information system security awareness activites and retain individual training + records over an organization-defined frequency

\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control1\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that you have established security awareness training + to information system users\",\"responsibilityDescription\":\"Provide evidence + that:

A) The organization provides established security awareness training + to information system users (including managers, senior executives, and contractors):
+ (i) As part of initial training for new users
OR
(ii) When required + by information system changes

B) Organization-defined frequency of + awareness training.

C) Documents and monitors individual information + system security awareness activities and retains individual training records + over an organization-defined frequency.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-awareness-training\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Malware + Protection - Anti-Malware\",\"controlFamilyStatus\":\"NotApplicable\",\"controls\":[{\"controlId\":\"Operational_Security_2\",\"controlName\":\"Provide + evidence of active anti-malware solution meeting specific criteria including + on-access scanning and blocking capabilities\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that your anti-malware solution is active and enabled across all + the sampled system components and configured to meet the following criteria:

A) + If Anti Virus, then on-access scanning is enabled and that signatures are + up-to-date within 1-day

B) If Anti Virus, then it automatically blocks + malware or alerts and quarantines when malware is detected

OR

C) + If Endpoint Detection and Threat Response(EDTR)/Endpoint Detection and Protection + Response(EDPR)/Hueristic based scanning using AI then:
(i) periodic scanning + is being performed
(ii) it is generating audit logs
(iii) it is kept + up-to date continually and has self-learning capabilities

D) If EDTR/EDPR/Hueristic + based scanning using AI then:
(i) it blocks known malware
(ii) it identifies + and blocks new malware variants based on macro behaviours as well as having + full safelist capabilities\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control2\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"antivirus_software_or_ms_defender_should_be_enabled\",\"responsibilityTitle\":\"Antivirus + software or Microsoft Defender should be enabled\",\"responsibilityDescription\":\"This + control monitors if Antivirus software or Microsoft Defender is be enabled.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op2_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-antivirus-software\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Malware + Protection - Application Control\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_3\",\"controlName\":\"Provide + evidence of approved software list and active application control technology + with configuration documentation\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that the following controls are in place:

A) You have an approved + list of software/applications with business justification that:

(i) + exists and is kept up to date
(ii) each application undergoes an approval + process and sign off prior to its deployment

B) That application control + technology is active, enabled, and configured across all the sampled system + components as documented\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control3\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_3_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence of approved software list and active application control + technology with configuration documentation\",\"responsibilityDescription\":\"Provide + evidence that the following controls are in place:

A) You have an approved + list of software/applications with business justification that:
(i) exists + and is kept up to date
(ii) each application undergoes an approval process + and sign off prior to its deployment

B) That application control technology + is active, enabled, and configured across all the sampled system components + as documented\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-approval-process-for-applications\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Patch + Management - Patching & Risk Ranking\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_4\",\"controlName\":\"Provide + evidence of comprehensive patch management documentation including patch windows, + decommissioning of unsupported OS/software, and vulnerability identification\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:
A) Patch management policy and procedure documentation defines + all of the following:

i) suitable minimal patching window/s from vendor + patch release or from when coding vulnerabilities are first identified for + Critical/High and Medium risks vulnerabilities.
ii) decommissioning of + unsupported operating systems and software
(ii) details on how new security + vulnerabilities are identified and assigned a risk score\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control4\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_4_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence of comprehensive patch management documentation including + patch windows, decommissioning, and vulnerability identification\",\"responsibilityDescription\":\"Provide + evidence that:

A) Patch management policy and procedure documentation + defines all of the following:
(i) suitable minimal patching window/s from + vendor patch release or from when coding vulnerabilities are first identified + for Critical/High and Medium risks vulnerabilities.
(ii) decommissioning + of unsupported operating systems and software
(iii) details on how new + security vulnerabilities are identified and assigned a risk score\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-minimal-patching-windows\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_5\",\"controlName\":\"Provide + demonstratable evidence that all sampled system components are being patched + and unsupported OS and software components are not in use\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) All sampled system components are being patched
B) + Unsupported operating systems and software components are not in use

Where + applicable this should include code base if serverless technology or PaaS + is used, or both infrastructure and code base if IaaS is used\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control5\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_5_3_manual_cr_aws\",\"responsibilityTitle\":\"Provide + demonstratable evidence that historical patching operations of AWS EC2 instances + are within the minimum patching window\",\"responsibilityDescription\":\"Provide + demonstratable evidence that historical patching operation of AWS EC2 instances + are within the minimum patching window.
The minimal patching timeframe + is:
- Critical severity (14 days),
- High severity (30 days),
+ - Medium severity (60 days).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-unsupported-operating-systems-and-software\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_5_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that unsupported operating systems and software components + are not in use for Azure Virtual Machines\",\"responsibilityDescription\":\"Provide + demonstratable evidence that unsupported operating systems and software components + are not in use for Azure Virtual Machines.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-unsupported-operating-systems-and-software\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_5_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence to show all the software are being patched\",\"responsibilityDescription\":\"Provide + demonstratable evidence to show all sampled system components are being patched.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-software-list-and-patching\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Vulnerability + Scanning\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_6\",\"controlName\":\"Provide + evidence of quarterly infrastructure and web vulnerability scanning is carried + out against public and internal IPs/URLs\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Quarterly infrastructure and web application vulnerability + scanning is carried out.

(If Hybrid, On-prem or IaaS: This needs + to be carried out against the public footprint (IPs/URLs) and internal IP + ranges OR
If PaaS: This needs to be carried out on external infratructure + and web assessment only).

(Must include the full scope of the environment)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control6\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"azure_defender_for_app_service_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for App Service should be enabled\",\"responsibilityDescription\":\"Azure + Defender for App Service leverages the scale of the cloud, and the visibility + that Azure has as a cloud provider, to monitor for common web app attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-app-service\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_azure_sql_database_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Azure SQL Database servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-database-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Key Vault should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Key Vault provides an additional layer of protection and security + intelligence by detecting unusual and potentially harmful attempts to access + or exploit key vault accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_resource_manager_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Resource Manager should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Resource Manager automatically monitors the resource management + operations in your organization. Azure Defender detects threats and alerts + you about suspicious activity. Learn more about the capabilities of Azure + Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling + this Azure Defender plan results in charges. Learn about the pricing details + per region on Security Center's pricing page: https://aka.ms/pricing-security-center .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-resource-manager\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for servers provides real-time threat protection for server workloads + and generates hardening recommendations as well as alerts about suspicious + activities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_servers_on_machines_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for SQL servers on machines should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-on-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_should_be_enabled_for_unprotected_sql_managed_instances\",\"responsibilityTitle\":\"Azure + Defender for SQL should be enabled for unprotected SQL Managed Instances\",\"responsibilityDescription\":\"Audit + each SQL Managed Instance without advanced data security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"microsoft_defender_for_containers_should_be_enabled\",\"responsibilityTitle\":\"Microsoft + Defender for Containers should be enabled\",\"responsibilityDescription\":\"Microsoft + Defender for Containers provides hardening, vulnerability assessment and run-time + protections for your Azure, hybrid, and multi-cloud Kubernetes environments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-containers\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_7\",\"controlName\":\"Provide + evidence that remediation of all vulnerabilities identified in Control 6 are + patched in line with the minimal patching window defined in your policy\",\"controlFullName\":\"\",\"controlDescription\":\" + Provide rescan evidence that:

A) Remediation of all vulnerabilities + identified in control 6 are patched inline with the minimal patching window + defined in your policy\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control7\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"validate_that_vulnerabilities_remediation_are_patched_inline_with_the_minimal_patching_window\",\"responsibilityTitle\":\"Validate + that vulnerabilities remediation for Azure resources are patched inline with + the minimal patching window\",\"responsibilityDescription\":\"This policy + validates that vulnerabilities remediation for Azure resources are patched + inline with the minimal patching window. The minimal patching timeframe is: + Critical severity(3 business days), High severity(7 business days), Medium + severity(28 business days), Low severity(60 business days), other severity(90 + business days).\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":1,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"Microsoft.Resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Unhealthy\",\"resourceStatusChangeDate\":\"2023-12-25T08:09:12.7230376Z\",\"recommendationIds\":[\"validate-that-vulnerabilities-remediation-are-patched-inline-with-the-minimal-patching-window\"]}],\"recommendationList\":[{\"recommendationId\":\"validate-that-vulnerabilities-remediation-are-patched-inline-with-the-minimal-patching-window\",\"recommendationShortName\":\"Vulnerabilities + not patch in time\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op7_1\",\"recommendationSolutionContent\":\"1. + Go to the https://portal.azure.com/#view/HubsExtension/ArgQueryBlade/resourceType/Microsoft.Resources%2FResources +
2. Run query 'securityresources| where type == 'microsoft.security/assessments' + and properties.status.code != 'Healthy' '.
3. Please fix your vulnerabilities + in the specified period following the specific remediation steps. The patching + timeframe is: Critical severity (14 days), High severity (30 days), Medium + severity (60 days)\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-vulnerabilities-patching-validation-azure\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Network + Security Controls (NSC)\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_8\",\"controlName\":\"Provide + evidence of NSC installation on the in-scope boundary and public access termination + at perimeter network\",\"controlFullName\":\"\",\"controlDescription\":\"
Provide + evidence that:

A) Network Secuirtiy Controls (NSC) are installed + on the boundary of the in-scope environment, and installed between the perimeter + network and internal networks

AND if Hybrid, On-prem, IaaS also provide + evidence that:

B) all public access terminates at the perimeter network\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control8\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"preview_all_internet_traffic_should_be_routed_via_your_deployed_azure_firewall\",\"responsibilityTitle\":\"[Preview]: + All Internet traffic should be routed via your deployed Azure Firewall\",\"responsibilityDescription\":\"Azure + Security Center has identified that some of your subnets aren't protected + with a next generation firewall. Protect your subnets from potential threats + by restricting access to them with Azure Firewall or a supported next generation + firewall.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-firewall-internet-traffic-routing\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_azure_key_vault_should_disable_public_network_access\",\"responsibilityTitle\":\"[Preview]: + Azure Key Vault should disable public network access\",\"responsibilityDescription\":\"Disable + public network access for your key vault so that it's not accessible over + the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-key-vault-disable-public-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"adaptive_network_hardening_recommendations_should_be_applied_on_internet_facing_virtual_machines\",\"responsibilityTitle\":\"Adaptive + network hardening recommendations should be applied on internet facing virtual + machines\",\"responsibilityDescription\":\"Azure Security Center analyzes + the traffic patterns of Internet facing virtual machines and provides Network + Security Group rule recommendations that reduce the potential attack surface.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-network-harden-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"api_management_services_should_use_a_virtual_network\",\"responsibilityTitle\":\"API + Management services should use a virtual network\",\"responsibilityDescription\":\"Azure + Virtual Network deployment provides enhanced security, isolation and allows + you to place your API Management service in a non-internet routable network + that you control access to. These networks can then be connected to your on-premises + networks using various VPN technologies, which enables access to your backend + services within the network and/or on-premises. The developer portal and API + gateway, can be configured to be accessible either from the Internet or only + within the virtual network.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-api-mgmt-vnet\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"authorized_ip_ranges_should_be_defined_on_kubernetes_services\",\"responsibilityTitle\":\"Authorized + IP ranges should be defined on Kubernetes Services\",\"responsibilityDescription\":\"Restrict + access to the Kubernetes Service Management API by granting API access only + to IP addresses in specific ranges. It is recommended to limit access to authorized + IP ranges to ensure that only applications from allowed networks can access + the cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-kubernetes-authorized-ip-ranges\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_cosmos_db_accounts_should_have_firewall_rules\",\"responsibilityTitle\":\"Azure + Cosmos DB accounts should have firewall rules\",\"responsibilityDescription\":\"Firewall + rules should be defined on your Azure Cosmos DB accounts to prevent traffic + from unauthorized sources. Accounts that have at least one IP rule defined + with the virtual network filter enabled are deemed compliant. Accounts disabling + public access are also deemed compliant.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmos-db-firewall-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_ddos_protection_standard_should_be_enabled\",\"responsibilityTitle\":\"Azure + DDoS Protection Standard should be enabled\",\"responsibilityDescription\":\"DDoS + protection standard should be enabled for all virtual networks with a subnet + that is part of an application gateway with a public IP.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-ddos-protection\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_web_application_firewall_should_be_enabled_for_azure_front_door_entry_points\",\"responsibilityTitle\":\"Azure + Web Application Firewall should be enabled for Azure Front Door entry-points\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-front-door-entry-points\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_disable_public_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should disable public network access\",\"responsibilityDescription\":\"Disabling + public network access improves security by ensuring that Cognitive Services + account isn't exposed on the public internet. Creating private endpoints can + limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-disable-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_restrict_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should restrict network access\",\"responsibilityDescription\":\"Network + access to Cognitive Services accounts should be restricted. Configure network + rules so only applications from allowed networks can access the Cognitive + Services account. To allow connections from specific internet or on-premises + clients, access can be granted to traffic from specific Azure virtual networks + or to public internet IP address ranges.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_registries_should_not_allow_unrestricted_network_access\",\"responsibilityTitle\":\"Container + registries should not allow unrestricted network access\",\"responsibilityDescription\":\"Azure + container registries by default accept connections over the internet from + hosts on any network. To protect your registries from potential threats, allow + access from only specific public IP addresses or address ranges. If your registry + doesn't have an IP/firewall rule or a configured virtual network, it will + appear in the unhealthy resources. Learn more about Container Registry network + rules here: https://aka.ms/acr/portal/public-network + and here https://aka.ms/acr/vnet + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-container-registry-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"internet_facing_virtual_machines_should_be_protected_with_network_security_groups\",\"responsibilityTitle\":\"Internet-facing + virtual machines should be protected with network security groups\",\"responsibilityDescription\":\"Protect + your virtual machines from potential threats by restricting access to them + with network security groups (NSG). Learn more about controlling traffic with + NSGs at https://aka.ms/nsg-doc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-vm-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ip_forwarding_on_your_virtual_machine_should_be_disabled\",\"responsibilityTitle\":\"IP + Forwarding on your virtual machine should be disabled\",\"responsibilityDescription\":\"Enabling + IP forwarding on a virtual machine's NIC allows the machine to receive traffic + addressed to other destinations. IP forwarding is rarely required (e.g., when + using the VM as a network virtual appliance), and therefore, this should be + reviewed by the network security team.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-ip-forwarding-disable-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_of_virtual_machines_should_be_protected_with_just_in_time_network_access_control\",\"responsibilityTitle\":\"Management + ports of virtual machines should be protected with just-in-time network access + control\",\"responsibilityDescription\":\"Possible network Just In Time (JIT) + access will be monitored by Azure Security Center as recommendations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-jit-network-access-control\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_should_be_closed_on_your_virtual_machines\",\"responsibilityTitle\":\"Management + ports should be closed on your virtual machines\",\"responsibilityDescription\":\"Open + remote management ports are exposing your VM to a high level of risk from + Internet-based attacks. These attacks attempt to brute force credentials to + gain admin access to the machine.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-close-vm-management-ports\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_on_azure_sql_database_should_be_disabled\",\"responsibilityTitle\":\"Public + network access on Azure SQL Database should be disabled\",\"responsibilityDescription\":\"Disabling + the public network access property improves security by ensuring your Azure + SQL Database can only be accessed from a private endpoint. This configuration + denies all logins that match IP or virtual network based firewall rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-db-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mariadb_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MariaDB servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MariaDB can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mariadb-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mysql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MySQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MySQL can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_postgresql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for PostgreSQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for PostgreSQL can only be accessed from a private endpoint. This + configuration disables access from any public address space outside of Azure + IP range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_restrict_network_access_using_virtual_network_rules\",\"responsibilityTitle\":\"Storage + accounts should restrict network access using virtual network rules\",\"responsibilityDescription\":\"Protect + your storage accounts from potential threats using virtual network rules as + a preferred method instead of IP-based filtering. Disabling IP-based filtering + prevents public IPs from accessing your storage accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-accounts-vnet-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"subnets_should_be_associated_with_a_network_security_group\",\"responsibilityTitle\":\"Subnets + should be associated with a Network Security Group\",\"responsibilityDescription\":\"Protect + your subnet from potential threats by restricting access to it with a Network + Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules + that allow or deny network traffic to your subnet.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-subnets-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"web_application_firewall_waf_should_be_enabled_for_application_gateway\",\"responsibilityTitle\":\"Web + Application Firewall (WAF) should be enabled for Application Gateway\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-application-gateway\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_9\",\"controlName\":\"Provide + evidence of proper configuration and regular review of Network Security Control + rules\",\"controlFullName\":\"\",\"controlDescription\":\"Validate that:

A) + all Network Security Controls (NSC) are configured to drop traffic not explicitly + defined within the rule base

B) Network Security Controls (NSC) rule + reviews are carried out at least every 6 months\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control9\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_9_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that you are performing firewall rule reviews at least + every 6 months\",\"responsibilityDescription\":\"Any evidence provided needs + to be able to demonstrate that rule review meetings have been occurring. This + can be done by sharing meeting minutes of the NSC review and any additional + change control evidence that shows any actions taken from the review. Please + ensure that dates are present as the certification analyst reviewing your + submission would need to see a minimum of two of these meetings review documents + (i.e., every six months).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-configuration-creep\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_all_internet_traffic_should_be_routed_via_your_deployed_azure_firewall\",\"responsibilityTitle\":\"[Preview]: + All Internet traffic should be routed via your deployed Azure Firewall\",\"responsibilityDescription\":\"Azure + Security Center has identified that some of your subnets aren't protected + with a next generation firewall. Protect your subnets from potential threats + by restricting access to them with Azure Firewall or a supported next generation + firewall.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-firewall-internet-traffic-routing\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_azure_key_vault_should_disable_public_network_access\",\"responsibilityTitle\":\"[Preview]: + Azure Key Vault should disable public network access\",\"responsibilityDescription\":\"Disable + public network access for your key vault so that it's not accessible over + the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-key-vault-disable-public-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"adaptive_network_hardening_recommendations_should_be_applied_on_internet_facing_virtual_machines\",\"responsibilityTitle\":\"Adaptive + network hardening recommendations should be applied on internet facing virtual + machines\",\"responsibilityDescription\":\"Azure Security Center analyzes + the traffic patterns of Internet facing virtual machines and provides Network + Security Group rule recommendations that reduce the potential attack surface.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-network-harden-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"api_management_services_should_use_a_virtual_network\",\"responsibilityTitle\":\"API + Management services should use a virtual network\",\"responsibilityDescription\":\"Azure + Virtual Network deployment provides enhanced security, isolation and allows + you to place your API Management service in a non-internet routable network + that you control access to. These networks can then be connected to your on-premises + networks using various VPN technologies, which enables access to your backend + services within the network and/or on-premises. The developer portal and API + gateway, can be configured to be accessible either from the Internet or only + within the virtual network.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-api-mgmt-vnet\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"authorized_ip_ranges_should_be_defined_on_kubernetes_services\",\"responsibilityTitle\":\"Authorized + IP ranges should be defined on Kubernetes Services\",\"responsibilityDescription\":\"Restrict + access to the Kubernetes Service Management API by granting API access only + to IP addresses in specific ranges. It is recommended to limit access to authorized + IP ranges to ensure that only applications from allowed networks can access + the cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-kubernetes-authorized-ip-ranges\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_cosmos_db_accounts_should_have_firewall_rules\",\"responsibilityTitle\":\"Azure + Cosmos DB accounts should have firewall rules\",\"responsibilityDescription\":\"Firewall + rules should be defined on your Azure Cosmos DB accounts to prevent traffic + from unauthorized sources. Accounts that have at least one IP rule defined + with the virtual network filter enabled are deemed compliant. Accounts disabling + public access are also deemed compliant.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmos-db-firewall-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_ddos_protection_standard_should_be_enabled\",\"responsibilityTitle\":\"Azure + DDoS Protection Standard should be enabled\",\"responsibilityDescription\":\"DDoS + protection standard should be enabled for all virtual networks with a subnet + that is part of an application gateway with a public IP.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-ddos-protection\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_web_application_firewall_should_be_enabled_for_azure_front_door_entry_points\",\"responsibilityTitle\":\"Azure + Web Application Firewall should be enabled for Azure Front Door entry-points\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-front-door-entry-points\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_disable_public_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should disable public network access\",\"responsibilityDescription\":\"Disabling + public network access improves security by ensuring that Cognitive Services + account isn't exposed on the public internet. Creating private endpoints can + limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-disable-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_restrict_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should restrict network access\",\"responsibilityDescription\":\"Network + access to Cognitive Services accounts should be restricted. Configure network + rules so only applications from allowed networks can access the Cognitive + Services account. To allow connections from specific internet or on-premises + clients, access can be granted to traffic from specific Azure virtual networks + or to public internet IP address ranges.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_registries_should_not_allow_unrestricted_network_access\",\"responsibilityTitle\":\"Container + registries should not allow unrestricted network access\",\"responsibilityDescription\":\"Azure + container registries by default accept connections over the internet from + hosts on any network. To protect your registries from potential threats, allow + access from only specific public IP addresses or address ranges. If your registry + doesn't have an IP/firewall rule or a configured virtual network, it will + appear in the unhealthy resources. Learn more about Container Registry network + rules here: https://aka.ms/acr/portal/public-network + and here https://aka.ms/acr/vnet + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-container-registry-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"internet_facing_virtual_machines_should_be_protected_with_network_security_groups\",\"responsibilityTitle\":\"Internet-facing + virtual machines should be protected with network security groups\",\"responsibilityDescription\":\"Protect + your virtual machines from potential threats by restricting access to them + with network security groups (NSG). Learn more about controlling traffic with + NSGs at https://aka.ms/nsg-doc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-vm-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ip_forwarding_on_your_virtual_machine_should_be_disabled\",\"responsibilityTitle\":\"IP + Forwarding on your virtual machine should be disabled\",\"responsibilityDescription\":\"Enabling + IP forwarding on a virtual machine's NIC allows the machine to receive traffic + addressed to other destinations. IP forwarding is rarely required (e.g., when + using the VM as a network virtual appliance), and therefore, this should be + reviewed by the network security team.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-ip-forwarding-disable-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_of_virtual_machines_should_be_protected_with_just_in_time_network_access_control\",\"responsibilityTitle\":\"Management + ports of virtual machines should be protected with just-in-time network access + control\",\"responsibilityDescription\":\"Possible network Just In Time (JIT) + access will be monitored by Azure Security Center as recommendations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-jit-network-access-control\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_should_be_closed_on_your_virtual_machines\",\"responsibilityTitle\":\"Management + ports should be closed on your virtual machines\",\"responsibilityDescription\":\"Open + remote management ports are exposing your VM to a high level of risk from + Internet-based attacks. These attacks attempt to brute force credentials to + gain admin access to the machine.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-close-vm-management-ports\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_on_azure_sql_database_should_be_disabled\",\"responsibilityTitle\":\"Public + network access on Azure SQL Database should be disabled\",\"responsibilityDescription\":\"Disabling + the public network access property improves security by ensuring your Azure + SQL Database can only be accessed from a private endpoint. This configuration + denies all logins that match IP or virtual network based firewall rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-db-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mariadb_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MariaDB servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MariaDB can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mariadb-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mysql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MySQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MySQL can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_postgresql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for PostgreSQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for PostgreSQL can only be accessed from a private endpoint. This + configuration disables access from any public address space outside of Azure + IP range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_restrict_network_access_using_virtual_network_rules\",\"responsibilityTitle\":\"Storage + accounts should restrict network access using virtual network rules\",\"responsibilityDescription\":\"Protect + your storage accounts from potential threats using virtual network rules as + a preferred method instead of IP-based filtering. Disabling IP-based filtering + prevents public IPs from accessing your storage accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-accounts-vnet-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"subnets_should_be_associated_with_a_network_security_group\",\"responsibilityTitle\":\"Subnets + should be associated with a Network Security Group\",\"responsibilityDescription\":\"Protect + your subnet from potential threats by restricting access to it with a Network + Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules + that allow or deny network traffic to your subnet.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-subnets-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"web_application_firewall_waf_should_be_enabled_for_application_gateway\",\"responsibilityTitle\":\"Web + Application Firewall (WAF) should be enabled for Application Gateway\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-application-gateway\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Change + Control\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_10\",\"controlName\":\"Provide + evidence of documented change requests with impact, back-out procedures, testing, + and approvers\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Any changes introduced to production environments + are implemented through documented change requests which contain:
(i) + impact of the change
(ii) details of back-out procedures
(iii) testing + to be carried out
(iv) review and approval by authorised personnel


\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control10\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_10_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that any changes introduced to production environments + are implemented through documented change requests\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Any changes introduced to production + environments are implemented through documented change requests which contain:
(i) + Impact of the change.
(ii) Details of back-out procedures.
(iii) Testing + to be carried out.
(iv) eview and approval by authorized personnel.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-change-control-policies\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_11\",\"controlName\":\"Provide + evidence of separate environments and access controls enforcing separation + of duties and data protection\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Separate environments exist so that:

(i) development + and test/staging environments enforce separation of duties from the production + environment
(ii) separation of duties is enforced via access controls
(iii) + sensitive production data is not in use within the development or test/staging + environments\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control11\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_11_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that development and test environments enforce separation + of duties and sensitive data from the production environment\",\"responsibilityDescription\":\"Please + provide evidence:

Separate environments exist so that:
(i) Development + and test/staging environments enforce separation of duties from the production + environment.
(ii) Sensitive production data is not in use within the development + or test/staging environments.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-separation-of-environments\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_11_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that separation of duties is enforced via environment + access controls\",\"responsibilityDescription\":\"Please provide evidence + that:

Separate environments exist so that separation of duties is enforced + via access controls.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-avoid-sensitive-data\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Secure + Software Development/Deployment\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_12\",\"controlName\":\"Provide + evidence of secure software development documentation and developer training + on secure coding annually\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists and is maintained that:

(i) + supports the development of secure software and includes industry standards + and/or best practices for secure coding, such asOpen Web Application Security + Project (OWASP) Top 10 or SysAdmin, Audit, Network and Security (SANS) Top + 25 Common Weakness Enumeration (CWE)
(ii) developers undergo relevant secure + coding and secure software development training annually
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control12\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_12_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that support secure software development and deployment, + and developers undergo secure software development training annually\",\"responsibilityDescription\":\"Please + provide evidence demonstrating documentation exists and is maintained that:

(i) + Supports the development of secure software and includes industry standards + and/or best practices for secure coding, such as OWASP Top 10 or SANS Top + 25 CWE.
(ii) Developers undergo relevant secure coding and secure software + development training annually.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-software-development\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_13\",\"controlName\":\"Provide + evidence of secure code repository with code review, access controls, MFA + and reviewed production deployment\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Code repositories are secured so that:

(i) + all code changes undergo a review and approval process by a second reviewer + prior to being merged with main branch
(ii) appropriate access controls + are in place
(iii) all access is enforced through multi-factor authentication + (MFA)

B) All releases made into the production environment(s) are reviewed + and approved prior to their deployment\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control13\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"github_has_force_push_disabled\",\"responsibilityTitle\":\"GitHub + repositories should have force pushes to default branch disabled\",\"responsibilityDescription\":\"As + part of evidence for code change should undergo review process, GitHub should + have force push for default branch disabled. This auto checkpoint needs to + establish a GitHub connector created by GitHub Enterprise Cloud account.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"github_has_default_branch_protection_policy\",\"responsibilityTitle\":\"GitHub + repositories should have protection policies for default branch enabled\",\"responsibilityDescription\":\"As + part of evidence for code change should undergo review process, GitHub should + have default branch protection policy enabled. This auto checkpoint needs + to establish a GitHub connector created by GitHub Enterprise Cloud account.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"github_has_auto_mfa_enforcement\",\"responsibilityTitle\":\"MFA + is enforced by GitHub for accounts with contributions\",\"responsibilityDescription\":\"Since + end of 2023, MFA is mandatory for accounts identified as contributors to GitHub.com + according to this announcement .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op13_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-github-mfa-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_13_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that code changes and releases undergo a review, access + controls are inplace, access is enforced through MFA\",\"responsibilityDescription\":\"Please + provide evidence that code repositories are secured so that:

(i) All + code changes undergo a review and approval process by a second reviewer prior + to being merged with main branch.
(ii) Appropriate access controls are + in place.
(iii) All access is enforced through multi-factor authentication + (MFA).
(iv) All releases made into the production environment(s) are reviewed + and approved prior to their deployment.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Account + Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_14\",\"controlName\":\"Provide + evidence of disabled, removed, or changed default credentials and hardened + service accounts processes\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) default credentials are either disabled, removed, + or changed across the sampled system components

B) a process is in + place to secure (harden) service accounts and that this process has been followed\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control14\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_14_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a process is in place to secure (harden) service + accounts and that this process has been followed\",\"responsibilityDescription\":\"Provide + evidence that:

A process is in place to secure (harden) service accounts + and that this process has been followed.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-service-accounts-will-often-be-targeted\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"there_is_no_default_credential_in_azure\",\"responsibilityTitle\":\"There + is no default credential in Azure\",\"responsibilityDescription\":\"It is + mandatory on Azure to create username and set password for Azure accounts. + There is no default credential which can be used to login to Azure directly. + If ISV uses Azure's service, this policy will pass directly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op14_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op14_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-default-credential\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_15\",\"controlName\":\"Provide + evidence of user account management, password policy, and regular account + disabling/deletion process\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Unique user accounts are issued to all users

B) + User least privilege principles are being followed within the environment

C) + A strong password/ pass phrase policy or other suitable mitigations are in + place

D) A process is in place and followed at least every three months + to either disabled or deleted accounts not used within three months\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control15\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"azure_password_policy_can_fulfill_this_requirement\",\"responsibilityTitle\":\"Azure + password policy can fulfill this requirement\",\"responsibilityDescription\":\"It + is mandatory on Azure to set strong password for Azure accounts. If ISV uses + Azure's service, this policy will pass directly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op15_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op15_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-password-policy-can-fulfill-this-requirement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_15_manual_cr\",\"responsibilityTitle\":\"Provide + evidence of user account management, privilege principles are being followed, + password policy, and regular account disabling/deletion process\",\"responsibilityDescription\":\"Provide + evidence that:

(i) Unique user accounts are issued to all users.
(ii) + User least privilege principles are being followed within the environment.
(iii) + A process is in place and followed at least every three months to either disable + or delete accounts not used within 3 months.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-provide-evidence-of-user-account-management\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_16\",\"controlName\":\"Provide + evidence of MFA configuration for all remote access and administrative interfaces\",\"controlFullName\":\"\",\"controlDescription\":\"Validate + that MFA is configured for all remote access connections and all non-console + administrative interfaces, including access to any code repositories and Cloud + management interfaces\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control16\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_16_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that remote access, non-console administrative interface, + code repo are secured with multi-factor authentication (MFA)\",\"responsibilityDescription\":\"Validate + that multi-factor authentication (MFA) is configured for all remote access + connections and all non-console administrative interfaces, including access + to any code repositories and Cloud management interfaces.

Meaning of + these terms:
(i) Remote Access \u2013 This refers to technologies used + to access the supporting environment. For example, Remote Access IPSec VPN, + SSL VPN or Jumpbox/Bastian Host.
(ii) Non-console Administrative Interfaces + \u2013 This refers to the network administrative connections to system components. + This could be over Remote Desktop, SSH or a web interface.
(iii) Code + Repositories \u2013 The code base of the app needs to be protected against + malicious modification which could introduce malware into the app. MFA needs + to be configured on the code repositories.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_on_accounts_with_owner_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with owner permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + owner permissions to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_accounts_with_write_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with read permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + write privileges to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_on_accounts_with_read_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with write permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + write privileges to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Security + Event Logging, Reviewing and Alerting\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_17\",\"controlName\":\"Provide + evidence of properly set up security event logging for user and system activity\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that security event logging is setup across the inscope environment + to log events where applicable such as:

A) User/s access to system + components and the application
B) All actions taken by a high-privileged + user
C) Invalid logical access attempts
D) Privileged account creation + / modification
E) Event log tampering
F) Disabling of security tools + (example: event logging)
G) Anti-Malware logging (example: updates, malware + detection, scan failures)
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control17\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"preview_azure_arc_enabled_kubernetes_clusters_should_have_azure_defender_extension_installed\",\"responsibilityTitle\":\"[Preview]: + Azure Arc enabled Kubernetes clusters should have Azure Defender's extension + installed\",\"responsibilityDescription\":\"Azure Defender's extension for + Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. + The extension collects data from nodes in the cluster and sends it to the + Azure Defender for Kubernetes backend in the cloud for further analysis. Learn + more in https://docs.microsoft.com/azure/security-center/defender-for-kubernetes-azure-arc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-defender-extension\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_logs_in_app_services_should_be_enabled\",\"responsibilityTitle\":\"App + Service logs in App Services should be enabled\",\"responsibilityDescription\":\"Audit + enabling of app service logs on the app. This enables you to recreate activity + trails for investigation purposes if a security incident occurs or your network + is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-app-service-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"auditing_on_sql_server_should_be_enabled\",\"responsibilityTitle\":\"Auditing + on SQL server should be enabled\",\"responsibilityDescription\":\"Auditing + on your SQL Server should be enabled to track database activities across all + databases on the server and save them in an audit log.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-auditing-on-sql-server\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_application_gateway_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Application Gateway should have Resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Application Gateway (plus WAF) and stream to a Log + Analytics workspace. Get detailed visibility into inbound web traffic and + actions taken to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-gateway-enable-resource-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_app_service_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for App Service should be enabled\",\"responsibilityDescription\":\"Azure + Defender for App Service leverages the scale of the cloud, and the visibility + that Azure has as a cloud provider, to monitor for common web app attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-app-service\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_azure_sql_database_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Azure SQL Database servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-database-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Key Vault should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Key Vault provides an additional layer of protection and security + intelligence by detecting unusual and potentially harmful attempts to access + or exploit key vault accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_resource_manager_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Resource Manager should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Resource Manager automatically monitors the resource management + operations in your organization. Azure Defender detects threats and alerts + you about suspicious activity. Learn more about the capabilities of Azure + Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling + this Azure Defender plan results in charges. Learn about the pricing details + per region on Security Center's pricing page: https://aka.ms/pricing-security-center .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-resource-manager\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for servers provides real-time threat protection for server workloads + and generates hardening recommendations as well as alerts about suspicious + activities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_servers_on_machines_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for SQL servers on machines should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-on-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_should_be_enabled_for_unprotected_sql_managed_instances\",\"responsibilityTitle\":\"Azure + Defender for SQL should be enabled for unprotected SQL Managed Instances\",\"responsibilityDescription\":\"Audit + each SQL Managed Instance without advanced data security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_front_door_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Front Door should have Resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Front Door (plus WAF) and stream to a Log Analytics + workspace. Get detailed visibility into inbound web traffic and actions taken + to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-frontdoor-should-enable-resource-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_front_door_standard_or_premium_plus_waf_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Front Door Standard or Premium (Plus WAF) should have resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Front Door Standard or Premium (plus WAF) and stream + to a Log Analytics workspace. Get detailed visibility into inbound web traffic + and actions taken to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-frontdoor-stand-premium-enable-log\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"data_collection_rule_should_collect_system_logs\",\"responsibilityTitle\":\"Data + Collection Rule should collect system logs\",\"responsibilityDescription\":\"This + policy enables you check whether data collection rules collect system logs.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-collection-of-system-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"linux_virtual_machines_should_have_azure_monitor_agent_installed\",\"responsibilityTitle\":\"Linux + virtual machines should have Azure Monitor Agent installed\",\"responsibilityDescription\":\"Linux + virtual machines should be monitored and secured through the deployed Azure + Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest + OS. This policy will audit virtual machines with supported OS images in supported + regions. Learn more: https://aka.ms/AMAOverview + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-monitor-agent-on-linux-virtual-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"microsoft_defender_for_containers_should_be_enabled\",\"responsibilityTitle\":\"Microsoft + Defender for Containers should be enabled\",\"responsibilityDescription\":\"Microsoft + Defender for Containers provides hardening, vulnerability assessment and run-time + protections for your Azure, hybrid, and multi-cloud Kubernetes environments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-containers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_azure_data_lake_store_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Azure Data Lake Store should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-data-lake-store\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_azure_stream_analytics_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Azure Stream Analytics should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-azure-stream-analytics\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_batch_accounts_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Batch accounts should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-batch-accounts\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_data_lake_analytics_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Data Lake Analytics should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-data-lake-analytics\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_event_hub_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Event Hub should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-event-hub\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_iot_hub_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in IoT Hub should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-iot-hub\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Key Vault should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_logic_apps_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Logic Apps should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-logic-apps\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_search_services_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Search services should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-search-services\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_service_bus_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Service Bus should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-service-bus\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"virtual_machines_should_be_associated_with_a_data_collection_rule\",\"responsibilityTitle\":\"Virtual + Machines should be associated with a Data Collection Rule\",\"responsibilityDescription\":\"This + policy enables you check whether virtual machines associated with a Data Collection + Rule.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-associate-virtual-machines-with-data-collection-rule\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"windows_virtual_machines_should_have_azure_monitor_agent_installed\",\"responsibilityTitle\":\"Windows + virtual machines should have Azure Monitor Agent installed\",\"responsibilityDescription\":\"Windows + virtual machines should be monitored and secured through the deployed Azure + Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest + OS. Windows virtual machines with supported OS and in supported regions are + monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-monitor-agent-on-windows-virtual-machines\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_18\",\"controlName\":\"Provide + evidence of 30-day immediate availability and 90-day retention of security + event logs\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that a minimum of 30 days worth of security event logging data is immediately + available, with 90 days of security event logs being retained\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control18\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"log_analytics_workspace_should_be_configured_with_90_days_retention_or_longer\",\"responsibilityTitle\":\"Log + Analytics Workspace should be configured with 90 days retention or longer\",\"responsibilityDescription\":\"For + incident investigation purposes, it is recommend to configure the data retention + of Log Analytics Workspace to at least 90 days.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op18_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-configure-log-analytics-workspace-retention\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_19\",\"controlName\":\"Provide + evidence of periodic log review and investigation of identified security events/anomalies\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evdience that:

\_A) Logs are being reviewed periodically and any potential + security events/anomalies identified during the reveiw process are investiagted + and addressed\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control19\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_19_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that logs are being reviewed periodically and any + potential security events/anomalies identified are investiagted and addressed\",\"responsibilityDescription\":\"Provide + demonstratable evidence that Logs are being reviewed periodically and any + potential security events/anomalies identified during the reveiw process are + investiagted and addressed.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-log-review-and-investigation\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_20\",\"controlName\":\"Provide + evidence of configured alert rules for investigating security events including + privileged accounts, malware, and log tampering\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Alert rules are configured so that alerts are triggered + for investigation for the following \_security events where applicable:

i) + privileged account creation/ modifications
ii) privileged/High risk activities + or operations\_
iii) malware events
iv) event log tampering
v) IDPS + /WAF events (if configured)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control20\",\"controlStatus\":\"PendingApproval\",\"responsibilities\":[{\"responsibilityId\":\"activity_log_alert_should_exist_for_privileged_operations\",\"responsibilityTitle\":\"Activity + log alert should exist for high privileged operations\",\"responsibilityDescription\":\"This + policy audits specific high privileged operations with no activity log alerts + configured.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"account_operation_activity_log_alert_should_exist\",\"responsibilityTitle\":\"Activity + log alert should exist for write or delete Account operations\",\"responsibilityDescription\":\"This + policy audits write or delete Account operations with no activity log alerts + configured.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":null,\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":null,\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"alert_rule_should_set_up_for_diagnostic_logs\",\"responsibilityTitle\":\"Alert + ruleCollections must exist for Log Analytics Workspace Monitoring\",\"responsibilityDescription\":\"Customer + must set up for Log Analytics Workspace Monitoring.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"waf_should_export_logs_to_log_analytic_workspaces\",\"responsibilityTitle\":\"Diagnostic + settings should be set for WAF to export logs to Log Analytics workspace\",\"responsibilityDescription\":\"This + policy audit if the diagnostic settings for WAF to stream resource logs to + a Log Analytics workspace when any WAF which is missing this diagnostic settings + is created or updated.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"log_analytics_workspace_should_have_read_only_lock\",\"responsibilityTitle\":\"Log + Analytics workspace should have read-only lock to block all activities that + could delete data\",\"responsibilityDescription\":\"Set a lock on your Log + Analytics workspace to block all activities that could delete data: purge, + table delete, and table- or workspace-level data retention changes. To learn + more about Log Analytics workspace immutability, visit https://aka.ms/monitor/lock .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Information + Security Risk Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_21\",\"controlName\":\"Provide + evidence that a ratified formal information security risk management policy/process + is documented and established\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that a ratified formal information security risk management policy/process + is documented and established\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control21\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_21_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a ratified formal information security risk management + policy/process is documented and established\",\"responsibilityDescription\":\"A + robust information security risk management process is important to help organizations + manage risks effectively. This will help organizations plan effective mitigations + against threats to the environment. The intent of this control is to confirm + that the organization has a formally ratified information security risk management + policy or process that is comprehensively documented. The policy should outline + how the organization identifies, assesses, and manages information security + risks. It should include roles and responsibilities, methodologies for risk + assessment, criteria for risk acceptance, and procedures for risk mitigation.

Note: + The risk assessment must focus on information-security risks, not just general + business risks.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-information-security-risk-management-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_22\",\"controlName\":\"Provide + evidence of a formal company-wide information security risk assessment is + carried out at least annually or a targeted risk analysis is documented and + performed\",\"controlFullName\":\"\",\"controlDescription\":\"
Provide + evidence that:

A) A formal company-wide information security risk assessment + is carried out at least annually.

\_OR

\_For Targeted Risk Analysis:

\_B) + A targeted risk analysis is documented and performed:

(i) at a minimum + every 12 months for every instance where a traditional control or industry + best practice is not in place\_
(ii) where a design/technological limitation + creates a risk of introducing a vulnerability into the environment/puts users + and data at risk,\_
(iii) upon suspicion or confirmation of compromise\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control22\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_22_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a formal company-wide information security risk + assessment is carried out at least annually or a targeted risk analysis is + documented and performed\",\"responsibilityDescription\":\"Please provide + evidence demonstrating that:

(A) Formal company-wide information security + risk assessment is carried out at least annually.

OR For targeted risk + analysis:

(B) A targeted risk analysis is documented and performed:
+ (i) At a minimum every 12 months for every instance where a traditional control + or industry best practice is not in place.
(ii) Where a design/technological + limitation creates a risk of introducing a vulnerability into the environment/puts + users and data at risk.
(iii) Upon suspicion or confirmation of compromise.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-formal-risk-assessment-occurs-annually\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_23\",\"controlName\":\"Provide + evidence that information security risk assessment includes relevant system + components, matrix, and risk treatment plan\",\"controlFullName\":\"\",\"controlDescription\":\"Validate + that the information security risk assessment includes:

A) System component + or resource affected
B) Threats and vulnerabilities, or equivalent
C) + Impact and likelihood matrices or equivalent
D) The creation of a risk + register / risk treatment plan\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control23\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_23_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the information security risk assessment includes + affected resources, threats and vulnerabilities, impact, and risk treatment + plan\",\"responsibilityDescription\":\"Validate that the information security + risk assessment includes:

(i) System component or resource affected.
+ (ii) Threats and vulnerabilities, or equivale.
(iii) Impact and likelihood + matrices or equivalent.
(iv) The creation of a risk register / risk treatment + plan.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-information-security-risk-assessment\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_24\",\"controlName\":\"Provide + evidence of risk management processes are in place, and ability to identify + changes and risks that could impact your system of internal controls\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) You have risk management processes in place that + assesses and manages risks associated with vendors and business partners
B) + You can identify and assess changes and risks that could impact your system + of internal controls
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control24\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_24_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that risk management processes are in place, and ability + to identify changes and risks that could impact your system of internal controls\",\"responsibilityDescription\":\"Please + provide evidence that:

(i) You (ISV) have risk management processes + in place that assesses and manages risks associated with vendors and business + partners.
(ii) You (ISV) can identify and assess changes and risks that + could impact your system of internal controls.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-risk-management-processes\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Security + Incident Response\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_25\",\"controlName\":\"Provide + evidence of a ratified incident response plan/procedure (IRP) with contact + information, communication plan, and recovery steps\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + your ratified security incident response plan/procedure (IRP) outlining how + your organization responds to incidents, showing how it is maintained, and + that it includes:\_

A) Details of the incident response team including + contact information
B) An internal communication plan during the incident + and external communication to relevant parties such as key stakeholders, payment + brands and acquirers, regulatory bodies (for example 72 hours for GDPR), supervisory + authorities, directors, customers
C) Steps for activities such as incident + classification, containment, mitigation, recovery and returning to normal + business operations depending on the type of incident\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control25\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_25_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that a ratified incident response plan/procedure (IRP) + with contact information, communication plan, and recovery steps\",\"responsibilityDescription\":\"Please + provide your ratified security incident response plan/procedure (IRP) outlining + how your organization responds to incidents, showing how it is maintained, + and that it includes:

(i) Details of the incident response team including + contact information,
(ii) An internal communication plan during the incident + and external communication to relevant parties such as key stakeholders, payment + brands and acquirers, regulatory bodies (for example 72 hours for GDPR), supervisory + authorities, directors, customers,
(iii) Steps for activities such as + incident classification, containment, mitigation, recovery and returning to + normal business operations depending on the type of incident.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-incident-response-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_26\",\"controlName\":\"Provide + evidence of all members of the incident response team have received annual + training that enables them to respond to incidents\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + \ evidence that:

A) All members of the incident response team have + received annual training which enables them to respond to incidents\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control26\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_26_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that all members of the incident response team have + received annual training that enables them to respond to incidents\",\"responsibilityDescription\":\"Please + provide evidence which shows that:

All members of the incident response + team have received annual training that enables them to respond to incidents.

Evidence + should be provided which demonstrates training has been carried out by means + of sharing the training content, and records showing who attended (which should + include all the incident response team). Alternatively, or as well as, records + showing that a tabletop exercise has been carried out. All this must have + been completed within a 12-month period from when the evidence is submitted.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-incident-response-team-annual-training\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_27\",\"controlName\":\"Provide + evidence of reviewing and updating the incident response strategy and documentation + based on the lessons learned from exercise or incident\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The incident response strategy and supporting documentation + is reviewed and updated based on either:

(i) lessons learned from a + table top exercise
(ii) lessons learned from responding to an incident
(iii) + organizational changes\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control27\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_27_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence to show the incident response strategy and supporting + documentation is reviewed and updated based on the lessons learned from exercise + or incident\",\"responsibilityDescription\":\"Please provide evidence that:

The + incident response strategy and supporting documentation is reviewed and updated + based on either:

(i) Lessons learned from a tabletop exercise
+ (ii) Lessons learned from responding to an incident
(iii) Organizational + changes\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-irp-updated-lessons-learned\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Business + Continuity Plan (BCP) and Disaster Recovery Plan\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_28\",\"controlName\":\"Provide + evidence of maintained Business Continuity plan documenting personnel, contingency + requirements, recovery procedures, and system restoration\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists, and is maintained, which outlines + the Business Continuity plan and includes:

i) details of relevant personnel + including their roles and responsibilities\_
ii) business functions with + associated contingency requirements and objectives
iii) system and data + backup procedures, configuration, and schedueling/retention
iv) recovery + priority and timeframe targets
v) a contingency plan detailing actions, + steps, and procedures to be followed to return critical information systems, + business functions and services to operation in the event of an unexpected + and unscheduled interruption
vi) an established process that covers the + eventual full system restoration and return to the original state\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control28\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_28_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that documentaion exists, and is maintained, which + outlines the business continuity plan\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Documentation exists, and is maintained, + which outlines the business continuity plan and includes:
(i) Details + of relevant personnel including their roles and responsibilities
(ii) + Business functions with associated contingency requirements and objectives
+ (iii) System and data backup procedures, configuration, and scheduling/retention
+ (iv) Recovery priority and timeframe targets
(v) A contingency plan detailing + actions, steps, and procedures to be followed to return critical information + systems, business functions and services to operation in the event of an unexpected + and unscheduled interruption
(vi) An established process that covers the + eventual full system restoration and return to the original state\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-business-continuity-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_29\",\"controlName\":\"Provide + evidence of documented Disaster Recovery plan with personnel roles, inventory, + backup procedures, and recovery plan\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists, and is maintained, which outlines + the Disaster Recovery plan and includes at a minimum:

(i) personnel + \ their roles, responsibilities, and escalation process
(ii) inventory + of the information systems used to support critical business functions and + services
(iii) system and data backup procedures and configuration
(iv) + a recovery plan detailing actions and procedures to be followed to restore + critical information systems and data to operation
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control29\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_29_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that documentation exists, and is maintained, which + outlines the disaster recovery plan\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Documentation exists, and is maintained, + which outlines the disaster recovery plan and includes at a minimum:
(i) + Details of relevant personnel including their roles and responsibilities
+ (ii) Business functions with associated contingency requirements and objectives
+ (iii) System and data backup procedures, configuration, and scheduling/retention
+ (iv) Recovery priority and timeframe targets
(v) A contingency plan detailing + actions, steps, and procedures to be followed to return critical information + systems, business functions and services to operation in the event of an unexpected + and unscheduled interruption
(vi) An established process that covers the + eventual full system restoration and return to the original state\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-disaster-recovery-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_30\",\"controlName\":\"Provide + evidence of annual review, personnel training, exercise testing, and documentation + of BCP and DRP\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The Business Continuity plan and the Disaster Recovery + Plan are being reviewed at least every 12 months to ensure that it remains + valid and effective during adverse situations, and is updated based on:

i) + annual reveiw of the plan
ii) all relevant personnel receiving training + on their roles and responsibilitties assigned in the contingency plans
iii) + the plan/s are being tested through business continuity or Disaster Recovery + exercises\_
iv) test results are documented including lessons learned from + the excercise or organizational changes\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control30\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_30_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the business continuity plan and the disaster + recovery plan are being reviewed and updated at least every 12 months to ensure + that it remains valid and effective\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

The business continuity plan and + the disaster recovery plan are being reviewed at least every 12 months to + ensure that it remains valid and effective during adverse situations, and + is updated based on:
(i) Annual review of the plan.
(ii) All relevant + personnel receive training on their roles and responsibilities assigned in + the contingency plans.
(iii) The plan/s are tested through business continuity + or disaster recovery exercises.
(iv) Test results are documented including + lessons learned from exercises or organizational changes.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-bcp-drp-annual-review\",\"justification\":\"\",\"evidenceFiles\":[]}]}]}]},{\"categoryName\":\"Data + Security & Privacy\",\"categoryStatus\":\"Failed\",\"controlFamilies\":[{\"controlFamilyName\":\"Data + in Transit\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_1\",\"controlName\":\"Please + provide evidence demonstrating that your TLS configuration is TLS1.2 or higher + and an inventory of trusted keys and certificates is kept and maintained\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence for all of the following which:

A) Validates that your TLS + Configuration is TLS1.2 or higher within the TLS Profile Configuration Requirements
B) + Shows that an inventory of trusted keys and certificates is kept and maintained
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control1\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"app_service_app_slots_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"App + Service app slots should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_app_slots_should_require_ftps_only\",\"responsibilityTitle\":\"App + Service app slots should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_app_slots_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"App + Service app slots should use the latest TLS version\",\"responsibilityDescription\":\"Periodically, + newer versions are released for TLS either due to security flaws, include + additional functionality, and enhance speed. Upgrade to the latest TLS version + for App Service apps to take advantage of security fixes, if any, and/or new + functionalities of the latest version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"App + Service apps should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_require_ftps_only\",\"responsibilityTitle\":\"App + Service apps should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"App + Service apps should use the latest TLS version\",\"responsibilityDescription\":\"Upgrade + to the latest TLS version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_environment_should_disable_tls_1_dot_0_and_1_dot_1\",\"responsibilityTitle\":\"App + Service Environment should disable TLS 1.0 and 1.1\",\"responsibilityDescription\":\"TLS + 1.0 and 1.1 are out-of-date protocols that do not support modern cryptographic + algorithms. Disabling inbound TLS 1.0 and 1.1 traffic helps secure apps in + an App Service Environment.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-tls-1.0-and-1.1-are-out-of-date-protocols\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"aad_domain_services_managed_domains_should_use_tls_1_dot_2_only_mode\",\"responsibilityTitle\":\"Azure + Active Directory Domain Services managed domains should use TLS 1.2 only mode\",\"responsibilityDescription\":\"Use + TLS 1.2 only mode for your managed domains. By default, Azure AD Domain Services + enables the use of ciphers such as NTLM v1 and TLS v1. These ciphers may be + required for some legacy applications, but are considered weak and can be + disabled if you don't need them. When TLS 1.2 only mode is enabled, any client + making a request that is not using TLS 1.2 will fail. Learn more at https://docs.microsoft.com/azure/active-directory-domain-services/secure-your-domain + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_aad_domains\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"front_door_standard_and_premium_should_be_running_minimun_tls_version_1_dot_2\",\"responsibilityTitle\":\"Azure + Front Door Standard and Premium should be running minimum TLS version of 1.2\",\"responsibilityDescription\":\"Setting + minimal TLS version to 1.2 improves security by ensuring your custom domains + are accessed from clients using TLS 1.2 or newer. Using versions of TLS less + than 1.2 is not recommended since they are weak and do not support modern + cryptographic algorithms.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_front_door\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"sql_database_should_be_running_tls_version_1_dot_2_or_newer\",\"responsibilityTitle\":\"Azure + SQL Database should be running TLS version 1.2 or newer\",\"responsibilityDescription\":\"Setting + TLS version to 1.2 or newer improves security by ensuring your Azure SQL Database + can only be accessed from clients using TLS 1.2 or newer. Using versions of + TLS less than 1.2 is not recommended since they have well documented security + vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_sql_database\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"synapse_workspace_sql_server_should_be_running_tls_version_1_dot_2_or_newer\",\"responsibilityTitle\":\"Azure + Synapse Workspace SQL Server should be running TLS version 1.2 or newer\",\"responsibilityDescription\":\"Setting + TLS version to 1.2 or newer improves security by ensuring your Azure Synapse + workspace SQL server can only be accessed from clients using TLS 1.2 or newer. + Using versions of TLS less than 1.2 is not recommended since they have well + documented security vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_synapse_sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_apps_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"Container + Apps should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks. Disabling 'allowInsecure' will result + in the automatic redirection of requests from HTTP to HTTPS connections for + container apps.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-use-container-apps-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"enforce_ssl_connection_should_be_enabled_for_mysql_database_servers\",\"responsibilityTitle\":\"Enforce + SSL connection should be enabled for MySQL database servers\",\"responsibilityDescription\":\"Azure + Database for MySQL supports connecting your Azure Database for MySQL server + to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections + between your database server and your client applications helps protect against + 'man in the middle' attacks by encrypting the data stream between the server + and your application. This configuration enforces that SSL is always enabled + for accessing your database server.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enforcing-my_sql_ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"enforce_ssl_connection_should_be_enabled_for_postgresql_database_servers\",\"responsibilityTitle\":\"Enforce + SSL connection should be enabled for PostgreSQL database servers\",\"responsibilityDescription\":\"Azure + Database for PostgreSQL supports connecting your Azure Database for PostgreSQL + server to client applications using Secure Sockets Layer (SSL). Enforcing + SSL connections between your database server and your client applications + helps protect against 'man in the middle' attacks by encrypting the data stream + between the server and your application. This configuration enforces that + SSL is always enabled for accessing your database server.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enforcing-postgresql-ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ftps_only_should_be_required_in_your_function_app\",\"responsibilityTitle\":\"FTPS + only should be required in your Function App\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-app-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"Function + App should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_only_accessible_over_https\",\"responsibilityTitle\":\"Function + app slots should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-slots-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_require_ftps_only\",\"responsibilityTitle\":\"Function + app slots should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-app-slots-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"Function + app slots should use the latest TLS version\",\"responsibilityDescription\":\"Periodically, + newer versions are released for TLS either due to security flaws, include + additional functionality, and enhance speed. Upgrade to the latest TLS version + for Function apps to take advantage of security fixes, if any, and/or new + functionalities of the latest version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-slot-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"hdinsight_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"HDInsight + should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your HSInsight cluster is public facing, then TLS latest version should be + used to secure your cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure-your-hdinsight-cluster\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"iot_hub_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Iot + Hub should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your Iot Hub is public facing, then TLS latest version should be used to secure + your resource.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-if-your-iot-hub-is-public-facing-then-use-tls-latest-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"kubernetes_clusters_should_be_accessible_only_over_https\",\"responsibilityTitle\":\"Kubernetes + clusters should be accessible only over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures authentication and protects data in transit from network + layer eavesdropping attacks. This capability is currently generally available + for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc + enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-use-of-k8s-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"latest_tls_version_should_be_used_in_your_function_app\",\"responsibilityTitle\":\"Latest + TLS version should be used in your Function App\",\"responsibilityDescription\":\"Upgrade + to the latest TLS version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mariadb_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"MariaDB + should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your MariaDB is public facing, then TLS latest version should be used to secure + your DB.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure-your-db-with-tls-latest-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"only_secure_connections_to_your_azure_cache_for_redis_should_be_enabled\",\"responsibilityTitle\":\"Only + secure connections to your Azure Cache for Redis should be enabled\",\"responsibilityDescription\":\"Audit + enabling of only connections via SSL to Azure Cache for Redis. Use of secure + connections ensures authentication between the server and the service and + protects data in transit from network layer attacks such as man-in-the-middle, + eavesdropping, and session-hijacking.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-audit-enabling-of-ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_cache_for_redis_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible cache for Redis should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"This + policy enables you to check if the Redis instance's TLS version is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-check-redis-instance-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_mysql_database_should_enable_ssl_enforcement_and_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible MySQL Database should enable SSL enforcement and should have the + minimal TLS version of 1.2\",\"responsibilityDescription\":\"This policy enables + you to check if the MySQL instance's sslEnforcement enabled and TLS version + is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-this-policy-enables-you-to-check-if-the-mysql-instance-ssl-enforcement-enabled\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_postgresql_server_should_enable_ssl_enforcement_and_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible PostgreSQL server should enable SSL enforcement and should have + the minimal TLS version of 1.2\",\"responsibilityDescription\":\"This policy + enables you to check if the PostgreSQL instance's sslEnforcement enabled and + TLS version is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-check-postgresql-instance-ssl-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"secure_transfer_to_storage_accounts_should_be_enabled\",\"responsibilityTitle\":\"Secure + transfer to storage accounts should be enabled\",\"responsibilityDescription\":\"Audit + requirement of Secure transfer in your storage account. Secure transfer is + an option that forces your storage account to accept requests only from secure + connections (HTTPS). Use of HTTPS ensures authentication between the server + and the service and protects data in transit from network layer attacks such + as man-in-the-middle, eavesdropping, and session-hijacking.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-audit-requirement-of-secure-transfer\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"sql_managed_instance_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"SQL + Managed Instance should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"Setting + minimal TLS version to 1.2 improves security by ensuring your SQL Managed + Instance can only be accessed from clients using TLS 1.2. Using versions of + TLS less than 1.2 is not recommended since they have well documented security + vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-setting-minimal-tls-version-for-sql-managed-instance\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ssl_policy_of_application_gateway_listener_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"SSL + Policy of Application gateway listener should have the minimal TLS version + of 1.2\",\"responsibilityDescription\":\"This policy enables you to check + if the TLS version of the listener's SSL policy is the latest, designed for + the application gateway.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-this-policy-enables-you-to-check-if-the-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_have_the_specified_minimum_tls_version\",\"responsibilityTitle\":\"Storage + accounts should have the specified minimum TLS version\",\"responsibilityDescription\":\"Configure + a minimum TLS version for secure communication between the client application + and the storage account. To minimize security risk, the recommended minimum + TLS version is the latest released version, which is currently TLS 1.2.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-configure-minimum-tls-version-for-storage-accounts\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"tls_protocol_1_dot_2_must_be_used_for_arc_sql_managed_instances\",\"responsibilityTitle\":\"TLS + protocol 1.2 must be used for Arc SQL managed instances\",\"responsibilityDescription\":\"As + a part of network settings, Microsoft recommends allowing only TLS 1.2 for + TLS protocols in SQL Servers. Learn more on network settings for SQL Server + at https://aka.ms/TlsSettingsSQLServer + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_arc_sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"windows_web_servers_should_be_configured_to_use_secure_communication_protocols\",\"responsibilityTitle\":\"Windows + web servers should be configured to use secure communication protocols\",\"responsibilityDescription\":\"To + protect the privacy of information communicated over the Internet, your web + servers should use the latest version of the industry-standard cryptographic + protocol, Transport Layer Security (TLS). TLS secures communications over + a network by using security certificates to encrypt a connection between machines.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-the-privacy\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_2\",\"controlName\":\"Provide + evidence demonstrating TLS compression is disabled for public web services + to avoid CRIME, and TLS HSTS is enabled for 180-days site-wide\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence for all of the following which:

A) Shows TLS compression is + diasbled for all public facing services handling web requests to prevent Compression + Ratio Info-leak Made Easy (CRIME)
B) Validates that TLS HSTS is enabled + and configured to 180-days across all sites\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control2\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"validate-that-TLS-compression-is-disabled\",\"responsibilityTitle\":\"Provide + demonstrable evidence that TLS compression is disabled across all public-facing + services that handle web requests\",\"responsibilityDescription\":\"There + is a specific TLS vulnerability, CRIME (CVE-2012-4929), which affects TLS Compression. For this + reason, industry recommendations are to turn this functionality off. ACAT + will leverage the python module sslyze(https://pypi.org/project/sslyze/) to check the TLS compression + status.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"validate-that-TLS-compression-is-disabled\",\"recommendationShortName\":\"hostname + is missing\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds2_1\",\"recommendationSolutionContent\":\"1.Go + to the ACAT portal and click your report.

2. Click 'Edit Microsoft + 365 Certification configuration' under Settings on the top menues of the report + detail page.

3. Input your public facing service's hostname and save.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-disable-tls-compression\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"validate-that-HSTS-header-is-configured-and-greater-than-180-days\",\"responsibilityTitle\":\"Validate + that TLS HSTS is enabled and configured to >= 15552000 across all sites\",\"responsibilityDescription\":\"HTTP + Strict Transport Security (HSTS) is a security mechanism designed to protect + websites against man-in-the-middle attacks by forcing TLS connections by way + of an HTTPS response header field named \\\"Strict-Transport-Security\\\". + ACAT will call the hostname which ISVs provide to check the response headers + whether enable the HSTS header correctly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"validate-that-HSTS-header-is-configured-and-greater-than-180-days\",\"recommendationShortName\":\"hostname + is missing\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds2_1\",\"recommendationSolutionContent\":\"1.Go + to the ACAT portal and click your report.

2. Click 'Edit Microsoft + 365 Certification configuration' under Settings on the top menues of the report + detail page.

3. Input your public facing service's hostname and save.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-tls-hsts\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + At Rest\",\"controlFamilyStatus\":\"Passed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_3\",\"controlName\":\"Provide + evidence that data at rest is encrypted in line with the encryption profile + requirements, using encryption algorithms such as AES, Blowfish, TDES and + encryption key sizes of 128-bit, and 256-bit\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that data at rest is encrypted in line with the encryption profile + requirements, using encryption algorithms such as Advanced Encryption Standard + (AES), Blowfish, Triple Data Encryption Standard (TDES) and encryption key + sizes of 128-bit, and 256-bit\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control3\",\"controlStatus\":\"Passed\",\"responsibilities\":[{\"responsibilityId\":\"automation_account_variables_should_be_encrypted\",\"responsibilityTitle\":\"Automation + account variables should be encrypted\",\"responsibilityDescription\":\"It + is important to enable encryption of Automation account variable assets when + storing sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-encrypt-automation-account-variables\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_hdinsight_cluster_should_enable_double_encryption\",\"responsibilityTitle\":\"Azure + HDInsight clusters should use encryption at host to encrypt data at rest\",\"responsibilityDescription\":\"Enabling + encryption at host helps protect and safeguard your data to meet your organizational + security and compliance commitments. When you enable encryption at host, data + stored on the VM host is encrypted at rest and flows encrypted to the Storage + service.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-hdinsight-cluster-encryption-data-at-rest\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_synapse_analytics_dedicated_sql_pools_should_enable_encryption\",\"responsibilityTitle\":\"Azure + Synapse Analytics dedicated SQL pools should enable encryption\",\"responsibilityDescription\":\"Enable + transparent data encryption for Azure Synapse Analytics dedicated SQL pools + to protect data-at-rest and meet compliance requirements. Please note that + enabling transparent data encryption for the pool may impact query performance. + More details can refer to https://go.microsoft.com/fwlink/?linkid=2147714 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-synapse-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"disk_encryption_should_be_enabled_on_azure_data_explorer\",\"responsibilityTitle\":\"Disk + encryption should be enabled on Azure Data Explorer\",\"responsibilityDescription\":\"Enabling + disk encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-disk-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"double_encryption_should_be_enabled_on_azure_data_explorer\",\"responsibilityTitle\":\"Double + encryption should be enabled on Azure Data Explorer\",\"responsibilityDescription\":\"Enabling + double encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments. When double encryption has been enabled, + data in the storage account is encrypted twice, once at the service level + and once at the infrastructure level, using two different encryption algorithms + and two different keys.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-data-explorer-double-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"eventhub_namespace_should_enable_double_encryption\",\"responsibilityTitle\":\"Event + Hub namespaces should have double encryption enabled\",\"responsibilityDescription\":\"Enabling + double encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments. When double encryption has been enabled, + data in the storage account is encrypted twice, once at the service level + and once at the infrastructure level, using two different encryption algorithms + and two different keys.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-synapse-enable-custom-key-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"most_storages_in_azure_are_encrypted_by_default_with_microsoft_managed_keys_encryption\",\"responsibilityTitle\":\"Most + storages in Azure are encrypted by default with Microsoft-managed keys encryption\",\"responsibilityDescription\":\"Azure + Database for MySQL, Azure PostgreSQL, SQL Database, Azure SQL Managed Instance, + SQL Server, Azure Cosmos DB, Event Hubs, SQL managed instances, Storage account, + Azure Synapse Analytics, Azure Batch accounts, Azure Kubernetes Service (AKS), + Virtual Machines, Azure Container registries, Azure HPC Cache, etc., are encrypted + by default with Microsoft-managed keys encryption. More resource types can + refer to this doc.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.287Z\",\"recommendationIds\":[\"ds3_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-encryption-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"queue_storage_should_use_customer_managed_key_for_encryption\",\"responsibilityTitle\":\"Queue + Storage should use customer-managed key for encryption\",\"responsibilityDescription\":\"Secure + your queue storage with greater flexibility using customer-managed keys. When + you specify a customer-managed key, that key is used to protect and control + access to the key that encrypts your data. Using customer-managed keys provides + additional capabilities to control rotation of the key encryption key or cryptographically + erase data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-queue-storage-customer-key-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"require_encryption_on_data_lake_store_accounts\",\"responsibilityTitle\":\"Require + encryption on Data Lake Store accounts\",\"responsibilityDescription\":\"This + policy ensures encryption is enabled on all Data Lake Store accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-datalake-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_account_encryption_scopes_should_use_double_encryption_for_data_at_rest\",\"responsibilityTitle\":\"Storage + account encryption scopes should use double encryption for data at rest\",\"responsibilityDescription\":\"Enable + infrastructure encryption for encryption at rest of your storage account encryption + scopes for added security. Infrastructure encryption ensures that your data + is encrypted twice.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-account-scope-double-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"transparent_data_encryption_on_sql_databases_should_be_enabled\",\"responsibilityTitle\":\"Transparent + Data Encryption on SQL databases should be enabled\",\"responsibilityDescription\":\"Transparent + data encryption should be enabled to protect data-at-rest and meet compliance + requirements.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + Retention, Back-up and Disposal\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_4\",\"controlName\":\"Provide + evidence of documented, approved data retention period\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + proof that an approved data retention period is formally established and documented\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control4\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_4_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that an approved and documented data retention period + is formally established\",\"responsibilityDescription\":\"Please provide proof + that an approved data retention period is formally established and documented.

Supply + the full data retention policy which clearly details how long data (must cover + all data types) should be kept for so the business can perform its business + functions.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-establish-retention-policy\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_5\",\"controlName\":\"Provide + evidence for data retention within controlled retention period as per control + 4\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence that + data is retained only for the defined\_retention period as discussed in control + 4\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control5\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_5_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that retained data matches defined retention period\",\"responsibilityDescription\":\"Provide + screenshot evidence (or via screenshare) showing that stored data (in all + the various data locations, i.e., databases, file shares, archives, etc.) + does not exceed the defined data retention policy. Examples could be screenshots + of:

(i) Database records with a date field, searched in oldest record + order, and/or
(ii) File storage locations showing timestamps that are within + the retention period Note: Any personal/sensitive customer data should be + redacted within the screenshot.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-validate-retention-periods\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_6\",\"controlName\":\"Provide + evidence of secure data deletion processes after retention period\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that processes are in place to securely delete data after its retention + period\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control6\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_6_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that processes are in place to securely delete data + after its retention period\",\"responsibilityDescription\":\"If the deletion + process is done programmatically, then provide a screenshot of the script + that is used to perform this. If it is executed on a schedule, provide a screenshot + showing the schedule. For example, a script to delete files within a file + share may be configured as a CRON job, screenshot the CRON job showing the + schedule and the script which is executed; and provide the script showing + the command used.\",\"responsibilityType\":\"ScopedManual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-data-deletion\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_database_retention_period_meet_retention_policy\",\"responsibilityTitle\":\"Provide + demonstrable evidence that the retention policy of your Azure resources meet + your data deletion tetention period\",\"responsibilityDescription\":\"Most + Azure databses (i.e., CosmosDB, Azure SQL Database, MySQL Database, etc.) + have default retention period for the backup data and it can also be configured. + The retention period of Azure backup data should also be considered in your + defined data retention policy. Please provide screenshot showing the backup + retention period of your Azure database services (i.e., databases, file shares, + archives, etc.)\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"azure_database_retention_period_meet_retention_policy\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds6_1\",\"recommendationSolutionContent\":\"
ACAT + can collect your backup policies from Azure Backup Center.
To collect backup + policy from Azure Backup Center:
1. Create Recovery Service Vault or Backup + Vault in the Azure Backup Center
2. Set backup policies in the related + vaults
3. Please make sure to include the backup resources and its backup + vaults to the report resources. You can modify the report resources by clicking + 'Settings' > 'Edit resources' to update ACAT report resources.

Once + you've included your backup resources to the ACAT report, click 'Collect evidence + by ACAT' button to collect evidence. ACAT will summarize your backup policies + into a csv file. Then, you can view ACAT evidence in the 'ACAT collected evidence' + below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_7\",\"controlName\":\"Provide + evidence of automated backup system, backup testing, and access controls for + backup data\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) An automated backup system is in place and configured to perform + backups at scheduled times

B) Backup information is tested in line + with the backup scheduling procedure and restored periodically to confirm + the reliability and integrity of the data

C) Appropriate access controls + and protection mechanisms (i.e immunable backups) are implemented to ensure + backups / system snapshots are secured against unauthorized access and to + ensure the confidentiality, integrity, and availability of the backup data\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control7\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_7_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that appropriate access controls and protection mechanisms + are implemented to ensure backups are secured against unauthorized access\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Appropriate access controls and + protection mechanisms (i.e., immutable backups) are implemented to ensure + backups/ system snapshots are secured against unauthorized access and to ensure + the confidentiality, integrity, and availability of the backup data.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-database-for-mysql-flexible-server-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + Database for MySQL Flexible Server instance should be configured to backup + automatically\",\"responsibilityDescription\":\"By default, Azure Database + for MySQL flexible server enables automated backups of your entire server + (encompassing all databases created) with a default 7-day retention period. + You can also trigger a manual backup using On-Demand backup feature.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-database-for-postgresql-flexible-server-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + Database for PostgreSQL Flexible Server instance should be configured to backup + automatically\",\"responsibilityDescription\":\"Azure Database for PostgreSQL + flexible server automatically performs regular backups of your server. You + can then do a point-in-time recovery (PITR) within a retention period that + you specify.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-sql-database-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + SQL Database should be configured to backup automatically\",\"responsibilityDescription\":\"Azure + SQL Database comes with a core resiliency and reliability promise that protects + it against software or hardware failures. Database backups are automated to + protect your data from corruption or accidental deletion.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cosmos-db-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Cosmos + DB should be configured to backup automatically\",\"responsibilityDescription\":\"Azure + Cosmos DB automatically takes backups your data at regular intervals. The + automatic backups are taken without affecting the performance or availability + of the database operations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmosdb-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-backup-system-in-place-and-test-inline\",\"responsibilityTitle\":\"Provide + demonstrable evidence that automated backup system is in place and backup + infromation is tested in line with backup scheduling\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

(i) An automated backup system + is in place and configured to perform backups at scheduled times.
(ii) + Backup information is tested in line with the backup scheduling procedure + and restored periodically to confirm the reliability and integrity of the + data.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"azure-backup-system-in-place-and-test-inline\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"
ACAT + can collection backup policy from Azure Backup Center(If applicable) to help + you demonstrate that an automated backup system is in place and configured + to perform backups at scheduled times.

To collect backup policy from + Azure Backup Center:
Please make sure to include the backup resources and + its backup vaults from Azure Backup Center to the report resources. You can + modify the report resources by clicking 'Settings' > 'Edit resources' to update + ACAT report resources.

Once you've included your backup resources to + the ACAT report, click 'Collect evidence by ACAT' button to collect evidence. + ACAT will summarize your backup data retention period into a csv file. Then, + you can view ACAT evidence in the 'ACAT collected evidence' below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + Access Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_8\",\"controlName\":\"Provide + evidence that individuals with access to data/keys are approved & configured + based on job\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) A list of users with access to data and/or encryption keys + is maintained including the business justification for each person
B) This + list of users was formally approved based on access privileges required for + their job function
C) Users are configured with the privileges outlined + in the approval\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control8\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_8_1_manual_cr\",\"responsibilityTitle\":\"Provide + a list of all individuals with access to data or encryption keys, including + the business justification\",\"responsibilityDescription\":\"Provide evidence + to demonstrate that a list of individuals with access to data and/or encryption + keys is maintained including the business justification for each individual.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-access-list\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Data_Security_Privacy_8_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the individuals with access to data or encryption + keys were formally approved and outlined with documentation\",\"responsibilityDescription\":\"Provide + evidence to demonstrate that a list of individuals with access to data and/or + encryption keys:

(i) Were formally approved based on access privileges + required for their job function.
(ii) Are configured with the privileges + outlined in the approval.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-approval-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_9\",\"controlName\":\"Provide + evidence of maintaining third-party list and having data sharing agreements + with them\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) A list of all third-parties that data is shared with is maintained.
B) + Data sharing agreements are in place with all third-parties consuming data
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control9\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_9_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a list of all third parties that data is shared + with is maintained and data sharing agreements are in place with all third-parties + consuming data\",\"responsibilityDescription\":\"Provide evidence that:

(i) + A list of all third parties that data is shared with is maintained.
(ii) + Data sharing agreements are in place with all third-parties consuming data.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-list-third-parties\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Privacy\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_10\",\"controlName\":\"Provide + evidence of established PIM system with leadership commitment, roles and responsibilities + defined\",\"controlFullName\":\"\",\"controlDescription\":\"Does your organization + have a Privacy Information Management (PIM) system established, implemented + and maintained that:

A) Holds leadership commitment by way of a policy + or other form of documentation/computerised system for how your privacy information + management efforts are maintained for system confidentiality and integrity
B) + Determines roles, responsibilities and authorities of each person maintaining + the system, including PII Processors and Controllers\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control10\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_10_manual_cr\",\"responsibilityTitle\":\"Provide + evidence demonstrating that your organization have a Privacy Information Management + (PIM) system established, implemented, and maintained\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that your organization have a Privacy Information + Management (PIM) system established, implemented, and maintained that:

(i) + Holds leadership commitment by way of a policy or other form of documentation/computerized + system for how your privacy information management efforts are maintained + for system confidentiality and integrity.
(ii) Determines roles, responsibilities + and authorities of each person maintaining the system, including PII Processors + and Controllers.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-sar-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_11\",\"controlName\":\"Provide + evidence for following PII security processes: minimize, deidentify, control + transmission & record transfer\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence of processes to show that:

i) PII minimization is taking place

ii) + PII de-identification and deletion is being done at the end of the processing + period

iii) Controls are in place for PII transmission including any + confidentiality

iv) Record of transfer of PII from one country/region + to another exists with expressed consent to do so\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control11\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_11_manual_cr\",\"responsibilityTitle\":\"Provide + evidence demonstrating that PII minimization is taking place, PII de-identification + and deletion is being done, and controls & record are in place for PII transmission\",\"responsibilityDescription\":\"Provide + evidence of processes to show that:

(i) PII minimization is taking + place.
(ii) PII de-identification and deletion is being done at the end + of the processing period.
(iii) Controls are in place for PII transmission + including any confidentiality.
(iv) Record of transfer of PII from one + country/region to another exists with expressed consent to do so.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-privacy-notice\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"GDPR\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_12\",\"controlName\":\"Provide + evidence of SARs ability, identifying data and retention period for backups\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

(i) Data subjects are able to raise SARs
(ii) That + you (the ISV) are able to identify all locations of data subjects' data when + responding to a SARs request.
(iii)That there is a retention period for + backups which allows clients requesting removal of data via SAR's to be removed + as rolling backups over a period are removed (lifecycle of oldest back up + deletions/rewritten over)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control12\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_12_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that data subjects are able to raise SARs and you (the + ISV) are able to identify all locations of data subjects' data when responding + to a SARs request\",\"responsibilityDescription\":\"Provide evidence demonstrating + that:

(i) Data subjects are able to raise SARs.
(ii) Validate + that you (the ISV) are able to identify all locations of data subjects' data + when responding to a SARs request.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-sars-ability-identifying-data\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Data_Security_Privacy_12_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that there is a retention period for backups which allows + clients requesting removal of data via SARs to be removed as rolling backups + over a period are removed\",\"responsibilityDescription\":\"Provide evidence + demonstrating that:

That there is a retention period for backups which + allows clients requesting removal of data via SARs to be removed as rolling + backups over a period are removed (lifecycle of oldest back up deletions/rewritten + over).\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"Data_Security_Privacy_12_2_manual_cr\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds12_1\",\"recommendationSolutionContent\":\"
ACAT + can collect your resource backup data retention period from Azure Backup Center + (If applicable).
To collect backup data retention period from Azure Backup + Center:
Please make sure to include the backup resources and its backup + vaults from Azure Backup Center to the report resources. You can modify the + report resources by clicking 'Settings' > 'Edit resources' to update ACAT + report resources.

ACAT can also collect your backup data retention + period from Azure Cosmos DB, Azure SQL Database, Azure Database for PostgreSQL, + Azure Database for MySQL (If applicable).
To collect backup data retention + period from the above Azure resources, please make sure to include the backup + resources to the report resources. You can modify the report resources by + clicking 'Settings' > 'Edit resources' to update ACAT report resources.

Once + you've included your backup resources to the ACAT report, click 'Collect evidence + by ACAT' button to collect evidence. ACAT will summarize your backup data + retention period into a csv file. Then, you can view ACAT evidence in the + 'ACAT collected evidence' below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sars-ability-identifying-data\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_13\",\"controlName\":\"Provide + evidence of a privacy notice with essential information, including entities, + data types, and data subject rights\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + the privacy notice which should contain all the required elements as follows:

A) + Attributes details (Name, Address, and other personal identifiable information)
B) + Details of the type of personal data being processed
C) Details how long + personal data will be kept for.
D) Details of the lawfulness of processing + personal data.
E) Details of:
- Data subject's rights
- + Right to be informed
- Right of access by the data subject
- Right + to erasure
- Right to restriction of processing
- Right to data + portability
- Right to object
- Rights in relation to automated + decision-making including profiling\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control13\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_13_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that a privacy notice with essential information, including + details of personal data types, and data subject rights are provided\",\"responsibilityDescription\":\"Please + provide the privacy notice which should contain all the required elements + as follows:

(i) Entities details (Name, Address, etc.)
(ii) Details + of the type of personal data being processed.
(iii) Details how long personal + data will be kept for.
(iv) Details of the lawfulness of processing personal + data.
(v) Details of data subject's rights:
- Right to be informed
+ \ - Right of access by the data subject
- Right to erasure
- + Right to restriction of processing
- Right to data portability
- + Right to object
- Rights in relation to automated decision-making, including + profiling\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-privacy-notice-essential-information\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"HIPAA\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_14\",\"controlName\":\"Provide + evidence of HIPAA policy existence, ePHI confidentiality, integrity, availability + assurance, and security protection\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) A policy exists for HIPAA and HIPAA handling within + your organization for staff, contractors, vendors, etc.
B) Your organization + ensures confidentiality, integrity, and availability of ePHI that it creates, + receives, maintains, or transmits
C) Your organization ensures protection + against any reasonably anticipated threats and hazards to the security or + integrity
of ePHI\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control14\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_14_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that HIPAA policy existence, ePHI confidentiality, integrity, + availability assurance, and security protection are provided\",\"responsibilityDescription\":\"Please + provide demonstratable evidence that:

(i) A policy exists for HIPAA + and HIPAA handling within your organization for staff, contractors etc.
(ii) + ISV is ensuring the confidentiality, integrity, and availability of ePHI that + it creates, receives, maintains, or transmits.
(iii) Protect against any + reasonably anticipated threats and hazards to the security or integrity of + ePHI.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-hipaa-policy-existence\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_15\",\"controlName\":\"Provide + evidence that you protect private information, ensure staff follows security + rules, and backup data\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that you:

A) Provide protection against reasonably anticipated + uses or disclosures of such information that are not permitted by the privacy + rule
B) Ensure compliance with the security rule by its workforce
C) + Provide Data backup and Disaster recovery plan under 164.308 (a)(7)(ii)(A) + and 164.308 (a)(7)(ii)(B)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control15\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_15_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that you protect private information, ensure staff follows + security rules, and data backup and disaster recovery plan are in place\",\"responsibilityDescription\":\"Please + provide evidence that you (ISV):

(i) Protects against reasonably anticipated + uses or disclosures of such information that are not permitted by the Privacy + Rule; and
(ii) Ensure compliance with the Security Rule by its workforce.
(iii) + Data backup and Disaster recovery plan under 164..308 (a)(7)(ii)(A) and 164.308 + (a)(7)(ii)(B).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-protect-private-information\",\"justification\":\"\",\"evidenceFiles\":[]}]}]}]}]}]}}],\"nextLink\":\"https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots?%24skipToken=1&%24top=1&api-version=2024-06-27\"}" + headers: + cache-control: + - no-store, no-cache + content-length: + - '240069' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:22:12 GMT + mise-correlation-id: + - f2146994-db99-4c1a-ab23-14af8057b791 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062212Z-168779fcbd6qs8vkuq1cxhprz000000003mg00000000df1d + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 5283cb047f8fa90d7f9aa979f85bb37e + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 583A1B8EC1EE4E0DB8988F4F510D11E9 Ref B: TYO201151005054 Ref C: 2024-06-18T06:22:12Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"downloadType": "CompliancePdfReport"}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report download + Connection: + - keep-alive + Content-Length: + - '39' + Content-Type: + - application/json + ParameterSetName: + - --report-name --download-type + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: POST + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots/crstatustest-prod-20240617200351-20240617T230307-487Z/download?api-version=2024-06-27 + response: + body: + string: '{"compliancePdfReport":{"sasUri":"https://acatprodadls-gjhyfcgnenfdhsg3.z01.azurefd.net/report/crstatustest-prod-20240617200351-20240617T230307-487Z_2024-06-27.pdf?skoid=f7cca650-916d-40c2-9d2c-9e72fa7509b4&sktid=33e01921-4d64-4f8c-a055-5bdaffd5e33d&skt=2024-06-13T07%3A34%3A09Z&ske=2024-06-20T07%3A34%3A09Z&sks=b&skv=2021-08-06&sv=2021-08-06&st=2024-06-18T06%3A22%3A13Z&se=2024-06-18T06%3A32%3A13Z&sr=b&sp=r&sig=lsyA3iFIYgSNgx1msPGYFFG3M6Ppm0ZbvQB6IfLp7P0%3D"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '462' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:22:13 GMT + mise-correlation-id: + - 1da1d517-c4d3-4e61-bd9a-b95d8bb4398a + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062213Z-r15f4699bb7l9ftj5vm5cew1q4000000051g00000000enbq + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 4d1a836c38c94ec6c1f656d3d610d54c + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: 2BE646F1EE0C47C6B59EA64E7A079746 Ref B: TYO201100115033 Ref C: 2024-06-18T06:22:13Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Connection: + - close + Host: + - acatprodadls-gjhyfcgnenfdhsg3.z01.azurefd.net + User-Agent: + - Python-urllib/3.11 + method: GET + uri: https://acatprodadls-gjhyfcgnenfdhsg3.z01.azurefd.net/report/crstatustest-prod-20240617200351-20240617T230307-487Z_2024-06-27.pdf?skoid=f7cca650-916d-40c2-9d2c-9e72fa7509b4&sktid=33e01921-4d64-4f8c-a055-5bdaffd5e33d&skt=2024-06-13T07%3A34%3A09Z&ske=2024-06-20T07%3A34%3A09Z&sks=b&skv=2021-08-06&sv=2021-08-06&st=2024-06-18T06%3A22%3A13Z&se=2024-06-18T06%3A32%3A13Z&sr=b&sp=r&sig=lsyA3iFIYgSNgx1msPGYFFG3M6Ppm0ZbvQB6IfLp7P0%3D + response: + body: + string: !!binary | + JVBERi0xLjQKJdP0zOEKMSAwIG9iago8PAovQ3JlYXRpb25EYXRlKEQ6MjAyNDA2MTgwNDM1NDEr + MDAnMDAnKQovQ3JlYXRvcihlbXBpcmEgTWlncmFEb2MgMS41MC41MTQ3IFwod3d3Lm1pZ3JhZG9j + LmNvbVwpKQovUHJvZHVjZXIoUERGc2hhcnAgMS41MC41MTQ3LWdkaSBcKHd3dy5wZGZzaGFycC5j + b21cKSkKPj4KZW5kb2JqCjIgMCBvYmoKPDwKL1R5cGUvQ2F0YWxvZwovUGFnZXMgMyAwIFIKL091 + dGxpbmVzIDE1IDAgUgovUGFnZU1vZGUvVXNlT3V0bGluZXMKPj4KZW5kb2JqCjMgMCBvYmoKPDwK + L1R5cGUvUGFnZXMKL0NvdW50IDIxCi9LaWRzWzQgMCBSIDEzIDAgUiA0MyAwIFIgNTcgMCBSIDU5 + IDAgUiA2MSAwIFIgNjMgMCBSIDY1IDAgUiA2NyAwIFIgNjkgMCBSIDcxIDAgUiA3MyAwIFIgNzUg + MCBSIDc3IDAgUiA3OSAwIFIgODEgMCBSIDgzIDAgUiA4NSAwIFIgODcgMCBSIDg5IDAgUiA5MSAw + IFJdCj4+CmVuZG9iago0IDAgb2JqCjw8Ci9UeXBlL1BhZ2UKL01lZGlhQm94WzAgMCA1OTUuMjc2 + IDg0MS44OV0KL1BhcmVudCAzIDAgUgovQ29udGVudHMgNSAwIFIKL1Jlc291cmNlcwo8PAovUHJv + Y1NldCBbL1BERi9UZXh0L0ltYWdlQi9JbWFnZUMvSW1hZ2VJXQovRXh0R1N0YXRlCjw8Ci9HUzAg + NiAwIFIKL0dTMSA4IDAgUgo+PgovWE9iamVjdAo8PAovSTAgNyAwIFIKPj4KL0ZvbnQKPDwKL0Yw + IDEwIDAgUgovRjEgMTIgMCBSCj4+Cj4+Ci9Hcm91cAo8PAovQ1MvRGV2aWNlUkdCCi9TL1RyYW5z + cGFyZW5jeQo+Pgo+PgplbmRvYmoKNSAwIG9iago8PAovTGVuZ3RoIDM0NQovRmlsdGVyL0ZsYXRl + RGVjb2RlCj4+CnN0cmVhbQp4nD1Sy07DMBC8+yt8BIls16+Nww0KVFTqAZob4hDlUVJRR02C+H38 + SNDGUjSzM7tj+cquDHmo8cQ2uyPy08Su3BQGcosUGasloFbK/2YIwijD6wvfvCJ/GtibNxAeD5/g + Crky6Gn2WHo4lPdF0Jb/+jl7f87s4xN5s7DvuzBVhKmSl2NqLWu2eUEuNS87rxCigJwC3vCbQ1+P + wzR08y0vz0ygBaK4WiAVmQhrC0rZBdy249x3fV3N/eCSSiNIJfKloR7cPA7fkbISVIGrtJqmdpou + rZunyGYqL4Ckt85kDoK0iG3dMEZaESiUq7h1p961baIwhkvJfG4KybK1PzPhgqmIsv2Pa5NbAX5R + WtyEvYuoJCCbmwWVKHVKjICqEAuM+T2qe7SRIoJc0urzcEg2FrQ2671tv3pXJR8CuZof58o11dgk + lwKU/c9W9pe05HPpX0CoP2Eehw8KZW5kc3RyZWFtCmVuZG9iago2IDAgb2JqCjw8Ci9UeXBlL0V4 + dEdTdGF0ZQovY2EgMQo+PgplbmRvYmoKNyAwIG9iago8PAovVHlwZS9YT2JqZWN0Ci9TdWJ0eXBl + L0ltYWdlCi9MZW5ndGggMTA4Mjk2Ci9GaWx0ZXIvRmxhdGVEZWNvZGUKL1dpZHRoIDIzODMKL0hl + aWdodCAzMzY4Ci9CaXRzUGVyQ29tcG9uZW50IDgKL0NvbG9yU3BhY2UvRGV2aWNlUkdCCi9JbnRl + cnBvbGF0ZSB0cnVlCj4+CnN0cmVhbQp4nOzd25ckVYE/+v+lEv3N/Dz+hpG5OFZnVUODQquAAwrj + qNXV1dXcLyOgCGoLiA20CCINAoJO04CooIDogIoDzd0bCq6zfr/fOeusOQ9nLfVhnId5mKc6kaSm + SVXmjnvsiMxPrM8DVGdmXHbkzh3xjb33wjs+AgAAUKXFld7ynoXte4GR3vb13uJK/K8nAAAAAABA + gKQPpuhtX1+Q9wEAAAAAAC0m6YOAwRdE3gcAAAAAALTT0lr0MAVaTt4HAAAAAAC0UK+/O3qMAt2w + tBb9CwsAAAAAAPAn/dX4AQp0iLwPAAAAAABoh97iSvzoBDqnvxr9ywsAAAAAAMy7xZXe9vX4uQl0 + UM/kfQAAAAAAQESLK73lPdETE+ioQVAu7wMAAAAAAGJZWosel0CnDeJyeR8AAAAAANC8/mr0oARm + wdJa/K8zAAAAAAAwT3rbdsWPSGBm9Fejf6kBAAAAAIB5sbgymGssej4CM6RnME8AAAAAAKARg1nG + YicjMGN6y+sm7wMAAAAAAGq3tBY9FoHZZPI+AAAAAACgTqbqg3qZvA8AAAAAAKiJqfqgfibvAwAA + AAAA6mCqPmiAyfsAAAAAAIDq9VejhyAwL0zeBwAAAAAAVGcwrmD0+APmyWB+zNhffAAAAAAAYDYY + wBMaNpgf02CeAAAAAABAab3+7ujBB8wjg3kCAAAAAADlGMATIjKYJwAAAAAAUIYBPCEig3kCAAAA + AACFGcAT4jOYJwAAAAAAUIABPKEdDOYJAAAAAADkZQBPaInessE8AQAAAACAPPqr0QMO4E8M5gkA + AAAAAGS0uNLbvh4/3QDG9HTuAwAAAAAAslhai55rAJsMRtaNXjkAAAAAAADt1tu2K3qoAUzWX41e + RQAAAAAAAG026D0UPdEAJhmMr2swTwAAAAAAYJr+avQ4Awjo9XfHrygAAAAAAIAWWlzpLa9HzzKA + FDr3AQAAAAAAWwx6DEVPMYBUS2vRqwsAAAAAAKBdFlcG04FFTzGADHrbdsWvNAAAAAAAgPZYWoue + XwAZ9Zb3xK80AAAAAACAllhciR5eALno3AcAAAAAAPyBbn3QNTr3AQAAAAAAA7r1QUf1V+NXIAAA + AAAAQFSD/kHRMwsgv97yevQKBAAAAAAAiGgw7VfswAIoTuc+AAAAAACYY7r1Qafp3AcAAAAAAPPL + bH0wA3TuAwAAAACA+bS0Fj+nAMrRuQ8AAAAAAOaRbn0wKwaTb0avUgAAAAAAgCbp1gezYjD5ZvQq + BQAAAAAAaIxufTBbdO4DAAAAAID50evvjp5NAFVaWotesQAAAAAAAM3obV+Pn00A1VpciV63AAAA + AAAAteuvxk8lgMrp3AcAAAAAAHOgt7wnfioBVG3QY1fnPgAAAAAAmGm9bbuiRxJAXfqr0SsZAAAA + AACgRktr8fMIoB6DfrvRKxkAAAAAAKAmiyvRwwigVj0jeQIAAAAAwKzqr0ZPIoB6La3Fr2oAAAAA + AIAa9JbX4ycRQJ1629cXdO4DAAAAAICZ09u2K3oMATShvxq9wgEAAAAAACq2tBY/gwDq11veE7/C + AQAAAAAAKrS4MhjcL3YGATTESJ4AAAAAADBL+qvx0wegMUtr8asdAAAAAACgKsbwhHnSW16PX+0A + AAAAAACVWFyJHj0ADesZyRMAAAAAAGaDMTxhDhnJEwAAAAAAZkJveU/83AFolpE8AQAAAABgFhjD + E+aVkTwBAAAAAKDzjOEJc8tIngAAAAAA0HVLa/ETByAGI3kCAAAAAEC3GcMT5puRPAEAAAAAoMOM + 4QnzrdffHb8iAgAAAAAAijGGJ8y33vKe+BURAAAAAABQSG/7evSsAYjMSJ4AAAAAANBBPRP2AYn+ + avTqCAAAAAAAyGswV1f0lAGIbmktenUEAAAAAADkNZirK3rKAMQ2GM43dnUEAAAAAADkYwxP4I96 + pu0DAAAAAIBO6W3bFT1fANrCtH0AAAAAANAtS2vx8wWgHQaD+kavlAAAAAAAgMxM2Ae8QexKCQAA + AAAAyMqEfcAbDYb2jV41AQAAAAAAGZiwD9jMtH0AAAAAANARvf7u+MkC0CpLa9GrJgAAAAAAIAsT + 9gGb9LavR6+aAAAAAACATGLHCkAbLa7Er50AAAAAAICg3uJK/EwBaJ/BbJ6xKygAAAAAACBFfzV6 + pgC0kWn7AAAAAACg/ZbW4mcKQPsMZvOMXkEBAAAAAABBg/v5sTMFoIV629ejV1AAAAAAAECK2IEC + 0F6LK/HrKAAAAAAAYIre4kr8NAFoq962XdGrKQAAAAAAYJrBnfzYaQLQWr3+7ujVFAAAAAAAMM3g + Tn7sNAFor6W16NUUAAAAAAAw1dJa/DQBaKve8p741RQAAAAAADDF4E5+7DQBaLXY1RQAAAAAADBV + 9BwBaLfe4kr8mgoAAAAAANhqcSV6jgC0XG/brviVFQAAAAAAsMXgHn7sHAFouV5/d/TKCgAAAAAA + mKC/Gj1HAFpO2AcAAAAAAO00uIcfO0cAWq63vCd6ZQUAAAAAAEywtBY9RwBaTtgHAAAAAADtNLiH + HztHADogdmUFAAAAAABs1du+Hj9EANovdmUFAAAAAABMED1BALqgt21X/PoKAAAAAAAYt7gSPUEA + OkHYBwAAAAAAbTO4ex87QQC6ob8avcoCAAAAAADGCfuAjHr93dGrLAAAAAAA4A36q9ETBKAThH0A + AAAAANA2g7v3sRMEoBuW1qJXWQAAAAAAwDhhH5BRb3lP9CoLAAAAAAB4g6W16AkC0AnCPgAAAAAA + aJvB3fvYCQLQCcI+AAAAAABoG2EfkFFv+3r0KgsAAAAAABgn7ANyiF1lAQAAAAAA44R9QA6xqywA + AAAAAGCcsA/IIXaVBQAAAAAAvEH07ADokOhVFgAAAAAAMC56dgB0SPQqCwAAAAAAGBc9OwA6ZHEl + fq0FAAAAAACMRM8OgO7obdsVv9YCAAAAAABGYmcHQIcI+wAAAAAAoF1iZwdAhwj7AAAAAACgXWJn + B0CHCPsAAAAAAKBdYmcHQIcI+wAAAAAAoF1iZwdAhwj7AAAAAACgXWJnB0CHCPsAAAAAAKBdYmcH + QJcsrsSvtQAAAAAAgJHo2QHQIdGrLAAAAAAAYFz07ADokOhVFgAAAAAAMKa3vB4/PgC6InaVBQAA + QER/dcpliWNXrnvn+k1bDf81+kYCAMyb3vKe+PEB0BWxqywAAACa9FenXPbO9ZtO/8R9qzf+6zl3 + v5ZR8uLkLckbj955YfRdAACYecI+IIfYVRYAAAANePvpV5760bv3Hnw5e8A3TfIhyUclHxh9pwAA + ZpWwD8iot309epUFAABAfd5ywjnvPu9gJRnfxO5+71y/6c3La9F3EwBgxgj7gIwG1UXsKgsAAIA6 + vOWEc0796N11ZHxbJSsS+QEAVGlpLXqCAHSCsA8AAGD2vHl5rbGYb3xsT738AACq0uvvjp4gAJ0g + 7AMAAJgxx65cV9OgnRkH9vyrUy6LfhAAALpO2AdkteSRSwAAgBnx5uW1M/c9HCvmG/fu8w7q4gcA + UEp/NX6CAHTB4NmA6FUWAAAApf3VKZdF7NC31Yc/9/23nHBO9MMCANBRvW27oicIQCcI+wAAAGZA + /4NXRU/3ttp78OWjd14Y/eAAAHSRsA/Iqr8avcoCAACgjFM/enf0XC+g/8Groh8iAIDuWVyJnyAA + XTB4NiB6lQUAAEBRp3z07rO/8mrLbZP3AQAUEDtBADpB2AcAANBdJ3/07rO+8monyPsAAPLqbV+P + HiIAHRC7sgIAAKCYnecdjB7h5WL+PgCAXHrLe+KHCED7xa6sAAAAKKD/D1eddder3bL2pZf+/IRz + oh86AICuEPYBqQYVRezKCgAAgLyO3nlh9OSumH+89nvRjx4AQFf0+ruj5whAywn7AAAAOufNy2sf + OfDjvXf+qqNOOvdg9GMIANAJwj4g3dJa9MoKAACAXE4692D0wK6kY065LPphBABov962XfFzBKDd + Bk8FxK6sAAAAyO6YUy5bv+NXXffhAz+OfiQBANqvt7gSPUcAWm7wVEDsygoAAIDsPnzgx9Gjukqc + sOcL0Q8mAEAHxM4RgJYbPBUQvaYCAAAgm+P3fGHPHb+cDau3vHjUsqklAABS9Jb3RI8SgFaLXU0B + AACQ0VHLa7u++OLal39ZuYu/9sxN371t3Gcfuq+OFW1yvM59AABphH1AwKCKiF1NAQAAkNGgW9+X + f1m5c+56+dFXdn7vtaVN7j1ycfJPdaxxZNcXde4DAEjR6++OniYArSXsAwAA6JB/vP6p3V/+ZeX2 + PfjQ1qRv6I4ffLaONY5b/sj+6AcWAKDV+qvR0wSgtQbPA0SvpgAAAMhg8cyr1m5/pQ5f/sE1j7/W + n+iRV046+66Xalrv0Ieu/1H0YwsA0Ga9xZXoaQLQWr1tu6JXUwAAAGRxyscO7779lTp84ydnfPfV + /jTXfOu+mtY78hcnXRj98AIAtFrsNAForcHzANHrKAAAACY5anntmJMv3bH2hVMuu/eMqx/ffdsr + dbjwnqcDSV/irqeuqGnVI+8659boRxsAoM0Gc3LFDhSACh1z4vlX7rtz/4HDG29cXvv1vyV/P2P1 + qhyfFruCAso7eseey688eO3+ezbXCa/9P8nfT//QldG3EACAXP7s+HOWPrL/tCu/tXrbKw3Y/+27 + H3u1H7b3zpdq3YYPXmckTyCO5Np5Y/oSfm9y0T3+9uTC/KTTLom+R8DMWlqLnk3kdeW+O1/79b+N + 6sn9Bw6/+8wrom8Vc278nJzw09/INpyxetVjj7+wkbZk/LTBkwDRKyi20FAku9M/dOUjjz6TXifE + 3k4AADL6m9OuOOWye1cP/qJJdz11RWrYt//hr9S9GW81kictk1yMJ1foiSNHXpl4qfWb3/z78AWJ + 6FtLYcXCvuT0mPbG8y8+EH2ngNnUX42ekmT37jOvmBapXHTpLdE3j3kWPew7ePvDG9mWrJ+5tBa/ + gmKMhiK5fOnWb2StE2JvakDq5fPwX/s7z6t1M4a9IxPJ1frWbUi2zfU7AFC3vzvzqn/Y/6NdB39R + 3vodL37ygW8dePTgV5+++Kpv3hd+8T/985MP/2Lno68uhd37/Hol2xaw9OH90UuhVlvH4ti6PPLo + M9G3k9M/dGWWwtq6DAdXqfvihcoVC/vC7/LYNuPU/1Slt21X9JSkqjxF/77sNppaDt7+cPSdbUbE + sO+YE89/9rlXsxdK1k/ur0avoOoTbnRtWo7eUaqTY9KYz76uwJiKGopklJyx06KxiUv0Dd6qwOXz + 8MK58i05/+IDuQ5mlm1I9m6jikW8CABz4m0nX3rm/h+u3PqLSuz58ov3Pr/nkV/1Rx54+YzPfONw + 8vcsLw649YlrAutNVnHDI7de+/BXPn7vY8W2/KQL74peFrXKeJVa8vqUMnbtvSbXzYSJi5kUOqdA + 2JecKuHT4NChx6PvF+2h/qdKsVOSjHafe334hD98/5PRN7IrNppahH3DpdZV50r6sm9Mb3Elfu1U + m1zt85J31LOMozhapjX7NRTJLlc4tdG+sC97n8StS/LVruraudiFfJbqIvXrXOG6AIBOO2p57b2X + 3ltVzBcO7x76+Uk3PHLrKPK7+GtP3vrENRljvpHkw5M3blpj8rEPvHxG9lhwmtOv+m70EqlP9ufB + NAKjOOm0S/JeZ01bhH2dUyDsS33qOzmdou8XLaH+p1qDmbliByVZXLnvzvAJ/+xzr0bfyK7YaGoR + 9g2X+tab+r0otjG97evRq6Za5bqHX6anfH/neblKZ1qzX0ORjHL1JB0u0bd5kzJh33Ap3wA+dOjx + +lZ9/sUHNqpYtPMBYLb99d9f8Y83PveRW39eoUPP7fnOr/phdz99UZaXBdz0+Oc/du+jiesfufVb + P9858TVf+pdrCmx/9EKpT/Y2sEu/5hW4yAoswr7OEfZRq/ms//s7z0u+Jo88+oyZiaq3tBYrH1k+ + 9ZIr99352OMvZJlxT9hXoY2mFmHfcKlppceceP5vf/f7vIWS5ZMHzwBEr5rqlLfDTuFB9fNeFAj7 + KOPoHXsmTioXXrJ/fjONsfJh30aJICzZxzKP7GZZb1X3CoR9ADDDjl27sdqYL7Hn9hfLRHiVu+nx + z+fdhf9x0oXRi6YOeZvxJnFoUuHnAKctwr7OqWMYz+SyN/p+0QbzVv8nX41Nt0SEfZVrftq+3ede + vym5yxL2pQ7jOT+5UnkbTS0HhX2vLzWttEC3vowb0+vvjl411Spv2Ff4pnre1KDwMJ4aiiwUTZFS + P7bhxlglYd9GoTZwf+d5JefgEPYBACW9aXntvZcc+vCXfl65yw49+u1fLbVK3l1428mXRi+gOuQd + +UE7sDG5ZuXIuAj7OqdA2LeQdjvoJJE9r5uH+v/oHXuSzZ724ISwr3qLKw1EIceceP6V++48fP+T + E4s1S9i3kDY32bvPvCJu3NMhG00twr7hUtNKU2frS75xZ6xeNXr9sCNtlk8ePAMQvWqqU977+cX6 + zeUdw3Mj2OzXUCRVaricNK7Gz7FhN72JHxWxMVZV2Jd3AN5kl8tPw5Gl4X3t/nsq2cHL3eQBgJnz + puW10z/z3TqSvsSnH7z327/st8pF9zwh7FvI33csuZ6Nvs3zoI6kb0PY10HFwr7AoDHSDUbmof4P + P/Ds61CH3vJ63VFIuAtSxrBv+dRLpqUbGT+BoY2mFmHfcIlSjvsPHC7+4bErpboV6LxTYCTPAv13 + As1+DUVShc+ua/ffk/2jIjbGqgr7NnKG4JWMz5MlgKtqB4V9ADBj3rS8dtq+xz50y89qsvu2F77x + s50P/7LfHpceejTXLmzffWP0Yqrc0Tv2FGgKetqzblU9obd1EfZ1TrGwbyi5aht/e3Je+fIyMif1 + v7Avgvqn7ask7Bt91Hiwsv/AYX368tpoahH2DZc61rh86iWBNf72d78/5sTzi33yzE/Yt1Ao7Ctw + X71AL6HUZr+GItOEe5L+5jf/njQjs39aG8K+5BuUbMbWr15yzid/zDKsffZ8M+PQGcl6d+29ZvyN + wy6Qo1sBWSqKqmb9EPYBwCypO+kb+tTX733ol/2WePBnO/Nu/wc+98P3XHJo++4b//K9s9PFL9Dw + DrQbcz3IR16p82hsbZlPbJwnVxnJ3zfdGRD2dU6ZsA8C5qT+F/ZF0F+tOwqpMOyjGUmhBIos42iQ + 86P5sO+M1asCazx8/5OFP3nmJ+xbmN5U+81v/n1agpB3JM+TTpucxoZbiZr9FJacPIFTK2ko5vq0 + iI2xpOGarD1LNJmammUcyTPLjNgZJ+PLcmSmDQe0KUYEAObKieff+Y+3/KwBh188o0xCd/hnS1/7 + 6fJQ8t9lPupz3/5SmR35hwPPJgftr//+iuhlV1LgGdFAmzxpvkbf8lmV5epguCRX9xmvjIaPCA7f + 5aq/c4R91GRO6n9hXwT1T9sn7OscYV8ubQv7yvSpnPkJ+xamN9WSvwfig1x96Kb9loUHA9Hsp7Bw + 2PelW7+R69O60hgLX3ZlHM0+vLPJh1Tbf3baNvv6A8Dc2r77xg9+8WfNuPKBe7/1Sj+X+3++dPDF + 7Z995riPPbVjq+Tvyb8++It+3o89644fV7JHp1/7g+QAvml5LXo5FjDtGdGN1x83Dfyr1mN9Mo66 + X2ycjWv336PgOkfYRx3mp/6/XNgXw2DgvjqjEGFf5wj7cpmZsK+3fT16ddSAQM++wG9Qrsb8xFUk + nx++cDhds5+i5jPsS83pUj8h/OBu8k8F5usMm1b/GJIXAObTX7730saSvqF7X/xA5pivf+DZYy97 + akcWySuzR343fe/qanfqzAPPdnFGv0BrdjhQW6ClmreFTxbhyRFGi0E55oqwjzrMT/1/ubAvipqn + 7RP2dY6wL5eZCfsGVUH06qh+gaZaYHD+7CN5TnsC59Chx4V91GQ+w77wXmcJ+8J7WsdV/LR1VZ4q + AgDtN5iq77M/+Icv/rRJVzxw7zdf6ae69YXtl/1oRy6feGrHl19azvLh//S1R+rYteRgdms6v8CV + 6fDaMDDyTN5ZuQsYn5x6tCRXFhlH3e/ceheydetrOOkbDgGamHi2JGdIxtkEykt2fOvk6VunNc9b + pvVtcFUnUtywb3QCTKwNHnn0mWZOgIkHczgHRyWfP5zgclqNNyy1Yl+9aV+f4Xcn4l24ltf/Far7 + /pJKcqLetl3HnHj+lfvuTBy+/8mtR+axx19I/qlwKtfOsG+0yxOTmuQ4lNnlvMdn/4HDmzYg+Uvy + 9yhHZqH+sC/Kwa9vpbMT9vVXW1VVbprMOu/EedMEflKTHQ8c2Ixdb6aN1RlougyX5psZ9TWoqirK + hk/FQCs62YDhvxY+ILXuy3yGfeEnb7PM2RcYJD/jlH95TVtd9IMJADRvx94v/cPNP23YP33tkdQw + btChL2fSN5K8N/Xza93B5KhGL9ksAg340ZRMgYdRN/KnTtkzi/DlwHBJLjEyPq4Wa715ZZmtb9jj + phnTrhwDRybXaCHZyyU508IvHo46OG0vUrc84wVm+0/g8u8a34WMI8qOluTkzB4AVXswy9zHCN8l + 27Qk39CMJ3lSuBkP4HCMr2LbX1jD9X9SQIGPSt39vLebHnn0mY1yS8YSUUlO+8C8tcf+A4ePOfH8 + cGTw2OMvbJRbtuZcFeYp0+KeacvB2x9+95lX1BH9hGPQ4RIlDK0v7Kv74Le8xAtLNmmj9JK+osWV + llSVST05sZldya9qYBuS9kDg5n/Ghn1gmL7wT14g7Kv2WbJKGlR1F2Xdp2KZA7KR8yqvjn3J+9s9 + cRl9WmONsWqFW7+pZdT8MPiBdLL5owcAxPXWEy888+afNu+ye7/xjVf6Adc8fVzhpG+U94VXUfc+ + nvrpR9s/i1+gPT9qx4YfRk0uYXKtMcsVXLLGwBXxpiW50MvSZo613rzCFxcbmecEL+/8iw+kxo7T + luSsyJj4ZLyiz37hualQwndXNi1ZHk9t8wlc1buS7Z/29HjGPcqYAWU8mNlvFOR9wDj1/ti0JUvq + kSU92bQkB6TJmTUarv9nL+xTSW5Vsvb47e9+v/vc6wORQWvDvosuvSXZ+GKbdPj+J1NTzuybmnxU + 9qNUvKNWUXWEfc0c/NaWeEkNhH0XXfrFllSVgZ+hSn5Vw2FfoG7M0raf9iM4fG/0sK/CBlV9RdnM + r/bo1zBvzDdcMjZl69sXYd/C9F60wyX1MidwCVBVP+JNpoV9jd03AADa470ff/DMm37avFue/MSD + v+hPc8OR4y794Y7ybn7u2MBaLrv3G3Xv5geuP/LWEy+MXsoBgcuE8XZs+Gql2tEIk0/L9Yzi1q1t + 1XrzSr0wbGCEk1zxyrSlwgwr78aM4pLkP/JeCKc+q9naE7jCd2WcNTK8ZDlRsxzM7DHEcMn+RHSB + MC7j3pX8BjU2SG/D9f8shX0qyWkqqT0CPc5aGPblCtemLb/93e/PWL2qfPSTbMyzz72aa9X7Dxyu + JDPKnpEFNiZv2NfkwW9niZdXa9hXybGqqqoM97Wp5Fc1HPaFf8VSH/WZlj4M6+S4YV+1Dao6irLJ + X+3hFha4FhguWR6qqXVfhH3hEyxLfBa4eKlpd8IPAwAA8+Po9156xk0/bd767T968BfbprnjpeVK + kr6hu19emrair73w/gZ29v0tzvsCnchGY7gNVTjAfuoVXN57+6MlfJkca715he+7biqXOvR3nlf4 + +nTrknpRnFouBR6LHV7XFAvdNtp6InUu7NuoIsEs9lB0llsxJW9lBCq9Sr5BDUyv03z9PzNhn0oy + UFlVVXtM69/XtrBv+dRLco3iGF5S05/UTZ04MWL59VaowrCv4YPfzhIvr76wr9pjVb6qDP8oVPLD + Gg77wi9IfVRp2gXCsEIONz5rDfsqb1BVXpQN/2qXXF047GtgX+Y87Js2POxoydLuDbx9/JgnpTlx + JscC05FPayTXND8gANBa7/nYg2fc9JPmHXj86mm97e7/ef/yH+2oMOy78qkdgc59n3rwrgb2t7V5 + X+AO4abB2cIjueVqRoavUMo8Ghp+dC3WenNJvU2ad5TCvArf+w0sZTKswuWSXIgVy4k20kYmbOcJ + XO27qrpdn6w93O0rvHnhbCiwpNZIZYYZHG3btG9Q4bR3fPnNb/69pllBR5qv/2cj7FNJbgQrycpq + j1//28RxDlsV9iVbWGGWMVzCE7qFVxfO0QJLmZny8qoq7Gv+4LewxNsc9tVxrMpUleFfkI36w77h + Hf5AjR1+nG/a9o+GBEzd/WLHLXWX62hQVVuUzf9qF/5tHS6Ba71m9mU+w75de6/JMgFiluHrwx0D + h1dGGYe9zb7veS+aklJOPryBZwsBgCa95cQLP3DTTxr2oS89G0j6Ejc/e+xlP9xR2Nd/ee3//t1P + kgbMd3598+iPB1/YHljj1Q/d0sCOn379kaNaNn9f+P7t1i454RZp9vvSlV+kjC+BZ+1irTeX1An7 + 6h7fr+T16cQlnPjUVC6Fp7EYLs1v8HApfAJX+66qbtdvpF2lhjevTCEGaqQygexomVZSFX6D8k6H + mkuU+n82wj6V5HCZtsEV1h5bU7m2hX3FutGFl2kpZ5ZNLTyFXLIsn3pJt8K+5g9+C0u8zWFfLceq + RFWZWnVX8tuaGvaFU4DAjfdp+cvodypK2FdTg6raomz4Vzs1i0xdAmFfM/sy82Ff4U3K+HhboLk7 + zPRzfXGOHHklSzO78Jcx2aQosyICAHU4/rw73/+FnzRj7bYfffLBu+54Zu3rv+iHffyHOy75QUEP + /PLaUbvlV//fU6O/f/rHx6Wu96Z/uTzZwrPu/H59B+G9n3w0eqGPCz9cuvUSJtyGzN5KrDUrCfSN + irXeqgpluFQ7ZOgmhTtSpS6B69Zay6XwEghV23kCV/uurbfrpz3/mfoQbHga+voOZmAAxpIZx3CZ + GPalhvXJ0Rg/tVKPXn0P3Eap/2cg7FNJjpZpleTE2uMTnzy4dbjCK/fdGQ4ynn3u1TaHfYW70aUu + B29/uFj0U2aZGK22NuyLcvBbWOKtDfvqO1b1VZWV/Lamhn0LwfE2AyN5hsfwXIgR9tXXoKqwKJv/ + 1Q53dRwGK5uym2GfslGQN+2TG9sXYd/EpZI5wZNzu0Aql7wrNe8rmbwnZ2ZjM4YDAPU57bpn6s74 + zrrz+9d+54Z7nv/AAz/vZ3H7i9srSfqS5f/99/9z/F//+adLGbch2dobvnv1x+87VMcBOXb9lujl + PhJo6E7sURJ+XD98S39cxiu45APH2/ZH79iT/G+Wi8pp17Ox1ptL6mA44UERy0g+OctuJheA43s6 + PD5Zju20i5Qs7930zGFyMZJrpMTkfB7dDEk2I8s1bOCCrp0ncLGtnfau0Zc9OXRZLv3CV82BhDrj + wUyKY3TmJ5+WpQSn3SrJeAcj2fGt9xaSv4y+oRPDvvDuTNyk8LCf9Q3bG6X+bzjs21p8gbdn6Z2t + khxfplWS02qP3vKeiUFDOLxLHVbxyn13Bt5+0aW3ZAk7CuQpx5x4fpZudAdvf3g85UzelRpxDpdp + /ewyhn37DxwedRZLjmGWNCeQN1WrfNgX5eC3s8TrKKBk+8M7WFUBRakqA0slv61Zwr4CI3lOe5Ro + /Me3+bCvvgZVVUUZ5Vc78OObZYT24ZFpTwtkoXTra+sOBj6tqqFywvKGfck+5nratpK0dNOS2tIu + P6DuRuPTIwIA1TrmfZ84/caXa3XDd6/OmK+NHDhy7KU/2FHAA69cu6mtkvxl/AW3PLc978Yk21/H + YfmL914avfQX0u7cTmtph28eZmwGZ7nimHYXMct8WNPeG2u9uaReHdR3SqQ+L5ocwEARpw4sM+1i + MLVcpj3NmPFW9sTLltSdDYzT0s4TuNjWTntXcsDHb/6nCt+CCFw5ph7M5GMnbkbq86sTL4qzDDCY + FH2WWzFbK8nwSVVsjrOJnezKi1X/dz3sU0mOL9Mqyam1R3+1QC6Q2t0sVtiX2nEp+cxAUpk6wuG0 + SCU1NkoO5sT1hg/UxpR+lHUoH/ZFOfjtLPE6Cqh82Jd+rCJVlaO1b6r0hp2qSv6wpm7DKIIJ/wRP + fMIqdQzPhcbDvlobVFUVZZRf7UB7ONcc95vEaoEszHfYV6zIyndmnLiE28lVJYzyPgDorh3n3lFr + 0nfWHd+7/+f9vK768XGXPHl8Xg/8YkvS94trN71m/9PHFtieOo7MKVc9Gb30F9Ja2tNuL1cyklvq + FVw4NUt9snHak2+x1ptLuKFe1WChE4VvC2d5GDX1E4qVy7RL14z3GaZtbfhCrMx4sFFO4GJbW+H5 + E7iNUKabZOD2VLgEJ55vqU+9lrkPU2ZWu8DRq2NQnVj1f9fDPpXk+JL792hxpUAOsv/A4XCsECvs + e/a5VwNv+e3vfp86BV7qJxTY1GTZOlzqSLgT5bQ1Vq582Bfl4LezxOsooPJhX3hPI1aVG3X2l0/d + hvH2TKB23bqFgXbj+JFsOOyrtUFVVVFG+dUOv77wE1yxWiAL79Czb0KsXO3nZ18CpVzhfI7G8wSA + jjr5qidO+/zL9TnvK9++7+f9vC7/wY6PPnH8yG0vXPDtV2++8cjq+B83uf/nm5O+5C9bX/aZp44r + sD01HZxtuz4f/QQIXEYFrs7C08pnvPUXvoLL8iGpnXomXknFWm8u4bAvcCFWUrLl4V3Lco2TemN5 + 4rVDuFzCz1qn9lsJ3NwIT68WONTtPIGLbW2Fp1Dgtk+gEMuUfuoEeVvfUl9eH/4Glcmh6njCNlb9 + 3+mwTyW5aSnwezRtJM/9Bw5PW8vh+58MxwpRwr5jTjw/fFSzzH+3fOol4Q/Zfe71eTc1fLiSDwyv + sY7kaKuSYV+Ug9/aEq+jgEqGfanHKlZVuZFWW1YiY9iXayTPLGN4LjQe9tX6AGQlRRnrVzt8ZJJW + VoGrxYgtkAVh39hS1YPNwyW5dBp/WCvLgKuBDagwYaz16WIAoCb/7fiza036hmHf4Z/38/qnfzl+ + 5H/99uVhe+M//+s/Pv/M6vg/jdy3JelL/jLxlft+dFyB7anp4Lxv/zNHLa9FPAHC92zD7dhwKzTL + SG7hT8jSik695Jm4GbHWm0usYTxTb+pmvDIN31ieeJDD5RJ+tjD8XHH4VkPqNW+3TuBiW1vytEku + yZP9HZ94ZeJSeEzUcOmnHsZNrw/Xexvlpt0Mf4NSH5ENvL3ym5MR6/9Oh30qya1L7tNvbCTPiy69 + 5cp9dyYCSd9GhugnStgXTs1++7vfj+bLCwt3gJqYH4U3dWJalD2FqSM52qpk2Bfl4Le2xOsooJJh + X/hYRawqN9K62FciY9gXbsBsqtWnddjZdBCaDPtqbVBVVZSxfrWzDKCdvCvX2RixBbIg7HvjkqXL + apawb+J3JHW6h0AMl2um5tSlmYIAACr0tvd94u8//1Ktzr2rSNh38feOH/mfv3l51N74z//6jwNP + r47/a+K+n312U7Mk+cum14x8+odFwr76js/bP3htxBMgfPcvfL0Qfm+WeevKx4ULhW5+xlpvLqlh + X013KsJXXtnjhvDpMfF6sEy5hDc79fIzeKQLxmexTuBiK8p+hiT7Ncz1ClwgFw77Us/28Ns3VWXh + pKnkU+jhUzF1RwI3UioZH3hcxPq/02GfSnLrknGXx2qPIxs5l3aGfeGVpvZGHAkHnRNTlfCmpo4k + GX57xsSqpJJhX5SD39oSr6OASoZ94WMVsapsoFvfQuawbyE45t743mUcw3Oh2bCv1gZVVUUZ61c7 + dYDT8QOVbGSWnC5iC2RB2LdlSc37UsO+wG6mPmc1rdU3bGgF2tJJOWa/jqv86gMAqNu2lQMNhH33 + /qyf10WPHz/y0Cs3jTc5Bnnfj1dH/3r4J5uTvuQv42/f5FNPHldge+o7Pu/9zBMRT4DAACOpTbtw + gz/LuF6BBnD2YcHCLdWJTehY680l9QqxplH0wyFj9oEEw4+eTrw4ypXXbFIyO6g8Pot1Am/UFvYl + 3/fsdy2mLYXDvtTNCz/Fuuk+WPkHFQp/g8oslY+lE7H+73TYp5LcuqSWV/nao51h38HbHw68PsuI + jkPhPlAT971k9BPuWZaaFVaiZNgX5eB3t8QLKBn2hY9VxKqyjjGxc23DprgtsIPjHbWm1eFbj0CT + YV+tDaqqijLWr3aW2XI3LYcOPR7uCxmxBbIwi2HfRMMHkzK258MnefjyJLWxHd6G8oco2dMs3QDL + z04CADTpxEsfeN+Bl2p1zl0PH/rZUl6ffOK4Cx87fuSF//s7402O//yv/7jhqdXk7/e+vDnpS/4y + /satkk8usD21HqK3ve8TUUo/daKrkktqGhW4gst+W7tAMzjWenNJnc2tppsVVYWY4evBice5zM3k + toV9sU7gjRrCvv7O86qa6r2+sC983m4K+2r98lY4U8ampdqwL2793+mwTyWZfdUV1h7tDPuSrSq/ + 0tRUJdmqyqOf8JZ3IuyLcvC7W+IFlAz7wscqYlVZfqT9LLKHfYEuextjP6YZx/BcaDbsq/tqqJKi + jPirXexBlyNHXplWTBH3ZWFuwr68JRgYtSNcXqlNr3BbvXyYPpSa99X0gDEAUJMGwr7ErT/e/c8/ + 6+dy1Q+OvfDR48dtzfsef/WOTU2Re1++ZtO7trruqWPzbszH77+z1uNz3Dl3RCn9qm7BTVtS2/yv + CfumS70VX9OoGuGrkuxTb5wu7ItxAm9UHfaddNolgXtQeZeWhH1VneQFtqTMUm3YF7f+n+GwTyU5 + Um3t0cWw74zVq1ob/cx82FfTwe9uiRdQa9gXsapsppdK9rBvIdgUHP2iTatOt+5Ok2FfrQ2qqooy + 4q/2Qolm4cTf5bj7ModhX+pebwRDt3BjO7W8wnNi5j3g06R2QW2mNzQAUJWTr336fTe8VLczvvDM + x+6748YnL/jaT/sZ3fj09gseOX6T5/+v7wTaIYdeumbrW7b64pHtGbfhSz/enWz2h2/5Qd3HJymF + 5os+/BxpJUvqLOGVZCXhVnR9YV+B9eYtoNQjXMfDye5jZ191C0/gjUrDvmrv1W8I+8otFYZ90et/ + Yd/CrFeSldcewr5qox9hX7GD/5iw749Ld8O+qn5JC9eZW/c9PJJn4AUFRjGdpbAv44fEDcgWSjxe + tTVFEvZFEd7UwPO34Y6BqRN5h+8GVDj9aPgUraoLIQDQjFNueKlJH/jCM+ff8/XPPnLV7c9+IBy0 + 3fHi0vnfOX6r5//35Lzv0IvXTHz9Jhc9cnxqxnfLHzO+Jo/Mfz/xwoaLPnzfr6olPOxDJVlJ+Kpn + 4gbEWm9eqaNqVPVEX/b9qmp8mAJ3J8qcz20O+6o9gTcqDfuyzOOw8fqdqNFc8EPTXtmJsG8ehvGM + Xv+fbxjPWa8kM9Yev/3d76/cd+e4aa98bI6H8axjBrfHDONZ6OB3t8QL6MQwnpVXlVXJFfYtBGfR + Pem0S6ZFBgUeCWsy7Kt7GM+MHxLxV3v8vRl/Fjctm5pScfdlbsO+1Edwpz3eFt7H1LAvUaCYCghv + Zx03HACA+px6w4ux7L7t8duOfOCrP12a5pPfP+68h47f6rn/9e1NLZB/fv7qia/cat8TxwXW+Pkn + LvjQLT+IcjT+9oPXNlz09d2RHl/Cj5xVkpWE+w5M7PsWa715ZZkmoPJR9Kua+T18Y3niifHaXIZ9 + 1Z7AG9WFfeFDOgz4Jq6o/WFf+PnVkoPVdCLsi17/dzrsU0mmrjpH7bG0Np4OdC7sO3j7w4HXJ5uU + MVUJx16H73+y8uhnBsK+KAe/uyVeQMmwL3ysWltVViVv2Bdo8ydN/Wk50cSIocmwr9YGVVVFGfFX + e5OkKPP28tvU9ou7L3Mb9qWeitNiu/CsHKk9McMDbFaYwYXLQs8+AOiWk69/MaL33/j0wSMfuOen + SxN98cj2c791/ETP/s8/5X1fe+7qaS/b6vYXlqetbv93Px7xUBx3wVebLPfUsdkrXAIjuZWfiCE8 + lP1Goavg+tabV+ocARuv3zXN8lhgduGEMfuAIeHPmXjV8NoMhX0b8U7gqvYxcDviyJFXAnvX/rAv + fHKWnA0zfB+m2m9rMW2o/8Nf2NS7CuG31x32qSRTV5299uht2zWeDnQu7Nt/4HDg9RMjm4nCn5P8 + a+XRzwyEfVEOfndLvICSYV94H1tbVVYlb9gXaPNPa1dMO4ZNhn21NqiqKsqIv9rTJL+52R+7Gi+y + uPsi7Ju2THvKN9wlMLXpFb5OrDCDC58P5uwDgG455foX47r08B13/2Rpmk9977hzvnH8RF948rzE + tH+d6Jonjg2s66w7Ho54HE746P1Nlnu4dV3tEmgfhpvNWfqshXdkOM9Fe9ZbQHhTh0vymgoThPAj + iNl3rcBBfm22wr5YJ3BV+xjochh+EjWQdrUk7EutAMt8ocIfXnlX3Mq3sNpl2lev5OPx4ZsSdYd9 + KsnUVeeqPXrL66N0INAVqJ1h3+5zrw+8/re/+33GVCW83mQtlUc/MxD2RTn43S3xAkqGfbvPvS7w + 9tZWlVXJG/YtZGvzjy/Tfq2aDPtqbVBVVZQRf7VTJQcwdX7b8R/ouPtyumE8pyyB8zwwfGvqOJyN + HaLwGLNtuHgBALI76VPfj9u57/Qbn77jhZ3TArg7X1q+6Fs7zv768eVd8vCOQNJ3w79cEPc4JJos + 92KzBhRbCt/eT71kSBre4U8o9shrfestIONt+WR7ss/JPr4j1+6/Z9MbU3v9ZLmySO2TWGGHtaEW + hn2xTuBK9jFwGqTeSSh2Vdtk2JfaobLMVzh8H6YN0160of4PVxGp51jJr164Xk2tLlSS4VXnrj36 + q6N04NnnXp323pJhX8bxFfPmKcunplQmWULGcKSSLMeceH7l0c8MhH1RDn53S7yAkmHf0skXh3ez + nVVlVQqEfVlG7x8tSXU6re98k2FfrQ2qqooy4q92RuGxPcc7cMXdlybDvlb1Jkud6jpQ+uHvdTgN + D7fYK5k0ZKHmcxsAaN4JH73/5OteiOsz3/nMV36yNM0tR5bPeWDH3vtLST7h4HPLgbVc+LWvRT8O + jRV66nVZ5cu0dmzqI6zhB8lSL4qLPfJa33oLSFrXqQ98jpbkIivjA7TJOTDai61X/eEri+Topbb5 + w58wbVSf12Yr7NuIdAJXso+B677wzHHh6qUlYd9C2lSJGyVuMoSf/q183N28WlL/p25GoBZNfQSi + ZNiX5c6kSjKw6ty1x+JKb/ugc9+7z7wisIqSYV/G8RUL5CmBgHKwy7/+t4nBTfZPSP61qk0dNwNh + X6yD39ESL6Bk2Jd8tbtYVValQNiX6wc68FPVZNi3UGeDqsKijHUqZhc4jJtaNRH3pcmwr8JHZ8cl + baG8J2TSjg2fh+HSL3xlFG62VTWRd+qjp+XPbQCgYctnf/m9170Q18e//sW7frIU8MUjy+fcv2Pv + 4YKS9yafEF7F+pcfin4c3rzj7GYKPRwxFBiCMvXidFqjOjUrSTZm2kNrWbq8FXvktb71FpP6MOGm + JblqSDZy67V8cqmS/H3rcDFbX5m6j0mzPxBYpE5CUW2GleUoxQr7opzAlexj+HI+cIaHbyC0J+zL + cvwPHXo8/F0e9o3dej6Hn9BOHbRnk+whfhYtqf9TB0SaNjpxlplMS4Z9GxmGHVNJBlZdpPZYWktN + QEqGfRvZAqwCeUrqepP9Cqw6HLptTO8pJuyLdfA7WuIFlAn7est7OlpVVqVA2LeQp+t94HGyhsO+ + WhtUVRVllFMxeVf2vleBPd30Ax3ra7XQbNi3Uc8818O2UNLczRj5JbucermXOnde+Hs98bglZ044 + Rp+2/cmnJf+U8cRLXpa6d5ebsA8AuuYdHzkQPeTa9+3P3PnyUtgXn1m+8MEd6/fmlrzr9heXUz// + 4w98MfpxeOt7Llmov8QX0p7ALDbKXPgziz15O1qSJvR4kzVppWeZ0zywI7HWW1g4Oyi5bL3qz9id + cFOkmLwry8QThccdCh+idoZ9w6XhE7iSd4UTnGlP26aeqO0J+1LHQRotycmz6ZbaMDcf7ezWuyLh + kTyHxyHLHYzRF6rC2x0dqv833YoZ748cXlL3IvUJimTbRsU6rNk21SEqycCqi9QeiyuH739yI7ik + Rj/h5Gjj9S5XoxjlmBPPv3LfnVvH9iyQpyQf9dvf/X4jbUnWdcbqVePvSv6S+sbkBdO6iQn7Yh38 + jpZ4AaXCvm27OlpVVqVY2Jdx9P7Avi80HvbV2qCqqiijnIrDf032LnWqhXC7cdNhifW1Wqg67Cvf + GCtg00qHj8huPfGGq8tyvbaRNpV5lj1NVjT6kORLkdrcDRTT+Mzpyeds/dKN9i7L7YXw+QAAtNNb + 33PJe/a/ENGZNz+RmsQN3fbC8qcfO3btazsy2ntoR/L6rB/+/M64xyHx5++6oIEST+0WUWwK5tRG + 6cQHzPLORJ9rCdwej7XewlJH2CizTLxCyXi3ocASeF70tRkN+4othU/gSt6V2vFq/LJ0eMJkORrt + CfsqPMknntJZjsbw4dtNbxze+Bq/VN+orlZpVf2/aR8rXFJvNxUYy3RrSakkp626ptojNfoJjwI6 + cakk7FvI0NWr8BKYAE7YF/Hgd7HECygc9vWW17tbVValWNiXMTgLj3DYcNi3UGeDqsKibP5UHH/N + 8PmlrT+1yXtTm0PFhqeodl+Gqg37KmmM5ZV3wJzUJeN4HdVeMwaOQ7Wta936AKCLjlpae/f+5yP6 + 1Lc/c8fLS9nd8uz2K7597NmHjtt991TJv37qkWMPPr+c65PP++pX4x6KZko83AIs/PhW6j3kiW3F + +rKS8HgasdZbRupoHoWXaVf92YcSyr6UuTsRPj4zFvaVOYGrelcdJ0Crwr6qSnDijZEso01mX6oK + +1pV/6f2fyy8ZLndlLc6nbgLKslpq67jyGSJfrL0txpfqgr7FtLGIC22hOcZFPZFPPhdLPECivfs + 6692t6qsSrGwbyHDKIsbaU/mNB/2LdTWoKq2KBs+FSv5/Gkt5+a/VgtVh30LFTXGcqk87Ms4YGaF + 1wXh2foqDPvM1gcA3XXCxx6OFW+974Yf3/rczi+/vFzAjf+6fd9jx175nWMvvO+4oeS/k78kfy/2 + gTf/6wdmPuxLHfejzFzY4U+e2C6tKStJnZo81npLqinvm3bV3995XrWrK1ku4YMzS2FfTQcq77sK + PzYcOG3aFvZVcpJPewo645iTWZZKwr621f9lvkHhkzPL7aa8N0Mm1iEqyWmrLlx7BNK6LNHPwdsf + zrW6CsO+5VMvyRs1hpdkS6YN51hJ9DNLYV/zB7+LJV5AsbBvvFtfF6vKqhQO+1Lrz9TZdaOEfTU1 + qKotyoZPxUpWMS1Lav5rtVBD2FdJYyyXasO+XNtT1XVBOF6sKuxLzq46RisCAJqxuPvmnZ97PopL + 77/59peW2uPce74a61C888rvNVDWqe3b8NgdYalty61Xl+EruGJN4qRpmvqIXaz1lpe0uit/kjNw + 1V9hvJgc89RLhtdmK+yLdQJX9a6Mc4JsWg4dejxQFbQt7KvkJA9Um1VdcVdyud22+n+h6C2X4TQ0 + gRdkud2UfY6h0UprOn9GyyxVkgVrj3u/F0jrskQ/y6fmGxOswrBv4fVxRKtKf5LNSI3bhH0RD34X + S7yAgj373titr3NVZVUKh32pIyGn/sZFCfsW6mlQVV6UTZ6K5VcR/mlu+Gu1UEPYV1VjLLsKw74C + G5Nlmrzwkjo/YCWXHs3c1gAA6vPn77ogVsJ107++P3rAN+6GH+6OdSiOu/i+Bso6tYVZpmNa6phs + W0cmTL2CyxtsZWyaxlpvVaodjT981ZDsV/n+a488+kyWU+u12Qr7Ip7AVb0r70CLw6eCuxX2lT/J + wxlZJc/xVhL2ta3+z7hVm5bhraRKbjflKppAHaKSnLjqYrXHwdsfmvaCjNHP/gOHs6+02rBvmP6E + PyHLkuxpareyBWFf1IPfxRIvoEDYt7VbX+eqyqoUDvtSfxlTZ9eNFfYt1NCgqqMoGzsVS64iS5bU + 5NdqoYawb6G6xlhGVYV9xSa5XiiR9yUXialVx0IVdwmSq1d9+gBgBpxwxeMnXftcw1YOfuu2l5Za + 5bPfO7/54zD09g/fUHcppz4pmnGC6YDw44Vbh51JvYJLtjl7XJK8MmPiFmu9FUrWmGVSj9Ql4xgd + ZS4csncXem3mwr5YJ3CF78p+UTy6Nuxc2FfyJE89w3ftvabMo9fJgS0/PnAL6/+MZTe+jBLDqm43 + ZS/01DpEJZl3jePLWO3xzWmvyR79ZB/Ms/KwL+8GbF0uuvSWjGsR9kU8+F0s8QKK9Oyb1K2vW1Vl + VcqEfYHKM3UMz4WoYV/JUm4m7GvsVCz8+cleZ4l1mtyXoTrCvoVKG2Opyk8YfejQ4yWzsAKBY/aV + lgz7yh9hAKAl3v7hG6KEfQdfWmqVj33julhh39GnXl53KafOAVG+dZf6rNqmp+AyXsGlPvKXXPnm + 2vhY663cSaddUnhqpORaINdDicklRq5nLwscnNdmLuyLewJXdXiTS/vUyHK831ZHw77hFyrXNXKu + gktemTfySzYm192e8NrD62q+/h+Xet8jOT3G317h7aYst1ySsyvLKaSS3KrC2iNX9BNOkUYfuDXS + qipPST45Vx/D3/7u91uTx1qjn1kN+5o5+F0s8QLyhn2Bbn0dqiqrUibsC4yEPK2bfPbdbyDsW6iu + QVVrUdZ9KiYvztvtLvnFLDamegNfq4Xawr6FShtjWY5VgTb5xuvfvqqe702+4xnLK9nrXNcCxfZu + eD6Uf7YQAGiPN+04+8Rrn2verS8ut8raHfdHOQ6Jo5bWop8Gzct+BZc0PpMm6Kb7+cnbkz8WGEYj + 1nrrM2zYb93U8SW5BBu+puSFUnLFkXzItEv44SrmZJz/2TuRApLt3HrxeOjQ4zP5COjwNJ4YUgwv + hwuf5MOAflr0NjwlhnPSRT8IsQ77pmNy7f57ykwmWGbVw+IoUBYqyU1y1R69bbuqiiqu3HdnYnOx + /vrfkj+esXpVHeHIxLgkWd20nl/DLXz3mVc0szHzJsrBn+sST+vWp6qcQ/U1qCpU96k4/IRp4U5y + dTB8QSVRS6e/VtU2xlKNLp+nPa42OkXra5YPP39rNpecLeVPifCJt6GaBYBZt23v7c0nXJ94aF84 + fbv6e+f/0303J/Y/ubtwhHfzszsve/C65EPCqzv77q/GSvp2XPZQ9BMgilhP3rbhiV9mgBMJoHK9 + 5T3xYwsgj4zd+gAAAGjAoHPfZ59r3uUP7fvSi8tbfe7J3R8++K3xV55586PTXhxw6YPXvfe6p0Yf + ctrnv3/x4Ztvenbnpped9ZV7ouz+0F+d+dnoJ0AUwj46zYkEULkKO/cBDcnZrQ8AAIBaLe69/Z2f + fa55H//WvlteXBq54cfv3/uVe6a9OPmn8RcHfOHIzjNufnTih7znuqeSz0lWdO2Tq8naV++4L8qO + j/TmcgzPBWEfHedEAqhF0i6KHl4A2Qx640avNAAAABjzph1nv/PTP3zXNc8270O3fvPcr95+0eGb + 9n7lntQX7/vu+V98YTnV6pfvi7IveS3uvS160cci7KPTnEgAtVhciZ5fABkNeuNGrzQAAAB4o7/5 + 0A0nXPNsy61/5Z7UpO/GIzujb2dGf/auC6KXeyzCPjrNiQRQF537oAt06wMAAGit5Uu++c5rnm25 + zx/ZefMLywEf/fp10Tcyi/65d0cv8YiEfXSaEwmgLosrve3r0YMMIKy3uBK/ugAAAGCSP3vXBTs+ + 9cMTrn62zS775r6bXlgOeP9Nj0TfyCzetOPs6CUekbCPTnMiAdSovxo9yABC5nXacQAAgK74y9M+ + fcLVR9rs/Tc98oXnl6f53FPvj76FWfz1h66PXtZxCfvoNCcSQK16yzr3QUsN+t7q1gcAANB6f7vr + puOvPtJmn3vq9Glh38UP7I++eamWLvlmb+6fhhX20WlOJIBa9bbtip5oAJP1V6NXEQAAAGTxjj23 + HX/Vkdb68G2Hb3x+eatrf3T6KTd8L/rmpfqzd10QvYijE/bRaU4kgNotrcUPNYA36i3viV85AAAA + kFn/o9/ccdWR1jrtC9/5zBOrn39+eeTj377sxGt/FH3DUh192qejF24bCPvoNCcSQO0WVwajBcaO + NoBxg1630SsHAAAAMustrS1ecO9xn3mGCv3Nyk3RS7YlhH10mhMJoAG9/u7o0QbwJ3M/EwEAAEBH + /d2e26IHZDMjOZjRC7Q9hH10mhMJoBmDMQOjBxzA9r2DnraLK9HrBAAAAIo55h+v3/6ZZyjp7XsO + Ri/KVhH20WlOJIBmDMYMjJ1xAAP91egVAgAAAGX893dfsnzlk9Hzsu76yzOuiV6IAACdtLQWP+aA + +TboYxu9KgAAAKC03tLa28/+yvK+Z8ilf8WTbz358ujFBwDQVYsrveX16GEHzC0DeAIAAMyYt558 + +eJlj0ZP0Lri786/903HnR291AAAOs1gnhCTATwBAABmTm9p7W0fvH7bFU/2P/0007zj0kf+x99/ + KnphAQDMCIN5QgwG8AQAAJhhvaW1oz9wzTsufSR6rNY226548m0fvD45PtHLCABgdhjMExpnAE8A + AIA58ZaTL/+btYPv+MQTi59+es793cXf+Au9+QAA6mEwT2iaATwBAADmzFtOvvyYj3zh7Rd/4+8+ + /fRc+euz7vqLD1xjbj4AgNoZzBMaY6wSAACA+fbmd17wf5z88b/84HWJvznrrr8979AsGe5XsoPJ + bkY/1AAAc2Uwg1j0EARmnQE8AQAAAACAOvQWVwYxROwoBGbbYNTc2F92AAAAAABgNvVXo0chMMsM + 4AkAAAAAANTK5H1Qj8FIudG/4AAAAAAAwGxbXDF5H1TOVH0AAAAAAEAzTN4HlTNVHwAAAAAA0ByT + 90F1ev3d8b/UAAAAAADAXDF5H1TBVH0AAAAAAEAUJu+DknrLpuoDAAAAAAAiWVwZRBWx4xLoqN72 + 9Z6kDwAAAAAAiKe3uNLbLu+DInrbdkX/CgMAAAAAAPOuvxo9NIHO6fV3x//yAgAAAAAAvEPeBzkt + rcX/2gIAAAAAAIwsrcUPUKALest74n9hAQAAAAAA3mgQYcSOUaDlBl+TxZXo31YAAAAAAIDNFlfk + fRDQ274u6QMAAAAAANprkPetR49UoIV629d7kj4AAAAAAKDdBnHGdnkfbCbpAwAAAAAA2q+3beVN + O/b2Ygcr0C791ejfTQAAAAAAgLDetpX/dvzeP3/n2f/thLPkffAHkj4AAAAAAKD1Rknf0JuPPyt+ + yAKxHXXcevLViP71BAAAAAAACNiU9Mn7IJF8BQYdXY/fK+8DAAAAAABaa2LSJ+9jzg2TviF5HwAA + AAAA0E6BpE/ex9waT/rkfQAAAAAAQDulJn2Jo47ds9BfjR6+QGO2Jn3yPgAAAAAAoG2yJn3D18v7 + mA/Tkj55HwAAAAAA0B75kr7hWxZXetvXo2cxUKP+anLah78X8j4AAAAAACCuAknfH94o72OG9VeH + 57m8DwAAAAAAaK3CSd8f3i7vY+Ykp3Rv267x81zeBwAAAAAAtFDJpO8PH7K40lveEz2ggUoMkr7F + CbGdvA8AAAAAAGiVSpK+P5D3MRN6y5OTviF5HwAAAAAA0B5v3lFR0je0uLKwtBY9rIHCBoH1YkpU + J+8DAAAAAADaIDWzyJf0jcj76Kjk1F1cqeS7I+8DAAAAAABqVVfSN9RfjR/cQC5La9V+g+R9AAAA + AABATepN+l7X27art309foIDWfRX6/geyfsAAAAAAIDKNZD0DfUWVwYzoEXPcWC63vb13mLxPE7e + BwAAAAAANKmxpO8PFldM4UdrDcLoxbJJnLwPAAAAAABoRtNJ3x/1+rujxzqw2dJa+aQv4zdL3gcA + AAAAAJQUK+kbMoUf7VJokr4y3y95HwAAAAAAUFjcpO8PTOFHC/SWS03SV+ZbJu8DAAAAAAAKaEXS + N2IKPyKqbujOYt81eR8AAAAAAJBLu5K+1xnSk+YNTrmqh+4s9o2T9wEAAAAAABm1MOn7A0N60qDk + ZOstNpevyfsAAAAAAIDy2pv0jfRXdfGjdktrLfz2yfsAAAAAAICADiR9r+vp4kdtesvrvW27Wvsd + lPcBAAAAAAATdSXpG+n1d0cPhpg1S2sLi5GjNHkfAAAAAACQV+eSviFd/KhK3A59eb+P8j4AAAAA + AGCko0nfn5jFj5Ja0KEv77dS3gcAAAAAACzMQNI3pIsfhSSnTW+xpZGZvA8AAAAAAAibkaTvj3rb + dvWWdfEjk0Fv0P5q9JO25DdU3gcAAAAAAHNrxpK+P1hc6fV3Rw+SaLv2jdtZ+Hsq7wMAAAAAgDk0 + m0nfiFE9mWIwbue2XfFP0Uq/rfI+AAAAAACYKzOe9P2RUT0ZNzgZWj9uZ+HvrLwPAAAAAADmxJwk + fX/SXx3MzhY7aSKi5AQYDO662O0sTN4HAAAAAADMXdI39PpEfiK/OdWd6flSyfsAAAAAAGCezWnS + N/J65Bc/e6IxMxTzjcj7AAAAAABgPqVmBG86bj36RjZhcWWQAUXPoajVLMZ8I/I+AAAAAACYN9KB + zUR+s2qmY74R32gAAAAAAJgfcoGpzOU3S+Yj5hvxvQYAAAAAgHkgEUg3jPyWRX6d1Nu+PpiKcXEe + z2HfbgAAAAAAmG2ygHz6q73lPdHTKzIa5LP91fmM+UZ8xwEAAAAAYFZJAYrpbdtlOr+W6y3vGRRT + 7FOlJXzTAQAAAABg9rj/X5axPdtnMLvinE3Ml5HvOwAAAAAAzBJ3/iuko18bDIZX7a9GPxnazLce + AAAAAABmg3v+tVhcMaNfjIxvvdffrStfRr77AAAAAADQde721623uLKwtGZ4z3ozvteH6+zJ+PJT + AwAAAAAAQHe5z98kqV9dGd+2XdELt9PUAwAAAAAA0EXu8Mfyx9TPCJ9FM75lGV/F1AYAAAAAANAt + 7u23wuvz+i0srUWPzzphEI/2V43VWRN1AgAAAAAAdIW7+i006Kemu9+EgO+PnfhkfPVTMwAAAAAA + QPu5n992iytzHvwNA75Bn0cBX+PUDwAAAAAA0Gbu5HfM68Ffr7+7t7ynt309egxXZ8C3Z7CbevC1 + gFoCAAAAAADayT38zhvP/pY7nP31tq8P0z1z8LWTugIAAAAAANrG3fsZNBzws7/6x/ivpcN+9pYH + 0d5wZE5997pCjQEAAAAAAO3hvv0cGUsAhxP/NTYE6B8Cx2Slwy5723bptddp6g0AAAAAAGgDd+wZ + 6Q0HAh3q736DpbWjduw96ri9vWP/ZPC/x61vfuXrk+uNRN8p6qP2AAAAAACAuNyrJ6Pe0urEM+TN + O/ZG3zYiUocAAAAAAEAs7tKTnbCPadQkAAAAAADQPPfnyUXYR4D6BAAAAAAAmuTOPHkJ+whTqwAA + AAAAQDPck6cAYR+p1C0AAAAAAFA3d+MpRthHFmoYAAAAAACoj/vwFCbsIyP1DAAAAAAA1MEdeMoQ + 9pGd2gYAAAAAAKrl3jslCfvIRZ0DAAAAAABVcded8oR95KXmAQAAAACA8txvpxLCPgpQ/wAAAAAA + QBnutFMVYR/FqIUAAAAAAKAY99ipkLCPwtRFAAAAAACQl7vrVEvYRxlqJAAAAAAAyM59dSon7KMk + 9RIAAAAAAGThjjp1EPZRntoJAAAAAADC3EunJsI+KqGOAgAAAACAadxFpz7CPqqipgIAAAAAgK3c + P6dWwj4qpL4CAAAAAIBx7pxTN2Ef1VJrAQAAAADAkHvmNEDYR+XUXQAAAAAA4G45zRD2UQc1GAAA + AAAA88x9choj7KMm6jEAAAAAAOaTO+Q0SdhHfdRmAAAAAADMG/fGaZiwj1qp0wAAAAAAmB/uitM8 + YR91U7MBAAAAADAP3A8nCmEfDVC/AQAAAAAw29wJJxZhH81QywEAAAAAMKvcAyciYR+NUdcBAAAA + ADB73P0mLmEfTVLjAQAAAAAwS9z3JjphHw1T7wEAAAAAMBvc8aYNhH00T+0HAAAAAEDXuddNSwj7 + iEIdCAAAAABAd7nLTXsI+4hFTQgAAAAAQBe5v02rCPuISH0IAAAAAEC3uLNN2wj7iEutCADA/8/e + /fRacpx5Yv4ul+VRDwgLpcVx95QLRdDFbhQ9LIBA2SRlgVNkma7qBikVeCCg2y20qzamFjQ4Fkw3 + YBlEeSE0QA5kATRAuQF5IVALYrTQhphe8wP4OzjAM318de4952ZmvBEZGfkAz0KgyJuZcSIj34hf + /gEAAFgKa9o0SNjH7IyNAAAAAAC0z2o2bRL20QIjJAAAAAAALbOOTbOEfTTCOAkAAAAAQJusYNMy + YR/tMFoCAAAAANAaa9c0TthHU4yZAAAAAAC0w6o17RP20RojJwAAAAAALbBezSII+2iQ8RMAAAAA + gHlZqWYphH20ySgKAAAAAMBcrFGzIMI+mmUsBQAAAACgPqvTLIuwj5YZUQEAAAAAqMm6NIsj7KNx + xlUAAAAAAOqwIs0SCfton9EVAAAAAIDSrEWzUMI+FsEYCwAAAABAOVahWS5hH0thpAUAAAAAoATr + zyyasI8FMd4CAAAAABDLyjNLJ+xjWYy6AAAAAABEseZMB4R9LI6xFwAAAACAfFab6YOwjyUyAgMA + AAAAkMM6M90Q9rFQxmEAAAAAAKaxwkxPhH0sl9EYAAAAAICxrC3TGWEfi2ZMBgAAAABgOKvK9EfY + x9IZmQEAAAAAGMJ6Ml0S9tEB4zMAAAAAAKdZSaZXwj76YJQGAAAAAOAYa8h0TNhHN4zVAAAAAABc + ZPWYvgn76IkRGwAAAACA86wb0z1hH50xbgMAAAAAsGPFmDUQ9tEfozcAAAAAANaKWQlhH10yhgMA + AAAArJlVYtZD2EevjOQAAAAAAOtkfZhVEfbRMeM5AAAAAMDaWBlmbYR99M2oDgAAAACwHtaEWSFh + H90ztgMAAAAArIHVYNZJ2McaGOEBAAAAAPpmHZjVEvaxEsZ5AAAAAIBeWQFmzYR9rIfRHgAAAACg + P9Z+WTlhH6tizAcAAAAA6IlVXxD2sTZGfgAAAACAPljvhTNhH6tk/AcAAAAAWDorvbAj7GOdXAUA + AAAAAJbLGi/sCftYLdcCAAAAAIAluvbCA6u7sCfsY83kfQAAAAAAyyLpgwPCPlZO3gcAAAAAsBSS + PrhI2AfyPgAAAACA9kn64FLCPjiT9wEAAAAAtE3SB8cI+2BH3gcAAAAA0CZJH5wg7IM9eR8AAAAA + QGskfXCasA/Ok/cBAAAAALRD0gdXEvbBAXkfAAB9S9O9NBOcfTcAAOBKkj4YQtgHF8n7AADo2H7S + J/IDAKBlkj4YSNgHl5L3AQDQq4Opn8gPAIAGSfpgOGEfHCPvAwCgS5dOAEV+AAC0Q9IHowj74AR5 + HwAA/TlW3Ir8AABogaQPxhL2wWnyPgAAOnO6vhX5AQAwI0kfTCDsgyvJ+wAA6Mnp4lbkBwDAXCR9 + MI2wD4aQ9wEA0I0hYZ/IDwCAyiR9MJmwDwaS9wEA0IfhYZ/IDwCAOiR9kEPYB8PJ+wAA6ECaBqYZ + n8gPAIBGSPogk7APRpH3AQDQB5EfAAAtkPRBPmEfjCXvAwCgGyI/AABmJOmDEMI+mEDeBwBAT0R+ + AADUJ+mDKMI+mEbeBwBAZ0R+AABUI+mDQMI+mEzeBwBAf0R+AACUJumDWMI+yCHvAwCgSyI/AAAK + kfRBOGEfZJL3AQDQK5EfAACxJH1QgrAP8sn7AADomMgPAIAQVyZ9f/Lnj567+dbs+wmLI+yDEPI+ + AAD6JvIDACCHpA/KEfZBFHkfAADdE/kBADCBpA+KEvZBIHkfAABrIPIDAGA4SR+UJuyDWPI+AABW + QuQHAMCVJH1QgbAPwsn7AABYD5EfAADHSPqgDmEflCDvAwBgVUR+AAAckPRBNcI+KETeBwDA2oj8 + AADYkfRBTcI+KEfeBwDACon8AABWTtIHlQn7oCh5HwAA6yTyAwBYJ0kf1Cfsg9LkfQAArJbIDwBg + VSR9MAthH1Qg7wMAYM1EfgAAayDpg7kI+6AOeR8AACsn8gMA6JikD2Yk7INq5H0AACDyAwDoj6QP + 5iXsg5rkfQAAcCbyAwDoiKQPZifsg8rkfQAAsCPyAwBYOkkftEDYB/XJ+wAAYE/kBwCwUJI+aISw + D2Yh7wMAgPNEfgAAyyLpg3YI+2Au8j4AADgg8gMAWARJHzRF2AczkvcBAMBFIj8AgJZJ+qA1wj6Y + l7wPAAAuJfIDAGiQpA8aJOyD2cn7AADgGJEfAEA7JH3QJmEftEDeBwAAJ4j8AABmJ+mDZgn7oBHy + PgAAOE3kBwAwF0kftEzYB+2Q9wEAwJVEfgAAlUn6oHHCPmiKvA8AAIYQ+QEA1CHpg/YJ+6A18j4A + ABhI5AcAUJSkDxZB2AcNkvcBAMBwIj8AgBIkfbAUwj5ok7wPAABGEfkBAASS9MGCCPugWfI+AAAY + S+QHAJBP0gfLIuyDlsn7AABgApEfAMBkkj5YHGEfNE7eBwAA04j8AADGkvTBEgn7oH3yPgAAmEzk + BwAwkKQPFkrYB4sg7wMAgBwiPwCA0yR9sFzCPlgKeR8AAGQS+QEAXErSB4sm7IMFkfcBAEC+yZHf + tRcezL7zAADhJH2wdMI+WBZ5HwAAhJgW+X3npUciPwCgJ5I+6ICwDxZH3gcAAFFEfgDAmkn6oA/C + PlgieR8AAAQS+QEAKyTpg24I+2Ch5H0AABBL5AcArIekD3oi7IPlkvcBAEA4kR8A0D1JH3RG2AeL + Ju8DAIASRH4AQK8kfdAfYR8snbwPAAAKEfkBAJ2R9EGXhH3QAXkfAACUI/IDAPog6YNeCfugD/I+ + AAAoSuQHACyapA86JuyDbsj7AACgNJEfALBEkj7om7APeiLvAwCACkR+AMCCSPqge8I+6Iy8DwAA + 6hD5AQDtk/TBGgj7oD/yPgAAqEbkBwA0S9IHKyHsgy7J+wAAoCaRHwDQGkkfrIewD3ol7wMAgMpE + fgBAIyR9sCrCPuiYvA8AAOoT+QEA85L0wdoI+6Bv8j4AAJiFyA8AmIWkD1ZI2Afdk/cBAMBcRH4A + QE2SPlgnYR+sgbwPAABmJPIDACqQ9MFqCftgJeR9AAAwL5EfAFCOpA/WTNgH6yHvAwCA2Yn8AIBw + kj5YOWEfrIq8DwAAWiDyAwCiSPoAYR+sjbwPAAAaIfIDADJJ+oAzYR+skrwPAADaIfIDAKaR9AE7 + wj5YJ3kfAAA0ReQHAIwi6QP2hH2wWvI+AABojcgPABhC0gecJ+yDNZP3AQBAg0R+AMAJkj7ggLAP + Vk7eBwAAbRL5AQAXSfqAi4R9gLwPAACaJfIDAPYkfcClhH3AmbwPAADaJvIDACR9wDHCPmBH3gcA + AI0T+QHAakn6gBOEfcCevA8AANon8gOAtZH0AacJ+4Dz5H0AALAIIj8AWAlJH3AlYR9wQN4HAABL + IfIDgL5J+oAhhH3ARfI+AABYEJEfAHRJ0gcMJOwDLiXvAwCAZRH5AUBPJH3AcMI+4Bh5HwAALI7I + DwA6IOkDRhH2ASfI+wAAYIlEfgCwXJI+YCxhH3CavA8AABZK5AcAiyPpAyYQ9gFXkvcBAMByifwA + YCkkfcA0wj5gCHkfAAAsmsgPABon6QMmE/YBA8n7AABg6UR+ANAmSR+QQ9gHDCfvAwCADoj8AKAp + kj4gk7APGEXeBwAAfRD5AUALJH1APmEfMJa8DwAAuiHyA4AZSfqAEMI+YAJ5HwAA9ETkBwD1SfqA + KMI+YBp5HwAAdEbkBwDVSPqAQMI+YDJ5HwAA9EfkBwClSfqAWMI+IIe8DwAAuiTyA4BCJH1AOGEf + kEneBwAAvRL5AUAsSR9QgrAPyCfvAwCAjon8ACCEpA8oRNgHhJD3AQBA30R+AJBD0geUI+wDosj7 + AACgeyI/AJhA0gcUJewDAsn7AABgDUR+ADCcpA8oTdgHxJL3AQDASoj8AOBKkj6gAmEfEE7eBwAA + 6yHyA4BjJH1AHcI+oAR5HwAArIrIDwAOSPqAaoR9QCHyPgAAWBuRHwDsSPqAmoR9QDnyPgAAWCGR + HwArJ+kDKhP2AUXJ+wAAYJ1EfgCsk6QPqE/YB5Qm7wMAgNUS+QGwKs/dfEvSB9Qn7AMqkPcBAMCa + ifwAWIPnbr71J3/+SNIH1CfsA+qQ9wEAwMqJ/ADomKQPmJGwD6hG3gcAAIj8AOiPpA+Yl7APqEne + BwAAnIn8AOiIpA+YnbAPqEzeBwAA7Ij8AFg6SR/QAmEfUJ+8DwAA2BP5AbBQkj6gEcI+YBbyPgAA + 4DyRHwDLIukD2iHsA+Yi7wMAAA6I/ABYBEkf0BRhHzAjeR8AAHCRyA+Alkn6gNYI+4B5yfsAAIBL + ifwAaJCkD2iQsA+YnbwPAAA4RuQHQDskfUCbhH1AC+R9AADACSI/AGYn6QOaJewDGiHvAwAAThP5 + ATAXSR/QMmEf0A55HwAAcCWRHwCVSfqAxgn7gKbI+wAAgCFEfgDUIekD2ifsA1oj7wMAAAYS+QFQ + lKQPWARhH9AgeR8AADCcyA+AEiR9wFII+4A2yfsAAIBRRH4ABJL0AQsi7AOaJe8DAADGEvkBkE/S + ByyLsA9ombwPAACYQOQHwGSSPmBxhH1A4+R9AADANCI/AMaS9AFLJOwD2ifvAwAAJhP5ATCQpA9Y + KGEfsAjyPgAAIIfID4DTJH3Acgn7gKWQ9wEAAJlEfgBcStIHLJqwD1gQeR8AAJBP5AfAeVcmfUm6 + dsy+nwDHCPuAZZH3AQAAIUR+AJwNS/qM/EDjhH3A4sj7AACAKCI/gDWT9AF9EPYBSyTvAwAAAon8 + AFZI0gd0Q9gHLJS8DwAAiCXyA1gPSR/QE2EfsFzyPgAAIJzID6B7kj6gM8I+YNHkfQAAQAkiP4Be + SfqA/gj7gKWT9wEAAIWI/AA6I+kDuiTsAzog7wMAAMoR+QH0QdIH9ErYB/RB3gcAABQl8gNYNEkf + 0DFhH9ANeR8AAFCayA9giSR9QN+EfUBP5H0AAEAFIj+ABZH0Ad0T9gGdkfcBAAB1iPwA2ifpA9ZA + 2Af0R94HAABUI/IDaJakD1gJYR/QJXkfAABQk8gPoDWSPmA9hH1Ar+R9AABAZSI/gEZI+oBVEfYB + HZP3AQAA9Yn8AOYl6QPWRtgH9E3eBwAAzELkBzALSR+wQsI+oHvyPgAAYC4iP4CaJH3AOgn7gDWQ + 9wEAADMS+QFUIOkDVkvYB6yEvA8AAJiXyA+gHEkfsGbCPmA95H0AAMDsRH4A4SR9wMoJ+4BVSXWd + vA8AAJidyA8giqQPQNgHrI28DwAAaITIDyCTpA/gTNgHrJK8DwAAaIfID2AaSR/AjrAPWCd5HwAA + 0BSRH8Aokj6APWEfsFryPgAAoDUiP4AhJH0A5wn7gDWT9wEAAA0S+QGcIOkDOCDsA1ZO3gcAALRJ + 5AdwkaQP4CJhH4C8DwAAaJbID2BP0gdwKWEfwJm8DwAAaJvID0DSB3CMsA9gR94HAAA0TuQHrJak + D+AEYR/AnrwPAABon8gPWBtJH8Bpwj6A8+R9AADAIoj8gJWQ9AFcSdgHcEDeBwAALIXID+ibpA9g + CGEfwEXyPgAAYEFEfkCXJH0AAwn7AC4l7wMAAJZF5Af0RNIHMJywD+AYeR8AALA4Ij+gA5I+gFGE + fQAnyPsAAIAlEvkByyXpAxhL2AdwmrwPAABYKJEfsDiSPoAJhH0AV5L3AQAAyyXyA5ZC0gcwjbAP + YAh5HwAAsGgiP6Bxkj6AyYR9AAPJ+wAAgKUT+QFtkvQB5BD2AQwn7wMAADog8gOaIukDyCTsAxhF + 3gcAAPRB5Ae0QNIHkE/YBzCWvA8AAOiGyA+YkaQPIISwD2ACeR8AANATkR9Qn6QPIIqwD2AaeR8A + ANAZkR9QjaQPIJCwD2AyeR8AANAfkR9QmqQPIJawDyCHvA8AAOiSyA8oRNIHEE7YB5BJ3gcAAPRK + 5AfEkvQBlCDsA8gn7wMAADom8gNCSPoAChH2AYSQ9wEAAH0T+QE5JH0A5Qj7AKLI+wAAgO6J/IAJ + JH0ARQn7AALJ+wAAgDUQ+QHDSfoAShP2AcSS9wEAACsh8gOuJOkDqEDYBxBO3gcAAKyHyA84RtIH + UIewD6AEeR8AALAqIj/ggKQPoBphH0Ah8j4AAGBtRH7AjqQPoCZhH0A58j4AAGCFRH6wcpI+gMqE + fQBFyfsAAIB1EvnBOkn6AOoT9gGUJu8DAABWS+QHqyLpA5iFsA+gAnkfAACwZiI/WANJH8BchH0A + dcj7AACAlRP5QcckfQAzEvYBVCPvAwAAEPlBfyR9APMS9gHUJO8DAAA4E/lBRyR9ALMT9gFUJu8D + AADYEfnB0kn6AFog7AOoT94HAACwJ/KDhZL0ATRC2AcwC3kfAADAeSI/WBZJH0A7hH0Ac5H3AQAA + HBD5wSJI+gCaIuwDmJG8DwAA4KLnbr39n/wX/53ID9ok6QNojbAPYF7yPgAAgEulqdC1F98R+UFT + JH0ADRL2AcxO3gcAAHCMyA/aIekDaJOwD6AF8j4AAIATRH4wO0kfQLOEfQCNkPcBAACcJvKDuUj6 + AFom7ANoh7wPAADgSiI/qEzSB9A4YR9AU+R9AAAAQ4j8oA5JH0D7hH0ArZH3AQAADCTyg6IkfQCL + IOwDaJC8DwAAYDiRH5Qg6QNYCmEfQJvkfQAAAKOI/CCQpA9gQYR9AM2S9wEAAIwl8oN8kj6AZRH2 + AbRM3gcAADCByA8mk/QBLI6wD6Bx8j4AAIBpRH4wlqQPYImEfQDtk/cBAABMJvKDgSR9AAsl7ANY + BHkfAABADpEfnCbpA1guYR/AUsj7AAAAMon84FKSPoBFE/YBLIi8DwAAIJ/ID86T9AEsnbAPYFnk + fQAAACFEfnAm6QPogrAPYHHkfQAAAFFEfqyZpA+gD8I+gCWS9wEAAAQS+bFCkj6Abgj7ABZK3gcA + ABBL5Md6SPoAeiLsA1gueR8AAEA4kR/dk/QBdEbYB7Bo8j4AAIASRH70StIH0B9hH8DSDcv73pp9 + PwEAABZH5EdnJH0AXRL2AXTgyrwvVfLyPgAAgGlEfvRB0gfQK2EfQB/kfQAAAEWJ/Fg0SR9Ax4R9 + AN2Q9wEAAJQm8mOJUr+V9AF0TNgH0BN5HwAAQAUiPxYkddfvvPRQ0gfQMWEfQGfkfQAAAHWI/Gif + pA9gDYR9AP2R9wEAAFQj8qNZkj6AlRD2AXRJ3gcAAFCTyI/WSPoA1kPYB9AreR8AAEBlIj8aIekD + WBVhH0DH5H0AAAD1ifyYl6QPYG2EfQB9k/cBAADMQuTHLCR9ACsk7APonrwPAABgLiI/apL0AayT + sA9gDeR9AAAAMxL5UYGkD2C1hH0AKyHvAwAAmJfIj3IkfQBrJuwDWA95HwAAwOxEfoST9AGsnLAP + YFXkfQAAAC0Q+RFF0geAsA9gbeR9AAAAjRD5kUnSB8CZsA9gleR9AAAA7RD5MY2kD4AdYR/AOsn7 + AAAAmiLyYxRJHwB7wj6A1ZL3AQAAtEbkxxCSPgDOE/YBrJm8DwAAoEEiP06Q9AFwQNgHsHLyPgAA + gDaJ/LhI0gfARcI+AOR9AAAAzRL5sSfp45jtH/7fTJvX/2b2owAmE/YBcCbvAwAAaJvID0kfJzQS + 9j3/8ru3H3/05rPfvPflNwd//8FnX9378NMb95/M3lbQJWEfADvyvr6ptwEAoAMiv9WS9HHa7GHf + 8y+/e+/DT4ds6NEXX996+MHsLQadEfYBsCfv65J6GwAAOiPyWxtJH1eaN+y79fCDi7cWn/bms9+k + cWz2doNuCPsAOE/e1xn1NgAALNT1V99P9fydv/77Nz7+PFXpDz77akg9/8PfffPWL36b/ODnv37l + ySfpP7/59tPv3fuxyG+5JH0MMWPYd/fps2lbTMOa9QeIIuwD4IC8rxvqbQAAWJBUhN+4/ySV8QNz + vbHe+sVvX/3pP9x+/NH37v1Y5LcUkj4Gmivsu/Xwg5yNWn+AKMI+AC6S93VAvQ0AK3fj/pPwpMAb + v6GE3fe1CwV8x/zVP/7Taz/71a2H/+Of/MVfzt4CHCPpY7hZwr40fOVv9+7TZ7O3HnRA2JfJ7Ano + lbxv0dTbAMDAj/aO8sbHn89+XNCNay++Uz/ju9R/87/9+s9+8JPZG4QDg5I+t2jyz/KHgglhX1Sx + 8fzL787egLB0wr5MZk9Ax+R9y6XeBoCVu/biO4VCAQvLkC+V2SUWlHK88uQTL/ZsiqSPsfLHgbFh + X2Cx4WZjyCfsy2H2BHRP3rdE6m0AIPOF3id4Fw3k2Lz+N28++02h0zPHK08+2U3xRH4tkPQxQf44 + MDbsCyw2Hnz21ewNCEsn7Mth9gSsgbxvcdTbAEC5NCH95dmPDpbo+ZffbTPm29mHfSK/2Un6mCZ/ + HBgb9t35678PHIVmb0BYOmFfDrMnYCXkfcui3gaAlQv5eu8JXvQNo1x78Z27T58VPSvzHYR9Ir+5 + SPqYLH8cGBv2vfHx54Gj0PVX35+9DWHRhH2TmT0BqyLvWxD1NgCs3O3HHxWdrqa/P/sxwlLcuP/k + vS+/KXpKhrg07BP5VSbpI0f+ODA27It9EGbs1oEDwr7JzJ6AtZH3LYV6GwBW7tEXXxedrnrRNwxx + 7cV3Ym/DK+pE2Cfyq0PSR6b60393GkNThH2TmT0xUKrEbj384N6Hn7735Td3/vrvZ98fyCHvC2vJ + kiODehsA1ixdu4vOVVUIMEQ6R0ovHMW6MuwT+RUl6SNf/jjgm32waMK+acyeuFL6+W4//ujBZ1+d + /02FfXRA3pejzsig3gaANavzabC0ldmPFJp16+EHFU7DWAPDPpFfCZI+QuSPA2PDvhv3n0QNQR57 + gXzCvmnMnrhUKr3SZe7eh58eu39P2Ecf5H3jmqv6yKDeBoA1q/N1sFTYzH6k0KY6S0bh/vVPfj48 + 7BP5BZL0ESV/HBgb9qWeGVV1WAaHfMK+acyeOG/3qM6Qj2QJ++iGvO9KM44M6m0AWK3Ae36u5F00 + cNG9Dz+tdg7GSrOS527eT1MJkV9Nkj4C5Y8DY8O+s7hB7/mX3529AWHphH0TmD1xNuBRnWPF8+x7 + DlHkfZe0STMjg3obANapZtCQtjX78UJTlpv0nZ+ViPyqkfQRK38cmBD2hdxs7DZjCCHsm8Dsac2G + P6pzuniGPsj7dhocGdTbALBCqQCoNldNUrEx+yFDOxad9F2clYj8SpP0ES5/HJgQ9p1lPxfz4LOv + dHUIIewby+xpzUY9qjOkeIYOyPuaHRnU2wCwNrceflBzupqkemP2o4YWLD3pOzYrEfkVIumjhPxx + YFrYd5ZRgTz64msvFIIowr6xzJ7WrFDxDEu38ryv5ZFBvQ0AqzL5PQOTeRcNJHefPqt86pVwYlYi + 8osl6aOQ/HFgcth39u36w9j3C6W6RVeHQMK+scye1qxo8QyLtua8r/GRQb0NACvx/MvvVp6r7igb + WLn694QXcuWsROQXQtJHOfnjQE7Yd/ZtKTLwMedHX3ydBs/ZWww6I+wbxexp5SoUz7Bcq8372h8Z + 1NsAsAa3H380y3RV8cCaXX/1/fwvZTdi4KxE5JdD0kdR+eNAZti38/zL76aa5M1nv7k4PD747Kt7 + H37qLXZQiLBvFLOnlatWPMNCrTPvW8rIoN4GgL7lf0d4mjc+/nz2Y4dZXHvxnVRI1zzdUiWf6vm7 + T5+lGcTm9b85JpX96V9IFf6ol1ONmpWI/CaQ9FFa/iATEvYBcxH2jWL2tHL5P6Wwj+6tMO8zMgAA + s7v+6vuzzFV3rE6zTtU+1ffGx5/ffvxROs2n7Wf6D289/ODeh5+efghxwqxE5DeqrSR9lJY/2gj7 + YNGEfcOZPZH/O1rSZw3WlvcZGQCA2VULHS51+/FHs7cAVLZ5/W9Kn1mPvvg6nVyxy0HXX30/DReX + 3so+eVYi8hvSRJI+KsgfdoR9sGjCvuHMnsj/HS3psxKryvuMDADA7HK+Gpb/BpsHn301ewtATdde + fKfoq58qfEr7xv0nBy/5zJyViPxOtIykjzryBx9hHyyasG84syfyL5qW9FmP9eR9RgYAYF437j/J + KUVuP/7ojY8/z6xnnn/53dnbAapJBXz+LOBS7335Tc2bvdOZe+/DTwNnJSK/iw0i6aOa/CFI2AeL + JuwbyOyJM0v6MNJK8j4jAwAwr/1a/eSZ5q2HH6hnYKB0yuTcDX7Cm89+M8vKT9po2nTgWSzy27eD + pI+a8kchYR8smrBvILMnzizpw3hryPuMDADAjK69+E5OHbJ7h0yasWbWM4+++Hr2poA6MheImp0U + hKdOK4/8JH3Ulz8QCftg0YR9Q5g9sdNB9Q71dZ/3GRkAgBll3la6f2FgmrdmljTXX31/9taA0vLX + di5V+gt9M1pn5CfpYxb5Y5GwDxZN2DeE2RM7+RdNS/qsU995n5EBAJjRm89+k1OH7N8ZmOatmSXN + 3afPZm8NKK3EY3037j+Z/bhKW1XkJ+ljLvnDkbAPFk3YN4TZEzv5F01L+qxWx3mfkQEAmEvmQ0a7 + t9CE/Klt7++i2X2bI03J33z2m3Skxxoh/b9vfPx5qu56XS9deTuUeKyv42f6LroY+X3v3o9fePTT + V5588trPfvXWL377zi9/f7q53vvym9S7dl8YTE3X4C3xRZO+3Ql478NPjy1U7ton/QvpXyv0/cex + g8D1Hh9baHYkzB+RNq+vIuxL52A60tuPP0q/zm5IOf0l1vQr786s3a/Zd1ifju7G/SdDundqkNSG + izvH0/mbDjD9lLux9MQxXnrpSYc8+2my+43SzqQR5nRu9cPffZOurT/4+a9f+bv/vfuuO7wD5AyS + Zk89yb9otrykfzDWXfkgavs1dunmUmOPdSzv++4rP7r59tO0h6/8D5/8m//j/1lcldX3yDAjg9Jw + 3VfjAByTeUPpQRGS/y6a/h5QShfZ1MiTWybV4X1EOdphJ5Vb+cX/ebfWlPTtPf9fvvcXP/5ffvDz + X//wd9+ENONuCtBCiVso6Uszo3SAQ1akD6RzNvWxkClz2ofJg0CaqaVpyPXlz0HaHwnzz6ZNp2Hf + Lt3bhSMTTqWL0h9JV4Seyp6c7r1rjUKLnyF2I1j69U+vN44dYNNR1xzZ0rbSFjPL9fq73RqzJ/by + x4HWlvTDx7p2auxyLabGzrHL+3bp3itPPknzu7/6x3/K73jzVln9jQwzMiiN0nc1DsAQmQtWB5fI + dNHMvPKmUrPasefXCaeXNNNVMuqFjamwSW1b6BY17VBN2vPARcLt+t7dlDOTHahyiVv67EvSv5Am + R/OeemkfogaBNDsrlCWV/i2ed0Vocrun7e+JLTrspB+06LCTWqZ086aGSt075AKX/k5TiwwVrjvb + by89RXP8zNsMTux2+rPX1ves3wpnTxWGkVEyX6O6HbaQnv/TlJCOvcRPrMae0GPV2Jn2VdZ/++/+ + fbmOF15lLXpkyN9QtU7S2aCkGgegjjTZzLw4xv7B7bfFWLXDL3e1TdfZEkXgbi6gHQq1QwW3Hn4Q + 2A7nXwPVvcCZ7EB1Jrzlzr6zb6dI+ath56Uxf2ybBCZc56V5Wfjycrnf4porQsPbPdZvbz/+KPb0 + GaLQzLr08kLqh7H3sWzbuKE9ZBV3lLS58KPYjT/hP9B5S78Ra6x1zp6Efe0ID/vU2BN6rBo7x9Kr + rDvCvsInb5eDkmocgDoy3yh46VNF+e+2qvZawkJX2/QPQ17wdcyDz76KfeeAdqgmdlJz/dVu34dz + XupI9SeDe6Ur/0JnX6F0aSdNzwceXfo3y60wpxEgNhYp9FtsXBHa3u7BiZMqkNLPcJ1WIsMtt7yQ + +l655kp/ea78aK7rTvgaftFB+GLXXcl7xdc5exL2tSNwoFBjn6bGjtVNlXVH2FfstO14UFKNA1BH + Zol46QJj/ifJStzYfKkSV9vMr3gMFzip1w51pElT4IGv4T6r3Zso6nSk09JuLOiViUUL/n2DtPDb + pUtYYM5V4re47YrQ/Hb3Pbb000+jxK6zFVpeuHH/SekWe/TF15Vva0nNXvlpvvMC1/ArXAiOHUL3 + i0LrnD0J+9oRMlCosYdQY0f9Fp1VWXeEfQVO2O4HJdU4ABWk60LmmH/pn81/F01SZ6Eg/GpbuT6J + +l6bdqgjcNk/VXTdL6bVfB5hYJuX+MJ7+NlXoeC/8rxLnbPaInM62KhMJPy3uOeKsITt7oRMwGMF + rrOVWF6IfSv16Xaodr2b/boTFfbNuw6Z2rDyV59qWu3sSdjXjvyB4rYaexg1dlSN3VmVdUfYF322 + rmFQUo0DUEHmOuSJKvTRQt7kGXu1neVOpCvv/dMO7Qh8JcWtrt+UlSrJGR+sqNzT8nfp/NlXreA/ + 0Q9rrkLsRL1dJPa3uOeKsJDt7jS4DLWNy/vClxcqDzUVPlCbxpAZXxu1l7+G38iBbPstVFY7exL2 + tSNnoFBjj6LGjqqxO6uy7gj74s7T9QxKqnEASktX1cALzYH8Rc7wr5ZcKvBqO+M7B/Jf56gdFnHG + 7fV9Y9Vcbx4bLvDF9c/dvJ+/P/uzr3LBv71sjlx/FWIn5KG2wN/inivCcra70+Yy1DYo74tdXqg/ + 1GwLP8KfWrjohzWHy6x+n3/53aYuoP3lfWuePQn72jH5h15VjX0WWleosVsYQOq08xB3hH1BJ+mq + BiXVOAClZV4dUl104o9nvuJmp8RXoQ9EXW1nudSel7mcoh0qCDkpdjquslLB39QbPI4JKfufu3n/ + Oy89zN+Z3dk31yT6YF454xMl+RPPqH245Yog7AuV/x6twOWFGUfpQm+GrPZatiFywpo2L6C3+sr7 + 1jx7Eva1Y9pAcX1NNfZO/s6osc+3w+wDSCETqqw7wr6IM3Rtg5JqHIDSMsvFKx9pz7/63H78UelG + CLnYhXxlI1PmSqB2qODu02dRh9nsMWZaSsG/k1n275K+f/kXf5m/J+nsS11ixqbbr+UGdvIJ8p9o + CPktrrsiCPsKyOzeUcsLadCb8Qm4Ek8tzR7NRx1jyxfQntaF1jx7Eva1Y8JAcX1NNfZe/p6osXfy + r7+dVVl3hH3Zp+cKByXVOABFpao1c5C/8nu1+e+iqfBS6PyLXWqHRl79lNNc2qGCqDdUPOj0ZenL + Kvj3v8W0sn+f9EWFffN+oSmd+2ehz67mNEVOJ8zfgRuuCBk/xLwdoPFlqG3eGn7U8sLsH1WJjY1a + S/q2U5dQ5nq320At34g1yspnT8K+dowdKFZVY5+Xvxtq7PNNMfsAUtSoKuuOsC/v3FznoKQaB6Co + VMzkDO+n30KzE1KU5n+n5rSQi/68l9rzJq8EaocK+j66TEss+Lf/3PPHHuz5pC8k7Jvx83Dnu2UL + v2DmrYb5O/DAFeFbwr4Scr7WGnJ0LSxtBd5O3MJDuFEH+OCzpr93s+3lPvCVz56Efe0YdUKtqsY+ + kL8Pauy9Ft4wUNSoKuuOsC+jM6x2UFKNA1BU5qMHV76FZif/OlL622SzXyhjTV4JnH3PG2mHcgIn + OKUT8PoafyThSqOGqYOkLyTs47x5X1/ZlBmvCMK+QgZWXws9uoFCnhGb97VsJ0xYP5n33W7DdXCr + 0spnT8K+dgwfKFZVY5c4mzgv5/q76avKuiPsm9oT1jwobVTjABSTfzPzlW+h2cl/wHz35opyZr9K + hptWfsy+2420QzlR7wobclv44rRw02ymgUPixaRP2BcuZz159p0PN9cVQdhXyOQAd9PR8kL+9b3l + haaxYV8L73YbqMEbsUYxexL2tWP4QLGeGvtSs+98Z2Z/nXhpw69Td4R9U3vCmgeljWocgGLy7wEe + WAWFBBxF3wg9+1WyhAlrKbPvcyPtUE7UjKC/dyYsaKHyhCFzw0uTPmFfuHm/VdegWa4IKwn7Umd7 + 4+PP0/B++/FH6T+/KFVBqeKKzZWmLbX1tLyQH2S0/CjcqKt8OrsDn09MDZtaJl2UU2/50+//7c23 + nyapv732s1/91T/+U8gmJj+a2gKzJ2FfOwYOFOupsY+Zfec7k1NjR1VZf/aDn+wuT7sr1Ks//Yd3 + fvn7wGMcWGXdEfZN6gYrH5RU4wCUk7kykIqugRtKF8H860jRlYHZr5IlDJm6aofKor7t3tRB5Ytd + qJzXa//z/3nthQfHjvRY0ifsK8Gi0HmzXBE6DvsefPbV3afP0r88qps9//K7UXcyT5tc97S8sO36 + TWKjwr6o1DJ1qlsPPzj/l5+79fbBpeqFRz8NifyW+94nsydhXzuGDBQ91diT+/Pse96f0t8OHlJl + pQnXwRXqe/d+/NrPfhVygAOrrDvCvvF9wKC0UY0DUEb+7TQHCwKn5b+Lpuh7C0tfAVO5mCqB1GIX + 7/ZP/zzz2x+BLaYdSosK+0adfe0r9HhF+ulTv7r0WZs0NUv/V6GJxp9+/2+/89Kji5HfiaSvaNh3 + /jGNvdQs+cPytF+k2p5MfrlK6XZ4tJorQn9h34PPvko9NnNWe/3V90N+5Qlfbi29vJDaJ42uF8fb + Qm/LzLkUFjrRdtLptnsM4WC425/p6f9K9cCJa9DwsC/1xpB9vvRFTBfDvp3/+t/+MnNzC324z+zp + TNjXkiEDRWc19rRPlpf7CdTYsQPI2CrrYt6XpIlYyE0pQzrbHWHf+D5gUFKNA1BI/r3lo27oCnkX + Tc67+k8rd6lNtdaQ3U7X36gYKKfFtENpUUdU9K22lUUtVE7ob2ffLtyFd7m3fvHb3WTzfOR3Oukr + FPalSc3p8jsN43VeZJf2JE0xTlw1Ap942pv8AGy5dnhzZVeEnsK+1D+nrTEeO/XyZ9wTeni55YXU + Y0+vzqX/N7xXTw6MCq3OpYEujaij+kk6Ky9dgBoe9oW06rErxbGw71/cfpjZhgv9cp/Z09law74h + 8psl/MUd/dXY0z5kEN4IWzX21L4aXmVdmvd995Uf5b/Vs+ORIWrHJozkBqUz1TgAZeS/GWb4W2ii + tlj0OlLiUpsK77Gf1EnlR+wdR2NbTDuUFnVEPb0tIXb6+eiLryfMO9J/EvuUx823n+7nm7vI73TS + VyLsS5X8wEXF8DPu4o8ycP4euyeTP21ZohHeW+UVoYOw78o1tMnSSZH5+zayvHDlgud56SwI3PS0 + zwaVeH9UZj9J/2Fqw/OXoYE/bsgPeuLnOxH2nWU/d7a4W8HNngJ7nbCv6J7sdVljT9iHwK3vqLEn + 19glqqxjz/f98HffzHKM4d2vp7DPoHSmGgegjPw7RSfM0EMeGy90G3CJq+20m9PSfxX4fP3Yt/do + h6JCFm12Zj+WKLF396U+k7PWGtjlXvvZr05HewcC+8bO2MW9ct9JT5OpUT9K4PRn8hfDwxvhvbVe + EZYe9t19+qzow0f5z5flHN1cfTvkYaXJLXBW4LG+Nz7+PKqf3H780W4xduAaY/6i2eklxNNhX2Zs + Ojb5mp3Z046w75j8Zold0u+1xp6QXwe2w1aN/c+bntYZClVZl+Z9rzz5JPMwQ/Ytv7W7CfsMShfP + ghBLrMYBCJc/LZrwYFHIDSSFbgOe/Wp7Xv7d/ueNqsG0Q1GBdd3sxxIlcNE1f9kwtuz/7is/Gp70 + nYWefdPmPiXeazdtEAjck2k9oYVG2Fv0FWG5Yd+Vr8EJkZ/yz3sv8eS+HfgJoQk7EPuQxdgndof0 + itQ+Q8K+/EWzK7dyOuw7y/7yzrLe5Gn2tCPsOya/WWKX9DuusccOHVHb3aqxz5nWE8pVWRfzvjQX + yzzGkJEqv6m7CfsMSufPgigLrcYBiJW/ODDtSe2QO3kK3QYceLXdRpSFgXcAjioOtUNRwr6Lot6h + kXNr33mBr3dLXW540ncWevZN/OZFgVfbTV4Gj+oY01YSYhths+IrwhLDvnT61Hy7YOZEe+wpFru8 + MLmhAkebsb917J3M5brKkLErf9Hsyq1cGfZl1vbtfFJ5yC+S2drdzJ6EfcfkN0vsbKXjGnvstS9k + oztq7L1pNXbRKuti3veDn/96lkaO7X7dhH0GpR3VOADh8u8RnVz2hNw8U+Jm+8CrbVQxFnWnzai3 + zWuHooR9B9J0L6Q1UpkaOCxE/Uzv/PL3VyZ9+/XSs7izL+fUi73xOOeki/qUwFxhU8jPcd5CrwhL + DPsqyzzpxnawwMtQ5lU1arQZu8SRnwtM3nS4zEWzIW+dujLsO8ur7e8+fTZvGw5n9rQn7Dsmv1kC + l/T7rrHHRuchG92qsf9Ym7XWQd6X+SbPkFNy3o5XdMdG9QGDUvhGt4utxgEIl39HzeTLa0htGf7G + pLO4KcDk19dfFPhKc+0wth0KEfYdyHz91174DChqNXjImzy/89KjNC09izv7cm50jP2SQs4iQNRH + DOcN+x6t/oog7LtS5nVh7Bw/8DKUudIS1aVHjf+B59GEj0bFyl80G/ILDgn7ci7l0x52m4XZ056w + 75j8ZgksaLuvsUeVuyFb3Kqx4/ahqPN53823n+YcY8jdwvlN3UfYZ1DaW3k1DkC4/MWBnIl5yP08 + JVYGoq62sfe0RD3KMfx9I9qhKGHfgZBXeQTmKeG/1O3HHw38bN93XnoUssX89eeo96vk/y4hM69p + 74gLaYHtH1wRhH1XW2jYF/JWwJDnlUYtL0Q9zpDGt9k/Npe5aDbwFxwS9mW+GXXeZhzI7Ok8Yd8x + +c0SuF7afY09qsQK2aIa+0DL72He533CvqI7NmokNyiFb3Gh1TgA4fLvqMm8NTTkKh/+Js+Qq214 + 7RH1ZZnhpbh2KErYd17jN5KFjFSv/exXA8O+pJFOfu/DT0P2JP8hgpD3ikzrHiEt8MgVQdg3QOYN + 9mO7WdRlKOR6Wv8cj7p5u4UOlrk4M3BJakjYl9mpZr8Rawizp/OEfcfkN0vUnqyhxh4VvYW0hhq7 + TveIssv7vvvKj3KOMaSYb7ap83ds+EhuUDpv5dU4AOHyv8GaOSsPeX4//GoScrUNf79o1Es2hjeX + dihK2Hdeqk5DmqLQ4xUhD4AM+WxfbNiX3xpRr+7PX1QM6SEzhn23XRGEfX8snRRpx1LHSD/BGx9/ + HhU8jdqHqMtQSIOEnOP1P0zcwieA80eDgUP0kLAv87mzGw0/G7Jn9nSesO+Ydn6jNdTYox5WbaQ1 + 1NhFtVBlFep+HYR9BqXzVl6NAxArfyTPv7sp5F004U9MhFxtw583PAt6rP7u02faYVQ7FBIY9s3+ + ArF8IRPekJdXXCrqG+I1w76Ql3SF9NL3vvymkT2ZMex73hVhxWFf2oFUcaXul1o7zX+j3tx1qbE7 + lr/FqBl9yG3ew3cm6hK8aSBKzqznhw/RQ8K+s7xz9k7zd4ObPR0Q9h2T3yxRe7KSGrvmT6PGLtdd + p+1/m1VWoe7XQdhnUDrowPnbWmg1DkC4/HdHhMQlIfVY7Gt/8venxJcEz4Ju5R1+8dUORQWGfZvX + F/OSumNC7rcMf3jqvPw7+ZObbz8992G+h0XDvpAZUFOzj/w9mSvse+CK8K01hH1pW7cefrC/jTxk + 3Bhl7N7mbzHwzpma/TlkoanEx2ImyDyW4Y0m7Dsze7pA2HdMfrNE7clKauzhvSh/W2rsct31ykZb + UJW1rKbO37Hh56BB6aBX529rodU4ALFC3gAWMkkMWa6MfUqrtf3ZC3mlQM2l3T7aoZCol9VvF/La + q9MetRf6HwiZlbzw6Ke7pdHdw5jP3byf/kehsC9kJhjSS5e+bpa/3buuCN/qMuxL58ithx/c+/DT + kAct843a+dZu5s9fWhnen9/4+PP8Y5/9FQE7UW8na0G5G/VDmD1dJOw7Jr9ZovZkJTV2zW8Qq7HL + 7cnFVlpulbWsps7fseEjuUHpvDVX4wDESlVT5hgedT9zyHuhQ15hsZe/P6l5S/xqIZXA8GdMtENp + +Uex0/6d8HWaougehiysvfLkk33St3dp5NdOr7An+du95YrwrZ7Cvudffvf2448aWXo6r34XCryz + On9pZfjyQsgyTiOP1Rd9ZVlljS8QmT1dJOw7Jr9Z2tmT7RJq7JrfIL6jkxTbk50+qqxFNHXgjtV8 + unbb0aC05mocgFj5Y3jg/cwhj8kHPtyUvzOF1n8qf71XO5QWchTb5u+Ev9IiXg4f8s63V558cuwD + iweRX/62ogKm/D25s/qwb+OKkNEOrbV/+mstP0hVvws1tUpf80nVbQNVROCxNKLxBSKzp4s2wr4j + 8pulncfHFlFj1wz71Njl9qSnKqvxpg7fsYEjuUHpYp+v1vhDCPsAFirkCht4Qcn//kWS/kjU/uTv + zLH1/Ewhrw/aVlza7aMdyom6XzH2ydb6Qkrc0olnyE6+9m9/eXor+8gvf1tRQ3T+nkTdapi/J3OF + fddcETL65FzbvSj9nQZvMp/2a+6PqJ3mPau4vBBy7jSylBH4SvAWvNnwApHZ06U2wr4j8pslZE/W + U2MP78zt9Nj8PVl6jX3QDTqrsppt6nnPC4NSiW1tXhf2AaxdyId+WhOYd+TvTLnfLqSttEPp3Rso + 8MbFom+tL621N9WX28mBpe9zN+/nb6udhYh29mSusK9ct8zft62wb4BrL74T8om3CkYd12qXFxax + 0FTzR2xHywtEZk/leuBG2FdsT9TYJX6ajRo7tJP0WmU12NQt9EaDUoltbV4X9gGsXU9f9zivnVdq + lPvtQhpKO5TevYFC3ga/E/ie9vpCPj1zx0LEH9tYiAjqJPnbLdct8/dtK+y7ShqgQl6XV8eoQ9sI + +zI08rVcYV81Zk/leuBG2FdsT9TYJX6ajRo7rpN0XGW11tSN9EaDUoltbV4X9gGs2vVX38+/mrQp + 6i7r/D0p9/OFNJR2KL17A4W8DX7nwWdfzX4487bDHQsRf+zPfvCTkAPP35ONsK9Yt8zft62w76Rb + Dz8IaeRqRh3dRtiXQdhXQrMLRGZPRXvgRthXbE/U2CV+mo2wL6iT9F1lNdXU7fRGg1KJbW1eF/YB + rFrgw0QNCvk0Uv5ulPv5QlpJO5TevYFi1+ief/nd2Y9oGjX/Rfnbuvn20++89OjaCw8yDzx/TzbC + vmLdMn/ftsK+45ZYL406wNUuL4S8j7GRsK+zd0s2u0B01+zpiI2w74j8ZhH2jSLsW1x3vdt7ldVO + UzfVGw1KJba1eV3YB7BqC3pPwgQhb/LM341yP19IK2mH0rs30LUX3wns/I0sPE6g5r8of1s33376 + L//iL5PMyC9/TzbCvmLdMn/ftsK+IxZ3t/mEzrba5YVFXHQGCnxFQAuaXSAyezpmI+w7Ir9ZhH2j + CPuW1V0XWmU9d/OtxTV1a73RoFRiW5vXhX0A6xXyiuyWhbzMMH83Cv18z7/8bkgraYeiuzdK4Cdg + 3vvym9kPZxo1/0X529qHfZmRX/6ebIR9Zfrk4q4ICwr7lvtqxPqHuRH2zUrYV4HZ0wkbYd8R+c0i + 7BtF2Leg7rrcKutP/vxRZt5Xuakb7I0GpRLb2rwu7ANYr3sffpp/KWlc/ssM8/eh0M8XUgkMn9Fr + hwpiT8mQJ1vrW8Qb1UJ63fAv4+Rv6yDsmxz55e/JRtjXcJ+seUVYSth37cV3Am/DuLL904z47tNn + qXPeuP8k/zet34U2wr5ZCfsqMHs6YSPsOyK/WUL2RI1d4qfZCPsyOsmiq6w0mcrM+2o2dZu90aBU + Ylub14V9ACsV+87AZqX6IbOh8veh0C+4uPse+2iHomLfYfLel9+EfLayspAfdBE1//CdzN/WpWHf + hMgvf082wr6G+2T7d8LX326J9OTRF1+npr734af75aZjY3XNzrYR9mW4+/RZ4Ok8WWcPnb3Z3gKR + 2dNpG2HfEfnNErInauwSP81G2JfR/ouusnYzqZy8r2ZTt9kbDUoltrV5XdgHsFILfTX6WPlPbOXv + Q6FfMKQ27iDsq9wORUW9iG+vkWcNRgkpcdP8ruhOVn4SJH9bJ8K+UZFf/p5shH0N90lh34HAMfnR + F1/fffps7FHX7GyrXV7o6Zah5b4MreVWPc/sqUIP3Aj7iu2JGrvET7MR9k1t/6VXWftp1OS8r1pT + N9sbDUolGmTzurAPYKXe+Pjz/OvIIlx/9f2chsrfgUK/YCpo8/dt+L3o2qGOB5991VT/r28R664h + Nf/w96zmb+vKsG9g5Je/JxthX5k+ubgrwiLCvpBWTcPR5G5fs7NthH0ZHn3xddSB5xD2lWb2VKEH + Bg4j7335TebOCPsuUmMX6rE97cnA7rr0Kuv8HGpa3letqZvtjQalEg2yEfYBrFL4A0Qty8xx8ncg + /7uBl8q/8m7r3vfYRzuUFjLrOe/BZ18t62WeIe/Ieu/Lb4ruZEivG16H529rYNh3ZeRX86hLt8lc + Yd/zrggZPaHydvMXijPfJZ659VHb2gj78rRwqc0/luGp5XO33r70CvIvbj+cvR0KMXuq0AO3ocNI + /s50FvapsUv8NBth39TuuvQq6+DyNyHvq9bUzfZGg9KBzevCPgAmCvkS7lJk3m7d1NU2dse2y5wK + zdsOpV1/9f3wU6D0qy3a/E3Lrbs+d/P+X/7f/6HmHuZv61+9+XfDw74TkV8751r+nswV9m1cETLa + oeZ28z9/NvzJgkvlJwujNrfm5YX8A8//uaPkH8jADa0w7DN7utJG2LeCPdkWvrch9b2ae9hOj+1p + T4Z01w6qrItXwLF5X52mbrw35m9r29GgtHld2AfAROGvCmxczvUuf+uZt5xdKupG9OFv6dEO1ZQ4 + Pe8s6uN9IbfPpSlkiX177ub9//Rfv5e/e6NuQczfXDpT0p6nWUZm5BeyJyE/xFwnRf52b7siZPSE + mtvNfM46/+3Q+T9r/V600OWF/IcLts3cV5N/IAPHgRWGfWZPV2pqGAl5YOROd2FfyzX22RyP+bTT + Y3vakyHdtYMq69KL4Ki8r05TN94bDUqx3XL7B2EfwBqVeHSocTkrMPNu/Ziolz1qh7HtUEGhW8cb + eehgiNRV8o+3xHcYn7t5/zsvPQz5gUbVvfmb29f8mZFf4J5kyt+TucK+e64IGT2h5nYzF/bz7zEW + 9mXuzPBhNmShadvGmzzzj2VgtbC2sM/saYiQYSSqXg3Zmf7CvmZr7J306+fv3lw19uydZLOoGruD + KuvYvGl43lenqRvvjQal2G65/YOwD2CNwj8K1r6c93jnbz3zPaKXCnmZQOWpUB/tUEGavIQ8ZXBR + iUeKSghJ08L72y7pSzO41372q/zdGzU1y9/cQc0/OfIL35PJKv8Egdt95IqQ0RNqbjdnK298/Hn+ + z5q6aObBjtrcmpcX8pt6p4WH6PMXzQZGPGsL+8yehmgqXwspJvsL+9qssfdClv3nrbFn7CSbRdXY + OX+/kSrrxKRpYN5Xp6kb740GpfM2wj4AJglZFVycyY/2h2w99iNN+a+436k8FeqjHeoIqSovNft7 + xp5/+d0ru0HUOwkD+9s+6fvuKz/64e++qbxvhTY3IfJr50fJ35O5wr7tH1wRpjdCte1mjkIhd1a8 + 8fHnmQc7anNrXl6IOone+/Kb2R/uy1+9HBjxrC3sM3saIuT5x6iFwfwhdNtj2Ndgjb0XdbtjCzX2 + LJ1ks5wau48q6/SkaUjeV6Gp2++NBqXw1tgI+wBWJmpBY3Em3wAWsvXYhCXqfVOjpvDaoab8L4af + 8OCzr9Lfn+WgdiHmkFlJU19Q2id9SdRLVkftQP7mTtT8oyK/ontSuU1mDPvuuSL0Hvbl9/OQT4SM + 2uKalxdCWnun3Iukav6OQ0aDVYV9Zk/DhWw3/yeLOqnbCftCHmXaea/Vr5SGvC5v21KNvdo9KR32 + NVJlXXvhQWbel78PgSPDjL3RoBR1akxo/NOEfQCLEPXEULVblwNTj2n7HLX1qHgl6t6nbfWpUB/t + UE25h/u23963X/OVnvuYb2fIyknI/djJ9Vffz9z580lf8lf/+E/5ezV2Xpa/xStr/oGRX4U9qdYm + M4Z92z+4IrQe9mXG+vn9PGR5oX5fWu7yQlRovi1zb3nl02RI060q7DN7Gi5ko/m34bX2bt78PXnw + 2VdR3aOdGvtAyPOzDdbYK9yTK0+cbqqszLwvfx8CR4YZe6NBaW8j7ANgpKjn0AsVFcdkfr55b9oH + 30M2HXWZS79g1HuE6k+F+miHaoo+3LeT2nDaSTHcjftPLlbvQ1ZOou6jy+xvB0nfK08+Cdmrsc2e + v8WBNf+VkV+1PanQJvOGfW+u/orQeNiXuVCcv1Id8suO2uLKlxeintrefns7zSyPzwc23XbAdWo9 + YZ/Z06jttvCARuDHr9sJ+7ZxYXEjNfaBqHy22Rp7VXty5YnTU5WVk/fl78O2zG0klXujQWlvI+wD + YKSoy2jNZ4LO4lZgpsU6IZuOarfAp73qT4X6aIeaoirM03aRX+w0IU3B7j59dmylZcjKSeBL1SYv + 1BwkfX/6/b8N2Z8JH3XK3+iomv9E5Fd5T4q2ybxh3/YPa78i9B32Za4PRw3+oza68uWFwIvO9ttY + p9wzXFfeuB5SNl8ZWa4n7DN7GrXdqIdkcx7QiHpIZBsX9oUkC1FzlhZq7AMhX3vcLqHGXsmelA77 + WquyJud9TY0MM/ZGg9LeRtgHwEhRc5/KdywHPuI0Yc+jNp1/5Y1abdiZ5bU8HbRDTYF3Jg+RxofU + tpPP7vSb3n78UfojV+7zwCI8cK1mwiToIOn77is/CnmB53bS/er5G51wxl0a+c2yJ4XaZPawb/uH + VV8R+g77ch7huf7q+1Ej/6jtWl4IvOhsv72RJvx1UukCnQ7qyuOKKptPR5axYd+N+0+avfnK7GnU + nkfdhTJ5eTD24hi1bhySgQYumc5bYx8IfE3BUmrs7vekdNjXYJU1Le9rbWSYsTcalHZU4wCMEjXp + Sxe++jsfdbWdcFdtyHb3Um057eIbO3WdZSrURztUduP+k9iWHyKdbqkqS7OwdL6kn+mY9C8kqTIf + +6qogSsngR8j24489y8+0/fOL38ftSez3HIwueY/iPxm3JPwNmkh7HtvxVeEvsO+yQcYuLywFfaN + XF6IvehsQz+Pe/7Tt0OOK+rpqhN5X1TYl5p9t7dRqUoss6ftyAoq8K0UE65NsRfHbWNh3zbi7YU7 + M9bYB66/+n7UK2e3S6uxO96T0mHftskqa0Le19rIMGNvNCgFtsNG2AewGlGvc7n79Fn9nU8bDdn5 + CbeBRV3ozxs1c0xFaeC72iYXANphLrHPGrRg+O8eOB3bfvvo4pB6+yDpe+HRT3/4u7DnK6eVu/nb + zezq+8hv9j0JbJMWwr4Je3KtlytC42FffsmUhq+xz0vGLi9shX3jx9uoZbeD3chpltQrDk75IccV + GHkcuychP+y7cf/J+QZvM+wze9qOnD3FLtiOyvsCv7wZ3i2jivl0Pg58ZPjKineWGvtAGgQC32Gy + 0Bq7yz258sTptcoam/c1ODLM2BsNSmeqcQBGiqptwt9KNETUS7O34++uidrugfRzXHkLVqpgU6kc + /iLHuaZCfbRDfZVf5lnB8JWT8Du0t98uHJ0YxM4nfS88+ulbv/ht7NanjZ/52w2p+VPjNLInZ32F + fds/rPGK0HjYFzLXHvXhttjlhZ1RbWt54azAw33nd2bU53FTsXr78UeXlu4Dj6v0otnksC/9nTSU + Xdy9NsM+s6ed4bOn2M9fbr8dSK8cWPbPh4aL6paBDzymK8Xpl9TtWuPKgaJ+jX3eQdYfYtE19tnK + wr6Oq6xReV+DI8OMvdGgdKYaB2CMqOneLG+h2YlatRh7b23sFf9ie6YKJBU2F1+QWO55rrmWWPto + h1mUW36cxaiVk9g7MA+63MF7Sv+zN/77VOen3XvtZ78KfJpvb/JrY/M3vbEQkdcPA7d7Zbe8tY4r + QuPbjaqarlx7OSu5TD2qbS0vRG33tHRRS4XopW/J3l2A0sl+uuIdeFyBS4jnN72PLEeFfek/SUeX + DvzENb3BsM/saW/U7KlE5ZYOJO1D6kUHp0z6h7G5dqFuGb6InY467duJ1hgyUNSssXfSP0z/V4mb + GNXY20XV2H1XWcPzvjZHhhl7o0FJNQ7AcFEvcpnxG2dRLy4bO+MOv+7Pa/LVdvY9b6Qd5lLi3URz + GbVy0k3QmSYRY982E3j2tTP9/7Mf/KSRPWkw7KtvxivCpvmQMbCdL12mvvXwg9LL1KPa1vLCTuDD + UIUMPK7YLxMdePDZV//V//TvXnnyyQuPfnrz7afn/ef/5sl+AS0Ns2lvB+5Gg2Gf2dPeqNlTVLu1 + IKpb1h9YhgwUauyzG8K+Insy5MQJ7AANVlkD8742R4YZe6NBSTUOwHBRdU74x3+HS5uOuviOeqC+ + fm1Q1ORL/+x73kg7zCj8Q11zGbty0seqUc6HwvO33s70/+bbT7/z0qM0BZ59T4R921mvCO2HfaWf + 8KpgVNtaXtgr8UxcoOHHVeKNWOU0GPaZPZ03fPbUfmI+S7es/E7+gQOFGjt/6xth3wVDTpzuq6yB + eV+bI0P+hib3xpUPSqpxAAaKmuilUmTeA4mqhUa9i2aW8qCQnFuLZ9/5RtphXuVe5VfT2JWToo8n + 1JF+uJzfPX8HNi2FfbsZbmbkl78nwr55rwjth32NJz5DjGpbywt76aJT6EVSIUYd14JWU1sL+8ye + DoyaPS29bCvRLSvX8C08AlyHGrvBPRly4qyhyhqS933/f/2/au5z+2Hfygcl1TgAA0U9EJRZS7dz + IKPm3bNUCCXkvOFEOzSi8RXIgSasnCz6LvE0Ycnscvn7sGkv7MuM/Gbph2dGwrn7ZM3tXl/+wymj + 2tbywsGvX/lm+0LH9fzL7zZ7IAdaC/vMng6Mmj11sIwf3i0rP2k7fKC4rsbOsxH2XTDkxLm+jirr + yrzvpR9V/VRH+2Hf2boHJdU4AEOka03UNP/Kzx+XFjhLGv5GnfoVQiGZF/3Z97+RdphdOqPfXPhr + T6atnCzrdWR7afgd9d7gQmffptWwb3LkN1c/nL1HRZn9itB+2Jcs/eaKUW1reeFAsxedscd1ayFX + z6bCPrOnSw2fPT3/8ruz96hHX3ydP4YHdsvATjXEqIHilho7w0bYd8HAE2clVdbpvO+7r/zoh79r + bmTI31Bmb1ztoKQaB2CIwAvl7M9DpR2IOpbhry+rXCEUMurdO9qhfYv+ft/klZMlvsM/fxXi7EZX + 0/9Lw74Jkd9c/XD2HhWihSvCIsK+eZca8sf5UW1reeGi24+r3m9f7rgWUTM0FfaZPV1q1MufZ+91 + aTjKH0Ziu2XNNhk7UKixJ9sI+y4YeOKsp8o6nfe99rNfVTvqpYR9qx2UVOMADBH1gYBGRumowxn+ + BrNZ6oRYIb/d7EfRSDu0Y7mvSMpZObn34ZJSzqj7+fP3ZLOEsG9U5DdXP5y9U+Vr5IqwiLDvbL4v + T6WfKX++P+pILS9cqsGLzrTjutf81bOpsM/s6VKj3v887ytkd/e0tBb21Xzgsde7AvbU2C3vyfAT + Zz1V1om873v3flzzwBfUG1c4KKnGAbhS4Jzi9uOPZj+cs9C7rAdejvM3NG8o8+Czr0JuKtYODbpx + /8lSvsVz0BNyjnoRZX/6XQLL7Pz92Swn7BsY+c3VD0O2O1e33LZ0RVhK2JeG2fo/025FXdiXuTNR + ywut3Vs++bgav3q2E/aZPZ0wajFzrutdutLtdqC1sO+s4mnY610BWzX2EvZk+Imznirr7GTeV+3h + vmWFfWfrG5RU4wBcKXByl2a+sx/OWegE/I2PPx+yxZCr7Yyz3aiESzu0aYmf8MtfOWn8Nf4h3xAJ + P/sa2ZOBYd+Vkd9c/TDkt7jjirCcsO9sjnWG3U4K+zJ3JnB5oamLTs5xtbxo1k7YZ/Z0wsDZ0179 + b3I9+uLr/ZWuwbCv2pf7Jg8Ut9TYI22EfReMOnFWUmX9xxHgSN5X7ct9iwv7zlY2KKnGAbhS1Axr + f4dkCwKnjUOWPaOutlGv0Bn1qwUmXNqhZakGXtAjfiErJ6k7tXnIqaAN72/5e9XO9P9fvfl3w8O+ + E5HfXP0w6rd4wxVhOWFfarea69X7B2eEfZk7E7u80M5FJ/O47rb6EZx2wj6zp9NGXUqqZVs7B4uu + DYZ9Z7UeZcoZKDZq7DE2wr4LRp04K6my/v/jPZL3vfDopxUOf4lh39maBiXVOACnpclO1FVs9+GD + RlR+F03U1bZyHfvGx5/HFh7aoXHpMO8u5DPWUSsnDT7VWGitMn/HNi0tRDx383767TIjv7l+rKjf + 4porwnLCvrOKH586X5YI+zJ3Jnx5oZGLTv5xtfkO8EbCPrOnK439LFFq0jr97eLjFW2GfbE/xzGZ + A8U1NfZgG2Ff9o+1hirrj86vI3lfhVd/LDTsO1vNoKQaB+C0wJX/2NdlZAqchg+55zbwaptKlDpP + c5QoPLTDIqS50r3m32wf+wmbRp5qTHVsuXEyf/c27S1EZEZ++Xsyb9h3dsMVYUlh39m3tcejL74u + +ksdLKEL+zJ3ptDywuwXnZDjqjb+DNfI5+3Mnq404YnFCnnfpU+vNxv2nZV/xjZkoLilxh5gI+y7 + YMKJ032VdeBY3vfqT/+haCMsN+zb6X5QUo0DcFpUvZT+zuzHUujQtgO+phF+tS06uUtT3UKFh3ZY + kGYjv7RXJX6Xay++kyaVc1X+aTi6cf9J0R80fyc3rS5ETI788vdk9rBv564rwhK2u1PupuI0jFz8 + pYR9mTtTbnlh3ovO2I+mnf7R639S7dIjKrQqOIHZ0xATvkWY/pNynS2Vl5c+vd5y2HdW+ENUUQOg + GvtKG2HfBdNOnL6rrEuO90jeV/TJ36WHfWe9D0qqcQBOCPwcQJpAzX44BwJXR6+8kbjE1Tb9k/Bb + 11LBU/SmaO2wOKkSTk3Rwjpe2oe0J6Xfp1q/8k+169iXWU1T4uxrak8mRH75e9JI2Hd2wxVhAds9 + L/wlS8eWqYV9mTtTenmh/kUnDRQlLjrpb87yaqzUdKmenxAblWP2NNDk60v4+Hl63bXxsO/s26eZ + ChXqsQOgGvuEjbAv9MTptcq6/Mw6kvf96ff/9p1f/j62HXY6CPv+Y9N1OiipxgE4IfC5ntI31E0Q + +C6aK++8LXS1DaxP0iGkP1U6SdEOy5XOl9QylVO/9Ju+8fHntx9/VH8dL9XhRd9Olnra3afPaj46 + Wujsa21PRkV++XvSTth3dsMVofXtHoh6ejrNf0/sj7Avv3mLngU76VxLF53SV9h0UStdjaeLWurV + FdbN0hiVNtTg5OLM7GnMjzh5N6LGz9RXr7zYtR/27aQxJPyen0J7rsa+aCPsi+5+XVZZx/x/7N3f + ixzZoeD5/yW7fL0gMLoLiefW9MoW8oAELRArsGUubXXLGmm8altIXPCsh4uKZeleEGjWIDzLgqlh + aAwSc9egh54xeGCa9oOYfdiXZv2sP2D/hz23s25SzqrKjIzzO+IDnye7JUWeOBEZeb4ZkRf1vtUt + fj/7w5/jx2HErmlnNu40sZOSq3EAKCDru23MGlH4kFtytcQ4TED46BTGOQxXpmXJ8NeGvzx8MGnh + GaqrSfXDf/sPqT4lhSvV8Pno8owfD1tG5G/55eZMyFo4o4aP/yNWaFc3NDmZTEyYD+Ht787LN6l6 + WTgVhHkSDurC32IK/2L4d9NeJ4TDZPX9H9OeldXxMm6ahT9V5p6vwsKhFx/cVw/TyP1Fu9XlStja + VI3SNTZnzecqa0vvC7738LMf/u//Vxdnhppj6KQEAAwWf6kw5Ks1qwoTrkvDdcVF13Lhfw//b62Y + YhymJ+yRMNrhOvbOyzdhSIdfG4f/eCX82SD8PW3uiHUz+s4Hv3j/46MPnv32h7/+/Ueff7nzuSir + ObZ6gWGI2vktofloNvk5E3JWGP+wF8K+2PL113uv34YzrXWDmQh7eX0ID8kZ4b8J/+VqhjT1phO2 + JMzt1QsZ+O3un/yH/7rxWjxygS1Ov99ddCG6er8L/034L+cwncJRs7443364hRFbXQmsrsarDE74 + R1cbvHoT3HnGc43NvuZwlbW99wX/3b94+N0f/6qjM0PNwXRSAgC2KrO02z7jQF92pqIDy4/NazD5 + ORMCBO9d+fjcM/BfXXtQfdsAoC9Det97739UfTsBAHpnadc40B2lb0qaSn7OhAALsQ8AktL7AAAK + sLRrHOiL0jdJjSQ/Z0KAhdgHAKnpfQAAuVnaNQ50ROmbturJz5kQYCH2AUAGeh8AQFaWdo0DvVD6 + ZqJi8nMmBFiIfQCQh94HAJCPpV3jQBeUvrmpkvycCQEWYh8AZKP3AQBkYmnXONA+pW+2Cic/Z0KA + hdgHADnpfQAAOVjaNQ40TumjWPJzJgRYiH0AkJneBwCQnKVd40DLlD7WCiQ/Z0KAhdgHAPnpfQAA + aVnaNQ40S+njrKzJz5kQYCH2AUAReh8AQEKWdo0DbVL62CJT8nMmBFiIfQBQit4HAJCKpV3jQIOU + PoZInvycCQEWYh8AFKT3AQAkYWnXONAapY+9JEx+zoQAC7EPAMrS+wAA4lnaNQ40ReljnCTJz5kQ + YCH2AUBxeh8AQCRLu8aBdih9RIpMfs6EAAuxDwBq0PsAAGJY2jUONELpI5XRyc+ZEGAh9gFAJXof + AMBolnaNAy1Q+khuRPJzJgRYiH0AUI/eBwAwjqVd40B1Sh/57JX8nAkBFmIfAFSl9wEAjGBp1zhQ + l9JHAQOTnzMhwELsA4Da9D4AgH1Z2jUOVLSzv3z7B9YVSWZn8nMmBFiIfQDQAL0PAGAvlnaNA7UM + KX3vvX+3+nYyMVuSnzMhwELsA4A26H0AAMNZ2jUOVKH0Ude5yc+ZEGAh9gFAM/Q+AICBLO0aB8pT + +mjERvJzJgRYiH0A0BK9DwBgCEu7xoHClD5as05+zoQAC7EPABqj9wEA7GRp1zhQktJHs8LEcyYE + WIh9ANAevQ8AYDtLu8aBYpQ+GudMCLAQ+wCgSXofAMAWlnaNA2UofbQv/kz4z/7231R/FQCRxD4A + aJPeBwBwEZHLOFCA0kcX4s+E73989O0fPAyfwau/FoDRxD4AaJbeBwBwLpHLOJCb0kcvksS+f5rV + kh/QK7EPAFqm9wEAnCVyGQeyUvroSMLYJ/kB/RL7AKBxeh8AwAaRyziQj9JHX5LHPskP6JHYBwDt + 0/sAAIAClD6mKszbndNb8gP6JfYBQBf0PgAAICulj8mT/ICpEvsAoBd6HwAAkInSx3xIfsD0iH0A + 0BG9DwAASE7pY4YkP2BKxD4A6IveBwAAJKT0MWeSHzANYh8AdEfvAwAAklD6YCH5Af0T+wCgR3of + AAAQSemD0yQ/oF9iHwB0Su8DAABGU/rgXJIf0COxDwD6pfcBAAAjKH2wneQH9EXsA4Cu6X0AAMBe + lD4YSPIDeiH2AUDv9D4AAGAgpQ/2JfkB7RP7AGAC9D4AAGAnpQ9Gk/yAlol9ADANeh8AALCF0gfx + JD+gTWIfAEyG3gcAAJxL6YOEJD+gNWIfAEyJ3gcAAGxQ+iAHyQ9oh9gHABOj9wEAAGtKH2Ql+QEt + EPsAYHr0PgAAYKH0QSmSH1CX2AcAk6T3AQDAzCl9UJjkB9Qi9gHAVOl9AAAwW0of1CL5AeWJfQAw + YXofAADMkNIH1Ul+QEliHwBMm94HAACzovRBOyQ/oAyxDwAmT+8DAICZUPqgQZIfkJvYBwBzoPcB + AMDkKX3QMskPyEfsA4CZ0PsAAGDClD7oguQH5CD2AcB86H0AADBJSh/0RfID0hL7AGBW9D4AAJgY + pQ86JfkBqYh9ADA3eh8AAEyG0ge9k/yAeGIfAMyQ3gcAABOg9MFkSH5ADLEPAOZJ7wMAgK4pfTA9 + kh8wjtgHALOl9wEAQKeUPpgwyQ/Yl9gHAHOm9wEAQHeUPpgDyQ8YTuwDgJnT+wAAoCNKH8yK5AcM + IfYBAHofAAC04NKNR1cefHr9l7/58PiP916/ffr//H9bfPT5l8EHz3577fGLv779d0ofTJjkB2zX + dezb6/on/DdB+I/DHwl/sPrGA0BT9D4AADLZvmIzxPJH/7r6q8jq8O6z289fPfzi65hR+tkf/qz0 + wbRJfsBFeox9Sa5/wh+v/kIAoCl6HwAAOYh9F7l049H1X/7mk6/exQ/RitIHUxJOEdcev/jw+I9n + zxI//Y//7Ye//v33Hn4m+QErHcW+5Nc/1V8RALRG7wMAIDmx76yDq/dvP3+Vao3LYhdMzKUbjwae + In72hz9fe/xC8gO6iH2ufwCgGL0PAIC0xL4N1x6/SPhtdotdMDFXHny67ynio8+//M4Hv5D8YM7a + j32ufwCgML0PAICExL61g6v3Pzz+Y45lLotdMA03j47HHf4//Y//ba/eJ/nBxLQc+1z/9Cvsu3Ad + fu3xi+u//E3YicGQ31hc/ZfhHS38weWPpvaAjrMu3Xh0ePdZGKI7L9+c+/Dti4bo9vNX4U+FP3v5 + 1pPqrwKYKr0PAIBUxL6V8Ck+0xfaLXbBNFx58GnMGeDe67eXrv9Pe/U+yQ8mo9nY5/qnO6tfjL3z + 8s2Qrjf8Herm0fFyQuHv4Or98K59+/mrhKP04fEfw8gLf0Byeh8A5BA+4GT9qNug6mNOdfGzaAIr + AyOey+dwI6sC5/97r99Wf5kb7rx8k/tVjz5fXbrxKP5fv3l0/N77dw+u3pf8YG7ajH2ufzpy+daT + 8CaSMF2dK8yH8K903bPCrM59ORGuoMK/knCb21+FuP7L31TfszBteh8AJLcU+5if+FnUe+yLvFvH + 4UYOZebkpRuPqr/StYOr9wu85NHnq9vPXyUcc8kP5qbB2Of6pwvhXeP6L3+Tu/Gd9eHxH/u6wg/v + qmGgCsTr9fgk3Pil2AfofQCQ2lLsY37iZ9Gy59hX4OlVDjdGKDMnrz1+Uf2VrpVZdh53vkoYIm8e + Ha//WskP5qO12Of6p31hH6X6nsloHx7/sf27/MI76ehf1I0ZmYQvYSn2Ad/Q+wAgoaXYx/zEz6J+ + Y9/B1fvFVrocbuylzJxs6kmeBZ7hOfp8lTBEnh1zyQ/moKnY5/qnfU19LL15dBzmTPUxOVfJu/lO + Sxv7rj1+UX0vbyf2QTF6HwCkshT7mJ/4WdRv7Auf0x1utKnYtGzkSZ5lnuE5+nx1/Ze/yX0qkPxg + 2pqKfa5/2tfax9KHX3zd2i1+YXvuvX5ba0DSxr60lxk5iH1Qkt4HAEksxT7mJ34WdRr7yn+HtvpL + piPFpmUjT/Is9tNR485Xae863LJeKvnBVLUT+1z/dKHNj6Xhzbr6yKxUr2NiH5CV3gcA8ZZiH/MT + P4t6jH2FH2DlcGNfxaZlI0/yLHabybjzVdrN27kNkh9MTyOxz/VPL5r9WFq994U5XPjW1HOJfUBu + eh8ARFqKfcxP/CzqMfZV+Uxd/VXTkZIzs/qDuS7deFTsxTZ+Z99pkh9MSSOxb6rXP+FseeXBp7ef + v/rkq3fTqBItfyyt2PvCG2iVX+g7K23sayFfbndd7IMa9D4AiLEU+5if+FnUXeyr8rV2hxt7KTkz + bx4d132xJZ8p1+xv9l1E8oNpaCH2Te/65/KtJ+EdZOOH266LfflV6X1hTBopfU/FPqAUvQ8ARluK + fcxP/CzqLvYV+3UwhxujlZyZD7/4uu6L3VinzWrc+erw7rNUGzDuuamSH/Suhdg3jeufcDIM5+Tb + z1+FN69z/7nrYl9+n3z1rvBjAWrN3ouIfUAxeh8AjLMU+5if+FnUXexLXhbuvHwTPgKHcTjtyoNP + w/94+sN79RdORwq/F1R8kmfJZ3iOPl8lvB0m5j5KyQ/61ULs6/r6Z3UT35Amcl3sK6Lkb/62Vvqe + po59Jb/1NM51sQ+q0vsAYISl2Mf8xM+ivmLfwdX7CY+gOy/fXLrxaOe/eOXBp+G/rP7a6Ujh94KK + T/Is+QzPmPPV7eevkmzAzjPGTpIf9Kh67Ovx+mfnTXznui72lRLewQsMRTu/03da2thX/eXsdF3s + g9r0PgDY11LsY37iZ1FfsS/hd4Or/F4JM1H4vaDikzwLf5t99Pkqyc19CaOq5Ad9qR77Orr+GX4T + 37mui32lhLfF8E6UezI0WPqein1ADXofAOxlKfYxP/GzqK/Yd/PoOMmxU+bLzMxW+beDKk/yLPwM + z8jzVeQv9917/Tb5oqjkB72oHvt6uf7Z6ya+c10X+wrKOh/CG1yzz7cU+4Aq9D4AGG4p9jE/8bOo + r9g3+ovip6X9gA9nlX87uP38VfmXmWrxudj5avStMQ+/+Dr+AZ4XkfygfdVjXy/XP/EbeV3sKyjr + kwHuvHxT/QUWOBbKf/FphOtiHzRD7wOAgZZiH/MTP4v6in1JngXU10umR+XfDsKhUf5lxt/BUf7g + vfLg031PIx8e/zH3g84Wkh+0rXrs6+X6J34jr88p9oXdGt5iwksO703hj5x17fGLm0fHWe+Py/Rk + gHw/6RsG7c7LN2HQDu8+O3fQwv8VBm17H08Y+7pYgrgu9kFL9D4AGGIp9jE/8bOor/IV/3or/roZ + 81HlHeHw7rOSr/HyrSflX2OS89WlG49uP3818HRR+Mc9JT9oU/XY18v1T/x2Xp9B7Lv3+u21xy/2 + qmzhrSH8kRzfsckx4OF9NvlP9YW/8ObR8b5pMuyI8KfOjpvYB9Sl9wHATkuxj/mJn0Udxb4kz8mp + 8rRD5qbKO0LhuV3+GZ5pz1fhfHLt8YsPj/94dkHy3uu3YTALx9PTJD9oTd3Y19H1T/x2Xp9u7Hv4 + xdfh1UU+FDq8c6XtaDke7prkqbNr4fWGcYu8xf7yrSfhEFgPndgHVKf3AUAVST6tLH/ksYFkMavJ + meTT9LXHL6q/ECavykpO4Sd5ln+G59OZvZlKftCOurGvo+uf+O28PsXYl/Y+8cu3nqTtfWlf++if + xz3XzaPjhE/SDn9VmGCrp6em+jtHP7A03/QDeqH3AUB5Yh8tm9XkTLLYtXQwkl/CZa69FLsZrcoz + POd5/Ep+0IIJxL4y58/47ZxY7Pvkq3c5Mmva3hd5s+Fp4Q0r1YaFvyfTVU3YyIR/c5ix415gjpcG + dEfvA4DCxD5aNqvJuRT76ESSZa4Rij3Js8ozPOd8/Ep+UJfYN1D8dk4p9qW9K21DwhvoEs6N0eVr + w73Xb/f9eb5axr1kvyEOrOl9AFCS2EfLZjU5l2IfnUiy0jXCJ1+9y7eueFraB4g5fgeS/KAWsW+g + +O2cRuy7fOtJgQFP9dN4qTY11W19916/LXMxk8S4rz/l+KlEoF96HwAUI/bRsllNzqXYRyeSLL6N + k/BXgS5yePdZrVfn+F1IflCD2DdQ/HZOI/aVkermvlRzI8ltfQ+/+Lqj0rcYu1Yg9gEb9D4AKEPs + o2WzmpxLsY9OJFl8G+fOyze5X93t569qvTrH75rkByWJfQPFb6fYN1x4F2jnvTXJbX3hb+jl6Z1r + Yh+Qit4HAAWIfbRsVpNzKfbRiSSLb6Pl/kp8rWd4On7PkvygDLFvoPjtFPv2cu/120bmRpLb+go8 + nSC5cWsF5jlwLr0PAHIT+2jZrCbn33z497N6vfQrfqI2u1Y2+hmeSRKh4/dckh/kJvYNFL+dIshe + 7rx808jcePjF15GbUeDRBDmMe+HmOXARvQ8AshL7aNl8JufB1fvvf3w0n9dL12Km6CdfvYvsYlmX + y8Y9wzO8oiTf+Xf8biH5QT5i30Dx2ymC7KWR99b4Xw8M1wl9/VTfmnkOJKf3AUA+0459l248Orz7 + LHzcuP38VXilOx8FEz6Ihf8sCH8kfKzr7lcVpjcIE56cp61WsCcc+y45EqclZoqG3Rr/o3j5VszG + hcibR8fXxb4UNs4VQ24o+Pmf3n30+ZfBB89+G/5gOJFKfqMHfPIn57DBYbPDxq9exfbj/fSLvfb4 + xXLSb69i30Dx2ymC7CXJe2v8mSr+BsNwDqk+mOPM7fUCZeh9AJDJ9GLfpRuPwueL8KEs1e8urZZE + +lrRmswgTGxynmt9r8rEYt8lR+Ke0+DKg09Xq7UXvfx2Vk4i9+PoR2WuZXqS5+iv7odpKfaNlvxc + Edz/h//71me/++6Pf9Vm8qt7vM/t5Lwa7VSv997rt2HHhb8wDGOtV5RjD974n/+PjeNF7DtX/HaK + fXtJ8t4auQ3hiIvcgIdffF19JEdr+XgEuqb3AUAOk4l9q6WPJD/jvuWT2s2j44rLOzMchGlMzkWi + hawcwhnAJKw7CcP/O/xOt+ozOX5MVlMu8rdvwgTL8brGfXV/tYhXPfbV/ddHKHCuCH72hz+Hf2V4 + 8ss9jBWP90vzu0w6vPssyQ9+NfJ6C+zBcLzc+ux3f3377xLGvo6uf5Kcxgts56zEH8LxoS0cd5Hb + kPW3hrO6fOvJuJe8FPuAAfQ+AEhuArFvr6WzVJ+7W/sIM9VB6H1ynt5BJffOXvvRJKw1CQ+u3t93 + xKrP5PgxWU25m0fHkaOafIE97I5xWxJey0Ls20f4h7ImmLP+9v/8TwMf7JlvGCse78v5XSZdefBp + 5DcKhitwo1b5PfjR51+unogr9lU389gXX7fjf+c3chs++epd9WEcbfTxu/yR2AcMovcBQFpdx77w + 7ybZ/tGfvlv4IDPtQeh3cp7dTbX20c49aBJWmYSHd5+NeAJb9ZkcPyarKTf6u+JryR9yGPMMz4XY + N0ytc8VHn3957urB2eSXaRhrHe/L+V0mhX+xWOZbyRr76u7BcOD88588i38JtbZ/5/zc2FSxrzWj + v4RzWuTVQvwzPFffCOrU6OM3328rA9Oj9wFAQp3GvhHfkM8kbEatjzNzGIQeJ+e5lhONfSbhuEk4 + uitVn8nxY7Kecq09yTPmGZ4LsW+XSzceFb6b77SLYt/Z5JdjGKsc7wfzu0wK/0r8LcMjZIp9k9mD + S7Ev9XbOx+iT52mRzwGI34ZLDf8AxE6jj9/qWw70Re8DgFR6jH3XHr8Y8Q35fMLGHN59tsj/wmc4 + CN1Nzosspxj7TMJxkzBm4aj6TI4fk/WUi19WTbiAFvkMz4XYt1X1c8X22Hc6+SUfxirH+7XHs7tM + unzrSe7ff7xIjtg3pT24FPtSb+d8xN+lG/+9oMivqWT6ieFiRh8U1bcc6I7eBwBJ9BX7Dq7er3hr + wHa3n78yCMkHoaPJud1yWrHPJBw9CQ/vPov5q6rP5PgxWU+5+EdjJXySZ+QzPBdi3wXCuaLiQwjX + hsS+lbTDWP54P5jlZVI4DCumsbSxb3p7cCn2pd7OmQhv8fGjF3+dEHluKfCbnlmJfUBJeh8AxOso + 9lX82vZAYfNyP6tqboPQy+TcaTmh2GcSjp6El248ilw1qj6T48fk9JSLnEgJvzA/7q3w9AaIfWeF + c0XhX0+7SJXYV/54vzzLy6S6pe9p0sX8Se7BpdiXejvnIMlxHf6GyBNO/O8Lr78R1KlxB8WHx/O9 + HRWIpPcBQKReYl/1xZyBsva+GQ5C/MaIfdvt+3ncJIyZhPHn2+ozOX5MTk+5+O/tJ1lGG32P4elb + BsS+DYd3n7Vzrvjw3/+XcEIoHPsKH++XZ3mZ1MKrThX7Lk90Dy7FvtTbOXmpjoX4YzP+KmXg6w3/ + 0J2Xb7a8azz84uvw/4ZXFN5bS/5Y/LgfQv1Q7AMi6H0AEKOL2NfLAshKpt43z0GI35JGYt/ffPj3 + 1XfKufb6PG4SxkzCmJ/uWqs+k+PH5PSUG/1LeWvrn8yLMXo17/SPBop9pyWZ7QmtZt1779/dmfxS + DWPh432eJ+fwl7Rw62iS2DfhPSj2Jd/OaUvy9M6nKW7rC24/f5Vv34WjPvz94w78Oy/fhHeZAtVv + 3ELBh2IfEEfvA4DR2o99fS2ArCTvfbMdhPjNaCH2hXF4/+Oj6nvkXMM/j5uEo60mYZJF6eqTOX5M + NqZc5K9ThVGNfznjnpu38RBRsW+ttdL39C9n3fbkl2oYSx7vsz05N/LbdvGxb9p7UOxLvp1TFd47 + Eub7w7vP4jcp8rG6F50cwkGR5AN4OG+EfyJr8hu3nWHDwh8cOHrhPwv/8c2j42uPXyzb+Iom0AK9 + DwDGaTz29bgAsv7kYhDiByF+G6p/bFytKvce+0zCGGESpsofdSdzkjHZmHLxIxP5JM8kz/BciH2n + zhVJpnpaZ090FyW/JMNY8nif7cm5nYQUGfsmvweXYl/q7ZyYMENuHh2nvUv39vNXSbYtcjPCe8HG + XxguOZJ89D4tnEA2LkgSSr61A+d8OBh7/7lDIJ7eBwAjtBz7Dq7ej/xGZV1Jni8380GI34C6sW+9 + mNx17DMJI4VJmGoVq+JkTjUmG1Ou+pM8kzzDcyH2fSOMSZvZ4qIT3dnkl2QYix3vcz45V1mCPldM + 7JvDHhT7km9nj8I0WDu8+ywMdZg8mY7iVN+3jJ+6G++qVx58mu8tMgzmxmVJEnXf08ObabhIK/kb + hUBr9D4A2FfLsS/yhxJaEP8MmZkPQvy/XjH2nV5D7jr2mYSREq4f1prMCcfk7JSLnGCRT/JM8gzP + hdjXdrbYfqI7nfzi/62Sx/tsT85N9aOY2DeHPbgU+1JvZ7NaGMCEv6QQf4/26S0pcLB/8tW75HfD + Vd+hq9cVRi9HygS6oPcBwF6ajX2Hd59V/3CR5ONJzEdOgxD/r9eKfRt3i/Qb+0zC+H894cOpqkzm + tGNydsrFz7HRq1upnuG5EPsOf3Lz6DjVPE9uyGr5KvnF/1vFjvc5n5wTLpvfeflm9UNRG1Y3H4V/ + aGfCHh37ZrIHxb7k29ms6gMYxirhXWDxLyfHKWuns88OjVF3h55W4AcKgWbpfQAwXJuxL1zJf9Ln + L5icNfpnIwzC4rDX2Hf2p6A6jX0m4aKlhY6nE419i+jnRI3euaP71NnlppnHvmbX81eGr5ZX39TT + tmznzE/OSV57OPwHrhuH/+zw7rOwnef+u+Ni33z24FLsS72dzao7gEl+PeG0Oy/fxGxPOMBXf0/5 + G3gT9r6KO/RcD7/4uvqvsQNV6H0AMFCbsS/TDQKrx4Cc+xXu1fe3My28jLvrxCAsDruMfWdLX7+x + zyRcHHaz+F9S8ikXuRS2XlLb17ibsO68fHP2r5p57Et4O9u5+zeMeRjhw7vPzp40rjz4NPxfYV5t + OW9ML/bN+eScJB6NXgwPk3AjAYyLffPZg2Jf8u1sVq0BzBSAIj8jr3ZcrXvekwxIswfv2acrAHOg + 9wHAEA3GvtHPVdsivMyBvwsT/rPkvxc/4nO6QVhpbXLu9K3v/3T7Jei3f/Dgvffvnvtnk3ymTvh6 + TcJUkzChkpM505icuxfiJ/+IX/66fOvJuH/r3Eww59iXaYH3k6/e3Tw63isDXXT71cRi38xPzvHz + Lb6ehF2w/orCiNh3ydvrX2rt+meL+O2M+ZHHxpWPfatHO2Z6OZFlfHVIFh6Q0yMT//t9y4bv2R/9 + SAega3ofAOzUYOxL+7STcd/2DH8k7X0K+26DQVhpbXJut/Pic0vpW7S32GUSppqECRWbzPnG5KI1 + 4cgdPWLZJ+EzPBczjn05nkYY+dM84Q9eefDp6Rk1sdg385Nz/MtP9Yy7VfIb0Rpue3s9szF1N2C4 + +O0U+1JN+9y/4Ba5hfdev637qN6wAZEjsGz+Ad1+wg9mSO8DgO1ai31pv+0cPubErBaGP55qS/Za + iDYIa01Nzh1jFVf6Fo0tdpmECSfhdtufunbn5ZvTi0VlJnPWMbkou0Q+6mrEkzwTPsNzMePYl3x1 + N4xwquW7cFitDp92Yl/88e7kHH/hWvcnn+zBs5Zi3yQUiH2rU+iIe/n3FY6O3K+lgMjJVvHOxIEu + uiQDpk3vA4AtWot9CT8nxl//p10GGb4aYxDWmpqc20YpuvQtGlvsMgkTTsKLhNPvwBtMwm5d3QlS + YDLnHpOLssvoh2qu7bX6l/YZnosZx760dy4k/yGecLyHU1ALsS/V8e7kHH/hWvdmEHvw3Dkf/6+L + fdVljX1hopb8pbbGb2obLuZhnm3+iuUGz/OEedL7AOAircW+VM8Uivmq82kJH1A2/COqQVhranJe + OD4pSt+iscUukzDhJDwrvJYRa1aXbjzKPZkLjMmW7FLySZ5pn+G5mGvsu/Lg04THRaqHK541/NhJ + +HLWfv6nf3wq6bd/8DC8WcRvs5Nz/AjUvbPPHjxrKfZNQpk2FK4iwjv44d1nWav9ZGJfzO9pdhH7 + nua8eABapvcBwLmain3xd3asfPLVu4Sr4qk+7g386QSDcFo7k/MiqUrfoqXFLpMw7SQ8OywxX7Ru + QczL37LudO3xi8iBHb70N25xe0tPnGfsS3IJsdLIYl2ql7P28z+9++6Pf3XqHWG/5LfByTnJrKs4 + 2ezBfBsg9lVXvg3defkm0yM9JxP7Yg6NXmLfBK6rgXH0PgA4q6nYF/mbTWvJP0enWs8cshBtEE5r + Z3KeK2HpW7S02GUSpp2Ep01jRSJmBLbEvvifshq4hj/6Z2i2LCrOMPYl/Omxdh7DleoVrWyUvvjk + 5+Sc5N96+MXXtSZYs3vwJ//+vxTbg2ctxb5JqNWGwhGdvOBPKfaNvrlv9UDpLsTcwAh0Te8DgA1N + xb4kjzbKsYaT6hPfkI+iBuG0dibnWWlL36KlxS6TMO0kLDMhS4oZge0LMpG/HjXwF6zGrV998tW7 + LX/nDGNf5J2Ya+FcUfc31NIO42nvf3y09T1i7+Tn5LxIdOFaqy83uwe/++NfFduDmeaP2Fdd3RvB + wnGR8C6/3K8lXO2EfyJM2tPC4XPz6DjVk35PG3cjcMKb9wu44mGeMFd6HwCc1k7sS3WPQKYP0Uk+ + ee1cXDIIGxqZnGclL32LZha7TMLkk3Dt5tFxjjEpL2YQtse++N+AG5KNkj/DczHL2JdqGbCpAp7k + Fa3c+ux3298m9k1+Ts5pJ174twpX5pb34HtXPv7ZH/5cZg+etRT7JqGFpz7eefkmyXGd77WELdyZ + 3sJkThvaxl1/9hX7Kt6yDVSn9wHAWjuxb/Rz1TZkWrpJcgvDzl8zMQgbGpmcG3KUvkUzi10mYfJJ + uLLXL8o1LmYctse+MESR47zzq905nuG5mGXsS3JctPborSQv6uk3D/D8zge/GBL7hic/J+dFumNt + JZyWS94M0vIefO/Kx0kGdtzP9i3Fvkm43sZPvD384uv456XneC3hhLPXLA1np3HfTTp3TEYMQl+x + 76mb+2De9D4AWGkn9iX5VDXwGW4jhI+NST6GGISdg3BaI5PztEylb9HMYpdJmHwSrkxpfS9mHHbG + nTB5ss69HM/wXMwv9qV6bOOysQfbJnlRwY1//e8Ort4fHvuGJD8n55X4+383rH7wq8CXMVreg+9d + +TjVkzxH/OtLsW8SGol9T/fPagVey7ifbA5/JFXvG/Gvn/6nw3kyXL8FN4+Ow+AE1x6/2HgM6bnC + fxb+4/AHczyedMO4LxsAk6H3AcCipdiXZEvCB4p8Y5Xk09b2sTIIGxqZnGv5St+imcUukzD5JFyZ + zG19i8yxL/eTPHM8w3Mxv9iX5PU2+NCt+Bd1ehKGt4OEyc/JeSXVwzA3hI2/eXQcf0PQFi3vwfeu + fBzm3s//VPTtdW0p9k1CO7EvfkqkfS3jSt9KqjuCR0y8Va1LOEPC2Ttc40V+p2u7rOdwoH16HwC0 + E/uSfN+v/VWa7Q+CMwgbGpmcK1lL36KZxS6TMPkkfJrzbpoqYoZiZ+w7uHo/MhlseY7T6JK4c8LM + LfYlWaxr8Fcs41/U0zPHe6rk5+S8du/12yR76lzhL7/2+EWOr2e0vAdXse+jz78sswc3LMW+SWgt + 9sUktrSvZcRBcVqSN9ymHpp96cajMMKpblo87eZUfh0bGE3vA2Dm2ol9Sa7ws45V+PgQv4XbP+Mb + hOQDkmrxJ3fpWzSz2GUS5hiQif2MSMxQDFluGvekzbUtz3Eat2I25Aa0ucW+di4e2pnba+ce7/HJ + L8m2ZR29YifnJL8PuFM4EaWdoi3vwVXsu/XZ78rswQ1LsW/qLt14dPrRjuEkGcYhHGJZw/3Tb96+ + x4X7hLEv/uteqW5nrj4NNoRdk/wuvwafGACUp/cBMGeNrNcl+RST+yuLST73bfmMbxDOamFyLoqU + vkUbi10mYY5JGISBzTomheWeHvEPrTp3wA+u3h/3tw35ovjcYl+S46L6TM70urYc76OT33du/iJ+ + wyZzco6//3e4e6/fJvm2RuNvr6vY98Gz35bZgxuWYt+8hX0X3mcz/abbuNaW8LdBk1wBRn4JaqXN + R1wm/xnWiV1yA+PofQDMViOxL8nH/NwPykuykVt++MkgnNXC5CxT+hZtLHaZhDkm4Sdfvcs6IOXF + jMbAxerIlfxzf9Zq9ILSkPWxWcW+0dl0xEzoaG6vDDneRyS/9z8+it+2KZ2cCz8w8OEXX0cmv8bf + XlexL8k0G/72mnZwxL4JCDsxSdXaUOvRsgmP2SS/3Bf5NNF80va+Zl8mUJjeB8A8TSn25f74nGQj + tyxvGoSzqk/OYqVvcTid2GcSjv63elFgNHI8yTPfMzwXM4t9yx6+FVBrGIcf73slvyQVZkon55I3 + 962Fs8Hog7Txt9eEsW/EW95S7OOUSzceJfl8evrI3XcbUsW+hE9xn/bcS/hw5usOMeCf6H0AzFAj + sS/J9xV7X8UyCGfVnZwlS9+ijcUukzDHJBzyEMi+FBj5y7eeRA77xnOcsj7DcyH27a/N5bj417Xv + 8T4w+X3v4Wftj3nhk3Oq1fh93Xn5ZsSvgDX+9ir2DdTyTpyYtD/NuW90S3V6GfeLgeeK/8ze+NxL + VXin9xU7IIbeB8DcNBL7Cv8I1zi5V7EMwlkVJ2fh0rdoY7HLJMwxCa9PbmWvzMhH/nzPxpM8sz7D + cyH2TeW4qPW6dia/Wj+mtpfCJ+dFhh97GuiTr97te7Q2/vYq9g3U8k6cnvD+m+oG3nPv99/+T5f/ + R7e7eXRc/tgsKVVg/VDsA/6S3gfArIh9w4l9i8O5xL7ypW9xKPZNdhJeF/tGjXzkutbGItu4N7vh + z/6aVexLcsPFdbHvjC3JT+y7SK3e9/SC3wa9yHWxL/PMEfsmKeENvBv3+xfY12mfVh3/ztt+BQtX + bkn2dfUXArRG7wNgPsS+4cS+xeEsYl+V0rc4FPsmOwkP7z7LOiDllRn5SzceRY78+qa80X/V8Ecy + zir2dXGiqDWM8cf7uclP7NuiYu+7/fzVwI28LvZlnjli31QlOXae7lnnG9zX8YdJ+7Ev1bNbq78Q + oEF6HwAzIfYNJ/YtDqcf+2qVvsWh2GcSdqPMyC+iv+O9TnWjl4+G3wgg9u3r+kRjX6rjfSP5iX3b + Xb71JPLBv7lH9brYl3nmiH0TluTo3ndmxt9lJvbtK8nTU5+KfcAF9D4A5qCR2NfFM8GSrEVseaKL + QTir8OSsWPoWbSx2mYTVJ2EXYkZjr7WmyAm5fgjnuCW7vX5tR+zb13Wxb4B18rs+m29ijH7wXRio + +N+0GmfI7ZyNv70mjH0j9uBS7GOrJHfvfvLVu73+0fjPyGLfCPE7+qnYB1xM7wNg8hqJfUk+5nex + irVlIw3CWSUnZ93St2hjscskrDsJexEzGnutNSV5kufov6T8D3LNKvYNf0RqL3M7fideJLz1/M2H + fx+/bRM7OZ8rHPJJrmz38slX7w6u3m9/cLbNsXSxb8RGLsU+tgrHV5JDdedxelr8lwfEvhGS3MVZ + /VUALdP7AJi2KcW+4b+cMk7u79UbhLOKTc7qpW9xOJ3YZxKm3SkNihmNfdeaIt+kbh4dF3iG52Jm + sa/i0xpbntvxOzH3mE/s5Lx9uAonv51j2/geXMW+Wk+LXYp97BL/UM19J0n83bhi3whJTt3VXwXQ + OL0PgAmbUuzL/REmySrWlQefGoQtg7ChzOQcdrGXt/QtDqcT+0zCtDulQSWnR+TDux5+8XWBZ3gu + xL5Ru6b6TK47jHtxch43aLefv4rfpIG2fz2g8T2YMPaN2INLsY9dkhzLe02S+Gkp9o0g9gFl6H0A + TFUjsS/J41n2/S2G1sbKIJxV4N9q5zKvhcUuk7DKJOxOzGjsu9aU6uFd+9rrGZ4LsW+UvZ6o1v7c + jt+JuQ+En//pXXjLyzd6jVxSnh26cDgnuS1ou+1Ppm387XUV+z76/Msqe3Ap9rFL+TfZ+GM2bVyL + P0xy39ydhNgHFHOg9wEwRe2szMRvxtPMK4dJfkRg+xYahOQDsn1yNnWB18hil0lYeBL2KGY0Rqx9 + 3Xn5Jsm03Mtez/BczCz2LRKdKBLew9XC3I7fiQXG/Dsf/OLbP3iYKfkVPjnv6/KtJ7efv/rkq3dJ + RvKsnTerJvlXMo3PKvb97A9/rrKFS7GPXaq8yUae09LewN7aY0Uzid/Lub9zCEzJgd4HwOS0E/uS + bMnh3WeZBqrMV7INwoask7O1S7tGFrtMwpKTsFMxozEi9kU+ybPMRs4t9iUpJg3eZVB3J26X5OT8 + vYef/dMP0SZOfgc93Bi+2s5wSknSJc+6fOtJ7j2Y6e31vSsff+eDX9Tag0uxj11uHh2XnyTxzw5N + WOfjR6DBL9hsSPI+0sXTSoF2HOh9AExLO7EvyW8xbH+GUowkq807P30YhA35JmeDF3WNLHaZhMUm + Yb+KDf5avptxzjViQWxusS/JxcPT9p7kWXcnbpfk5Hzrs9+dfqdLmPzKn5wjhT2VahqvbX/8b8tv + r+9d+Tj+vqHRe3Ap9rFLlU+s8ae1hHU+fgTavxwNwxW/l2/38LRSoCkHeh8AE9JO7EuyyJD2eSmn + JVmi2fkB3yBsyDQ527yca2SxyyQsMwm7FjMa45aCk+z34UYUqLnFviSv92l76951d+J2SU7OP/vD + n8++5SVJfuVPzkmkTX7bS1zLb6/vXfn4h7/+fa09uBT72CXJd372nSSXbjyK/BdThackt7xV34k7 + dfo+AkzAgd4HwFS0E/uSfNJ/mufDfviEVeYzpkHYkOOfa/ZCrpHFLpOwwCTsXcxojIt9Sb7sPdCd + l29GbOHcYl+qPRKO6KZu7qu7E7dLdXJ+/+Ojc9/7YpJflZNzQtcev0iy/dvPby2/vX77Bw9+/qdq + e3Ap9rHV5VtPkhw72x+0e67IR/6meo+Lv8fw3uu31ffjdr2/jwC9O9D7AJiEdmLfouHfAEr1i1EG + 4emeXytNPjlbvoRrZ7HLJMw6CScgZjRGP6av2JM8x/2ozdxiX5K7DFbyPfW3/WGschT88Ne/3/Im + OC75VTk5p3X51pP44d15fmv27fX7/+p/q7gHl3OKfeO+TzJzqe7uH/FPx/9S3van+w4Upk3kZjT1 + VnuuJPc+P23v8eBARw70PgD611Tsi/8gszLie5vbRX6rc2Xgp3uDcFraydn4xVs7i10mYb5JOA0x + ozE69sUvuA00bplobrFvke5n+5o6Rhp/LalOzt/98a+2vxvum/yqnJyTi0+WO89v3l7PtZxT7Gv/ + BquLXLrxKPnEG/jvJqnk40Y+/qbC+Jv74p8m+jTprwfmkOq2vn6PL6ARB3ofAJ1rKval+mb46MXk + c6X6ZaKBd4sYhNMSTs72L9vaWewyCTNNwsmoMitSPcVru9GL1TOMfam+hP/0m7XQSzceVZ/Yi+aP + 91Qn548+/3L7G+Jeya/WyTmHyNXmnec3b6/nWs4p9j3t9s6j1W4q/xjSVIl89C2x8Sk8ctDiRyCc + 2fbd14Vnaaq9nOQ+SmDmDvQ+AHrWVOxL+FiwVB9FUy0vD/9Wp0E4LdXk7OKCrZ3FLpMwxySckpjR + iFmjTnLvyXajF6tnGPsSniiefvNt/HxLi8PvRqm7E0uO+QfPfjuk9+1MfhVPzjlEXhXvPL95ez3X + sp/Yl+RtqIWuHbObwiAUu7BJ+K2S0Rkoyfv76Jsik/xC7r6hM7zkcEQXC2epHtMaNPLFIaB3B3of + AN1qKvYt0n2v72mKj9IHV++nWlve60OWQVhLMjl7uVRrarHLJEw7CavPrrRiRiMm9qW6/eQiMYvV + M4x9i6QniqffLCAnf0bcpRuPwpQbPuvq7sTCY37t8YuBve+i5Ffl5BzeU/Jlwdyxb+Ht9TzLfmJf + ks9NaW/MLGZjN4VXkTuspLoTdmX01iZ5iua4C4wkvyU64uhYX9KE80PuNp2w9HmGJ5DQgd4HQJ9a + i31JPu+vxXwjMXy8Ch8ZUm3JXh8wDcJa/D/6z/723/RykdbUYpdJmHASin2nxSxyJllw2yJmsXqe + sS/tieLpN8uhqW4lCLNlvYQ4pdiXdszDvB3e+zaSX62Tc9ibYZ5kepZgZPka8hxgb6+ZxqSj2Pe0 + +R9QG76bwpzPMfIHV++n/aHeyAyUpNHvewN7+I+THKHhtLbv6924pAl/Q/hfkn/LYvVtnIR7udN7 + ZoFm6X0A9Ki12LdI/aC28OlsxPpD+Aye5IuUKyMWtw3CSvy/+/7HR71cnrW22GUSppqEYl/8XlhL + uDR9Vszq6zxj3yLd0vfGJIkZisu3nmzcKTCl2LdIfXL+8b/74q9v/92+ye/9e/9LrZPzesolv+Uk + /usEAxOkt9cNy35iX6obM8PgD7yRuZ3HEm7ZTWFKX3v8ItWmhuM6+VO7I79GkqrRD7+BPdU9fU9H + JbCLLmnCe2uSTn1w9f7qSaEJd/G+v0sIMITeB0B3Gox9aZ/Zsv5sMvCzVfgIk3zpcsRzyQzCSvy/ + uyX2tXZh1tpil0mYahKKfadFrgkn/PmeDZHLRLONfclv7js9VfZ6YOOlG4/C9Dg3B08s9uU4Of/w + 3/7Dd3/8qyGl73sPP/vo8y/T/ut7nZw33hpWlSHJLSfxHWfgMri31w3LfmJfwqdJhzed7RUmvKK9 + nkKc25DdFM7AN4+O//ER+vsfkqtzeKYf540/RSQ8arbfJbcKYan+rRG39e2c52HqhrNl2FkjDvzV + t3HSZr71qFY/RoBJ0vsA6EuDsW+R7d6N8HknfL4In03CBm8I/2Omjx6jnwtnEBY5Y1+Dl2QNLnaZ + hItDsS/xmESuW+Z7kmfMMzwXM459izw39522Wj0+94xxePdZGPk7L99sXx+eWOxbZDs5/6v//P/+ + 8Ne/D0Ma3jo3hP8x/F8//1P9k/O58y28a4S/J2bwkzwzcHhQ8PZ62rKf2Jc81K4ekLhxWguzcX1O + 6yv2bby0cHIOr+7cCbnXObz6FF2k/mbL6pQVptPGQZr2l3Cfjn2y5V6XNGGKhhkb/kjYm+fu5bAN + 4f9dPYE50y4e1zQBBtL7AOhIm7Ev350ChY37NXaDsBb/r58b+9q8GGtwscskXByKfYnHJH7dMvlS + 2Erkk6nmHPsu33qSY48kNL3YN+eT8/YL11XtCofz8L92df9U/GvZ60fBlt5eU49GmUOv/Omu39jX + jlTPF810+ZHP6F8qTHhrYRk9/ggm0Be9D4BetBn7Fom+Yl1d5C9EGIT4f/1s7Gv2MqzNxS6TsMGd + Ul3MaMSvW+Z4Al78T73MOfYtml8YnF7sW8z45Dz8wvXe67e3n7/auG3q9M0mp++fKv9abh650D2x + 7Cf2BfnuTjqX2Bcp4dMdL914VHjvRxp9UFzvKvbdefmm+tEBzIHeB0AXmo19B1fvZ32iSxcfPQxC + /AZsxL6WL8DaXOwyCRvcKdXFjEb8umWYk8knSfwzvmYe+8JOyfRYwiQmGftme3LO/djYcUbc4HZw + 1YXuiWVXsa/w7V1iX4xwiCX5Qc+1fD8cnNzNo+PRL7Oj2Jfk5mKAgfQ+ANrXbOxb9PBksC1Sfbqc + +SDEb8Pp2Nf4pVezi10mYYM7pa6Y0Uiybpl8rTV+H8089i2+OVE0e8vDJGPfYq4n5zZj37i7hy7f + cqH7j5Zdxb4cd5dvIfa1NivaPAVtuPf6bczh2VHsm941NtA4vQ+AxrUc+xbFP1Cn8slX7y7femIQ + 4gchfjPWsa/9i66WF7tMwgZ3SkUxo5Fk3fLw7rOE8+ThF1/Hb5LYt2j4RDHV2LeY5cm5wZX2mFtL + rjxwofuTvmJf2Nclv9gg9o2W5BmzZ7X/MM/4w7OX2BfOn9WPC2CG9D4AWtZ47Fv0+ZsmCRdAZj4I + 8Zuxin1dXG41vthlEja4U2qJGY1U65YJl9piHnW1JvattPmIswnHvsX8Ts4Nxr7Du8/swRjLrmJf + cPv5q2JDLfaNE/907n6HIvKMtOgk9iW5eAMYR+8DoFntx75F2c/U8TJ9yXCegxC/Je9/fNTLhVb7 + i10mYYM7pYqY0Ui1bplwNiZZtRb7cuyaVKYd+xYzOzm3FvuSNIXbz2d9obvsLfZduvGo2GiLfSNk + LX0rzd6Tm+TwbD/2FdjFANvpfQC0qYvYt+hkGeSTr95JLWkHIX57/vlHR71cYnWx2GUSNrhTyosZ + jVTrlqme5JnkGZ4Lse8vtXan0uRj36KTk/PP//QuvCl/6/s/fe/9u6NfaVOxL/KHsbrbg5kudJe9 + xb6S+0vs21exDNRgEUsV4q+3Hfvc0wc0Qu8DoEG9xL7FYes/a5L250sMwkr8Jn33x78qf1iN08ti + l0nY4E4pLGY0Eq5bPvzi6/i9k2rJSOzb0NSJYg6xb9H8yfnnf3oX3pHXSx+jk187sS9h6etiD+a7 + 0F12GPuK/XKf2LeXTL/Td5GmoljCW26vNxz7/E4f0BS9D4DWdBT7Ft98zGzzJ9HDMKZd8DEIKx1N + ziR7tpfXaxI2uFNKitxHqTYjye1jqdauxb6z2jlRzCT2LRo+OX/0+Zff+eAXZ1c/RiS/RmJf8tLX + +B7MeqG77DD2LdLdYL5z5Au/rqy7KZ/cz1e5SAuNPnmIbzP2lfliLcC+9D4AmtJX7Ft8803aD48b + eoJTED4QFd5r8xmEviZnpL4Wu0zCBndKMTGjkXDd8vKtJ5G7JtUzPBdi3wUaOVHMJ/Ytmjw5f/Ds + t9sXQPZKfi28uqzPCTy4OrsL3WWfsS+49vhF7sEX+4a48/JNsW9dnjsyFRt9jhDfYOyru4sBttP7 + AGhHd7Fv5cqDT1v45nMYvYrfMJzDIPQ4OUfrcbHLJGxwpxQQubMSbknkkzwTrmCLfVtUP1HMKvY1 + MuYrH33+5frRnTvXQAYmv7ohLIzq4d1n89mDP/kP/7XAhe6y29i3yP8TpWLfduEyoIWz7qUbj8qf + msIpItNjS5uKfWEXlznrAsTQ+wBoRKexb/HNN5/DJ5FaKyGNfO6Y/CB0OjnH6XSxyyRscKfkFjMa + adctI++quHTjUaotEfu2q3uiuPPyzTSGsaMxDyfn/+H+/zok8+2b/CrGvptHxyVvLam7B3/2hz9/ + 7+Fnf3XtQYFXuuw59i0yP8ixndi3eqVJfi03ibAlrf18W8lGf/v5q4TXMBsK3LI6RBjM8s/PARhN + 7wOgBf3GvpXyKyFhxFr7aDnhQeh6cu6r68Uuk7DBndLmmKRdt7x049HoLbn3+m3CLRH7hih/oth3 + NbiLYWx8zE+fnN97/27YgLTJr0r/yrqu3toe/OjzL689frHaF2LfQJdvPQnvKZkOqIqv61yHd5/d + efmm8DG4MSatfRZbK3DAhsEvcL9t+CfCea/i10XCLvbcTqA7eh8A1fUe+9bCJ4KsHzzDh46bR8eN + /yz49AZhGpNzoAksdi1MwiZ3SlNjknzdcvT6atqHX4l9wx1cvR9OFJkWxtfCiWjEbb8dDeO+Kp6c + kye/1RQqsBAdXlQ4UTSy4Jx7D/7sD3++9dnvNh67Kvbtu4+S3/jW7J1Nq8OwZPUL7xrheKyV3fcd + nLCpaSdDON2Fc2z5lx/eScPJtswdneE1hn9r+aOpXTYDs6L3AUBC6/WfVB9JPjz+Y/iU3Xjjm8Mg + uGTqy4EjEdjl0o1H1x6/uPPyTapkc+/125tHx4d3nx24HeACFU/OOe7yW3zTicIGhM1IGP7C3xZm + ZpvvOJn24H//P/7dueNfJvZNzCqORE7IjsLWIs9huBLmeRjMMOd7GYoN4TQS3pVivtyy6l8t/HhE + 2AWrk0/y7+qEmRNGSeMDJsPiFQDkcHD1/uqzZ/hUEj5E7PxgEj5Mhf9stegRPstM4xPHNAbBxVLX + DhyJwC6Xbz0Jx/vNo+MhZ4nVSnj4L++8fONEMVqVk3Om5Ldy6caj1StaTaQh6WHjRV2+1dmXu1Lt + wfeufCz2JbfaO+E0tfM5Kg+/+Dr8N2E/hv8+/Kmuv66wPgxX+S8YGKZXg7Can9cev+h9HM4Oy+Hd + Z0Pmw2ocwkms8TNS2EGrVzT8fOsiH5gPS1gAAOdymQQAU5I1+TFmj4h9AADpWMgCANjgAgkAJkny + a4fYBwCQluUsAIA1l0YAMG2SXwvEPgCA5CxqAQAsXBQBwGxIfpXHX+wDAMjA0hYAMHMuhwBgbiS/ + aiMv9gEA5GGBCwCYLRdCADBbkl+FMRf7AACyscwFAMyQSyAAQPIrOtpiHwBATha7AIBZcfEDAKxJ + foXGWewDAMjMkhcAMBMuewCAsyS/7CMs9gEA5GfhCwCYPBc8AMAWkl/GsRX7AACKsPwFAEyYSx0A + YAjJL8uoin0AAKVYBAMAJslFDgCwF8kv8XiKfQAABVkKAwAmxuUNADCO5JdsJMU+AICyLIgBAJPh + wgYAiCT5JRhDsQ8AoDjLYgDABLikAQBSkfyiRk/sAwCoweIYANA1FzMAQHKS38hxE/sAACqxRAYA + dMplDACQj+S394iJfQAA9VgoAwC64wIGAChA8ttjrMQ+AICqLJcBAB1x6QIAlCT5DRolsQ8AoDaL + ZgBAF1y0AABVSH47xkfsAwBogKUzAKBxLlcAgLokvwtHRuwDAGiDBTQAoFkuVACARkh+54yJ2AcA + 0AzLaABAg1yiAACtkfz+YjTEPgCAllhMAwCa4uIEAGiW5HcyDmIfAEBjLKkBAI1wWQIAtE/yE/sA + ABpkYQ0AqM4FCQDQkTknP7EPAKBNltcAgIpcigAAPZpn8hP7AACaZZENAKjCRQgA0LW5JT+xDwCg + ZZbaAIDCXH4AANMwn+Qn9gEANM6CGwBQjAsPAGBi5pD8xD4AgPZZdgMACnDJAQBM1bSTn9gHANAF + i28AQFYuNgCAyZtq8hP7AAB6YQkOAMjEZQYAMB/TS35iHwBARyzEAQDJucAAAGZoSslP7AMA6Ivl + OAAgIZcWAMCcTSP5iX0AAN2xKAcAJOGiAgBg0X/yE/sAAHpkaQ4AiORyAgDgtH6Tn9gHANApC3QA + wGguJAAAztVj8hP7AAD6ZZkOABjBJQQAwHZ9JT+xDwCgaxbrAIC9uHgAABiol+Qn9gEA9M6SHQAw + kMsGAIB9tZ/8xD4AgAmwcAcA7OSCAQBgtJaTn9gHADANlu8AgC1cKgAAxGsz+Yl9AACTYREPADiX + iwQAgIRaS35iHwDAlFjKAwA2uDwAAMihneQn9gEATIwFPQBgzYUBAEBWLSQ/sQ8AYHos6wEAC5cE + AACl1E1+Yh8AwCRZ3AOAmXMxAABQWK3kJ/YBAEyVJT4AmC2XAQAAtZRPfmIfAMCEWegDgBlyAQAA + UF3J5Cf2AQBMm+U+AJgVb/0AAO0ok/zEPgCAybPoBwAz4U0fAKBBuZOf2AcAMAeW/gBg8rzdAwC0 + LF/yE/sAAGbCAiAATJg3egCALuRIfmIfAMB8WAYEgEnyFg8A0Je0yU/sAwCYFYuBADAx3twBADqV + KvmJfQAAc2NJEAAmw9s6AEDv4pOf2AcAMEMWBgFgAryhAwBMRkzyOxD7AABmyfIgAHTNWzkAwPSM + TH4X/O9iHwDA5FkkBIBOeRMHAJiwcclP7AMAmCdLhQDQHW/fAABzEJ/8xD4AgJmwYAgAHfHGDQAw + KzHJ76+u/cvq2w8AQBmWDQGgC96yAQDmaXTy+9b3fxr+bPXtBwCgAIuHANC4gysfe7MGAJizcckv + XCVKfgAAM6H3AUCzwltweCP2Ng0AgOQHAMAWeh8ANEjpAwBgg+QHAMBF9D4AaIrSBwDARSQ/AADO + pfcBQCOUPgAAdtr5486SHwDADOl9AFCd0gcAwBDvjYp9kh8AwOTpfQBQkdIHAMBAMbFP8gMAmDa9 + DwCqUPoAABguPvZJfgAAE6b3AUBhSh8AAHu5KPb91bUHB1fvS34AAOh9AFCM0gcAwL62xL5//H/f + vyv5AQCg9wFAAUofAAAjbI99J/+N5AcAMHt6HwBkpfQBADDOkNh38l9KfgAA86b3AUAmSh8AAKMN + j30n/73kBwAwY3ofACSn9AEAEGPf2HfypyQ/AIC50vsAICGlDwCASONi38mflfwAAGZJ7wOAJJQ+ + AADixcS+k79B8gMAmB+9DwAiKX0AACQRH/tO/h7JDwBgZvQ+ABhN6QMAIJVUse/kb5P8AADmRO8D + gBGUPgAAEkob+07+TskPAGA29D4A2IvSBwBAWjli38nfLPkBAMyD3gcAAyl9AAAkly/2nfz9kh8A + wAzofQCwk9IHAEAOuWPfyb8i+QEATJ3eBwBbKH0AAGRSJvad/FuSHwDApOl9AHAupQ8AgHxKxr6T + f1HyAwCYLr0PADYofQAAZFU+9p38u5IfAMBE6X0AsKb0AQCQW63Yd/KvS34AAFOk9wHAYkDpC8Kb + ZvXtBACga3Vj38k2SH4AAJOj9wEwc0ofAABltBD7TrZE8gMAmBa9D4DZUvoAACimndh3sj2SHwDA + hOh9AMyQ0gcAQEmtxb6TrZL8AACmQu8DYFaUPgAACmsz9p1sm+QHADAJeh8AM6H0AQBQXsux72QL + JT8AgP7pfQBMntIHAEAV7ce+k+2U/AAAOqf3ATBhSh8AALX0EvtOtlbyAwDomd4HwCQpfQAAVNRX + 7DvZZskPAKBbeh8AE6P0AQBQV4+x72TLJT8AgD7pfQBMhtIHAEB1/ca+k+2X/AAAOqT3ATABSh8A + AC3oPfadvArJDwCgN3ofAF1T+gAAaMQ0Yt/Ja5H8AAC6ovcB0CmlDwCAdkwp9p28IskPAKAfeh8A + 3VH6AABoyvRi38nrkvwAADqh9wHQEaUPAIDWTDX2nbw6yQ8AoAd6HwBdUPoAAGjQtGPfyWuU/AAA + mqf3AdA4pQ8AgDbNIfadvFLJDwCgbeHSdPsiqt4HQC1KHwAAzZpP7Dt5vZIfAEDDdi6l6n0AlKf0 + AQDQsrnFvpNXLfkBALRK7wOgKUofAACNm2fsO3ntkh8AQJP0PgAaofQBANC+Oce+kxGQ/AAA2qP3 + AVCd0gcAQBfEvpNxkPwAABqj9wFQkdIHAEAvxL6/GA3JDwCgJXofAFUofQAAdETsO2dMJD8AgGbo + fQAUpvQBANAXse/CkZH8AADaoPcBUIzSBwBAd8S+HeMj+QEANEDvA6AApQ8AgB6JfYNGSfIDAKhN + 7wMgK6UPAIBOiX17jJXkBwBQld4HQCZKHwAA/RL79h4xyQ8AoB69D4DklD4AALom9o0cN8kPAKAS + vQ+AhJQ+AAB6J/ZFjZ7kBwBQg94HQBJKHwAAEyD2JRhDyQ8AoDi9D4BISh8AANMg9iUbSckPAKAs + vQ+A0ZQ+AAAmQ+xLPJ6SHwBAQXofACMofQAATInYl2VUJT8AgFL0PgD2ovQBADAxYl/GsZX8AACK + 0PsAGEjpAwBgesS+7CMs+QEA5Kf3AbCT0gcAwCSJfYXGWfIDAMhM7wNgC6UPAICpEvuKjrbkBwCQ + k94HwLmUPgAAJkzsqzDmkh8AQDZ6HwAblD4AAKZN7Ks28pIfAEAeeh8Aa0ofAACTJ/ZVHn/JDwAg + A70PgIXSBwDAPIh9LZD8AACS0/sAZk7pAwBgJsS+dkh+AABp6X0As6X0AQAwH2JfayQ/AICE9D6A + GVL6AACYFbGvTZIfAEAqeh/ArCh9AADMjdjXMskPACAJvQ9gJpQ+AABmSOxrn+QHABBP7wOYPKUP + AIB5Evt6IfkBAETS+wAmTOkDAGC2xL6+SH4AADH0PoBJUvoAAJgzsa9Hkh8AwGh6H8DEKH0AAMyc + 2NevVfLb+YlG8gMA2KD3AUyG0gcAAGJf7957/+63vv9TyQ8AYC96H8AEKH0AALAQ+6ZC8gMA2Jfe + B9A1pQ8AAFbEvimR/AAA9qL3AXRK6QMAgDWxb3okPwCA4fQ+gO4ofQAAcJrYN1WSHwDAQHofQEeU + PgAA2CD2TZvkBwAwhN4H0AWlDwAAzhL75kDyAwDYSe8DaJzSBwAA5xL75kPyAwDYTu8DaJbSBwAA + FxH75kbyAwDYQu8DaJDSBwAAW4h98yT5AQBcRO8DaIrSBwAA24l9cyb5AQCcS+8DaITSBwAAO4l9 + SH4AAGfpfQDVKX0AADCE2MeK5AcAsEHvA6hI6QMAgIHEPk6T/AAATtP7AKpQ+gAAYDixj7MkPwCA + Nb0PoDClDwAA9iL2cRHJDwBgRe8DKEbpAwCAfYl9bCf5AQAs9D6AIpQ+AAAYQexjCMkPAEDvA8hK + 6QMAgHHEPoaT/ACAmdP7ADJR+gAAYDSxj31JfgDAnOl9AMkpfQAAEEPsYxzJDwCYLb0PICGlDwAA + Iol9xJD8AIB50vsAklD6AAAgnthHPMkPAJghvQ8gktIHAABJiH2kIvkBAHOj9wGMpvQBAEAqYh9p + SX4AwKzofQAjKH0AAJCQ2EcOkh8AMB96H8BelD4AAEhL7CMfyQ8AmAm9D2AgpQ8AAJIT+8hN8gMA + 5kDvA9hJ6QMAgBzEPsqQ/ACAydP7ALZQ+gAAIBOxj5IkPwBg2vQ+gHMpfQAAkI/YR3mSHwAwYXof + wAalDwAAshL7qEXyAwCmSu8DWFP6AAAgN7GPuiQ/AGCS9D6AhdIHAABFiH20QPIDAKZH7wNmTukD + AIAyxD7aIfkBABOj9wGzpfQBAEAxYh+tkfwAgCkZ0vssdwMTo/QBAEBJYh9tkvwAgMmw6A3MipMe + AAAUJvbRMskPAJgGS9/ATDjdAQBAeWIf7ZP8AIAJsAAOTJ4THQAAVCH20QvJDwDonWVwYMKc4gAA + oBaxj75IfgBA1yyGA5Pk5AYAABWJffRI8gMA+mVJHJgYpzUAAKhL7KNfkh8A0CkL48BkhM9W3/6B + ExoAANQk9tE7yQ8A6JHeB0zAN6XvgVMZAADUJfYxDZIfANAdvQ/omtIHAACNEPuYEskPAOiL3gd0 + SukDAIB2iH1Mj+QHAHRE7wO6o/QBAEBTxD6mSvIDAHqh9wEdUfoAAKA1Yh/TJvkBAF3Q+4AuKH0A + ANAgsY85kPwAgPbpfUDjlD4AAGiT2Md8SH4AQOP0PqBZSh8AADRL7GNuJD8AoGV6H9AgpQ8AAFom + 9jFPkh8A0Cy9D2iK0gcAAI0T+5gzyQ8AaJPeBzRC6QMAgPaJfSD5AQAN0vuA6pQ+AADogtgHK5If + ANAavQ+oSOkDAIBeiH1wmuQHADRF7wOqUPoAAKAjYh+cJfkBAO3Q+4DClD4AAOiL2AcXkfwAgEbo + fUAxSh8AAHRH7IPtJD8AoAV6H1CA0gcAAD0S+2AIyQ8AqE7vA7JS+gAAoFNiHwwn+QEAdel9QCZK + HwAA9Evsg31JfgBARXofkJzSBwAAXRP7YBzJDwCoRe8DElL6AACgd2IfxJD8AIAq9D4gCaUPAAAm + QOyDeJIfAFCe3gdEUvoAAGAaxD5IRfIDAArT+4DRlD4AAJgMsQ/SkvwAgJL0PmCEIaXvW1d/Wn07 + AQCAIcQ+yEHyAwCK0fuAvQy6p+/q/erbCQAADCT2QT6SHwBQht4HDKT0AQDA9Ih9kJvkBwAUoPcB + Oyl9AAAwSWIflCH5AQC56X3AFkofAABMldgHJUl+AEBWeh9wLqUPAAAmTOyD8iQ/ACAfvQ/YoPQB + AMC0iX1Qi+QHAGSi9wFrSh8AAEye2Ad1SX4AQA56H7BQ+gAAYB7EPmiB5AcAJKf3wcwpfQAAMBNi + H7RD8gMA0tL7YLaUPgAAmA+xD1oj+QEACel9MENKHwAAzIrYB22S/ACAVPQ+mBWlDwAA5kbsg5ZJ + fgBAEnofzITSBwAAMyT2QfskPwAgnt4Hk6f0AQDAPIl90AvJDwCIpPfBhCl9AAAwW2If9EXyAwBi + 6H0wSUofAADMmdgHPZL8AIDR9D6YGKUPAABmTuyDfkl+AMA4eh9MhtIHAPD/s3enuVEsSwBG9+IB + swgLMJh1cJn3v4Nnq+/1szy0q6uyMiMij3R+MmS3S4LUp4gCxD7ITvIDAFbQ+6AApQ8AADgT+6AK + yQ8AOJXeB6kpfQAAwIHYB5VIfgDASfQ+SErpAwAAHoh9UI/kBwAsp/dBOkofAADwmNgHVUl+AMBC + eh8kovQBAABPiH1Qm+QHACyh90EKSh8AAPCc2AczkPwAgDfpfRCc0gcAALxI7IN5SH4AwHF6H4Sl + 9AEAAK8R+2A2kh8AcITeBwEpfQAAwBFiH8xJ8gMAXqP3QShKHwAAcJzYBzOT/ACAF+l9EITSBwAA + vEnsAyQ/AOA5vQ+GU/oAAIAlxD7gQPIDAJ7Q+2AgpQ8AAFhI7AMek/wAgMf0PhhC6QMAAJYT+4Dn + JD8A4IHeB50pfQAAwEnEPuA1kh8AcKD3QTdKHwAAcCqxDzhO8gMAzvQ+6ELpAwAAVhD7gCUkPwBA + 74NdKX0AAMA6Yh+wnOQHAJPT+2AnSh8AALCa2AecSvIDgJnpfdCc0gcAAGwh9gHrSH4AMC29DxpS + +gAAgI3EPmALyQ8A5qT3QRNKHwAAsJ3YB2wn+QHAhPQ+2EjpAwAAmhD7gFYkPwCYjd4Hqyl9AABA + K2If0JbkBwBT0ftgBaUPAABoSOwD9iD5AcA89D44idIHAAC0JfYB+5H8AGASeh8spPQBAADNiX3A + 3iQ/AJiB3gdvUvoAAIA9iH1AH5IfAJSn98ERSh8AALATsQ/oSfIDgNr0PniR0gcAAOxH7AP6k/wA + oDC9D55Q+gAAgF2JfcAokh8AVKX3wQOlDwAA2JvYB4wl+QFASXofnCl9AABAF2IfEIHkBwD16H1M + TukDAAD6EPuAOCQ/AChG72NaSh8AANCN2AdEI/kBQCV6HxNS+gAAgJ7EPiAmyQ8AytD7mIrSBwAA + dCb2AZFJfgBQg97HJJQ+AACgP7EPiE/yA4AC9D7KU/oAAIAhxD4gC8kPALLT+yhM6QMAAEYR+4Bc + JD8ASE3voySlDwAAGEjsAzKS/AAgL72PYpQ+AABgLLEPyEvyA4Ck9D7KUPoAAIDhxD4gO8kPADLS + +yhA6QMAACIQ+4AaJD8ASEfvIzWlDwAACELsAyqR/AAgF72PpJQ+AAAgDrEPqEfyA4BE9D7SUfoA + AIBQxD6gKskPALLQ+0hE6QMAAKIR+4DaJD8ASEHvIwWlDwAACEjsA2Yg+QFAfHofwSl9AABATGIf + MA/JDwCC0/sIS+kDAADCEvuA2Uh+ABCZ3kdASh8AABCZ2AfMSfIDgLD0PkJR+gAAgODEPmBmkh8A + xKT3EYTSBwAAxCf2AUh+ABCQ3sdwSh8AAJCC2AdwIPkBQDR6HwMpfQAAQBZiH8Bjkh8AhKL3MYTS + BwAAJCL2ATwn+QFAHHofnSl9AABALmIfwGskPwAIQu+jG6UPAABIR+wDOE7yA4AI9D46UPoAAICM + xD6AJSQ/ABhO72NXSh8AAJCU2AewnOQHAGPpfexE6QMAAPIS+wBOJfkBwEB6H80pfQAAQGpiH8A6 + kh8AjKL30ZDSBwAAZCf2AWwh+QHAEHofTSh9AABAAWIfwHaSHwD0p/exkdIHAADUIPYBtCL5AUBn + eh+rKX0AAEAZYh9AW5IfAPSk97GC0gcAAFQi9gHsQfIDgG70Pk6i9AEAAMWIfQD7kfwAoA+9j4WU + PgAAoB6xD2Bvkh8AdKD38SalDwAAKEnsA+hD8gOAvel9HKH0AQAAVYl9AD1JfgCwK72PFyl9AABA + YWIfQH+SHwDsR+/jCaUPAACoTewDGEXyA4Cd6H08UPoAAIDyxD6AsSQ/ANiD3seZ0gcAAMxB7AOI + QPIDgOb0vskpfQAAwCTu7r8vXnnu7kTDzwYwG8kPANrS+2b27ovSBwAAzOK1i8/wgwHMSfIDgIb0 + vjld3PxS+gAAgHmIfQABSX4A0IreNxulDwAAmI3YBxCW5AcATeh981D6AACACYl9AMFJfgCwnd43 + A6UPAACYk9gHkILkBwAb6X21KX0AAMC0xD6ARCQ/ANhC76tK6QMAAGYm9gGkI/kBwGp6Xz1KHwAA + MDmxDyApyQ8A1tH7KlH6AAAAxD6A1CQ/AFhB76tB6QMAADgT+wBKkPwA4FR6X3ZKHwAAwIHYB1CG + 5AcAJ9H78lL6AAAAHoh9AMVIfgCwnN6XkdIHAADwmNgHUJLkBwAL6X25KH0AAABPiH0AhUl+ALCE + 3peF0gcAAPCc2AdQnuQHAG/S++JT+gAAAF4k9gFMQvIDgOP0vsiUPgAAgNeIfQBTkfwA4Ai9Lyal + DwAA4AixD2BCkh8AvEbvi0bpAwAAOE7sA5iW5AcAL9L74lD6AAAA3iT2AUxO8gOA5/S+CJQ+AACA + JcQ+AM4kPwB4Ru8bS+kDAABYSOwD4IHkBwCP6X2jKH0AAADLiX0APCH5AcADva8/pQ8AAOAkYh8A + L5L8AOBA7+tJ6QMAADiV2AfAEZIfAJzpfb28Wfreffkz/JAAAADRiH0AvEnyAwC9b29vlr6r2z/+ + XwEAAPCc2AfAQpIfAJPT+/aj9AEAAKwm9gFwEskPgJnpfXtQ+gAAALYQ+wBYQfIDYFp6X1tKHwAA + wEZiHwCrSX4AzEnva0XpAwAA2E7sA2AjyQ+ACel92yl9AAAATYh9ADQh+QEwG71vC6UPAACgFbEP + gIYkPwCmoveto/QBAAA0JPYB0JzkB8A89L5TKX0AAABtiX0A7ETyA2ASet9ySh8AAEBzYh8Au5L8 + AJiB3reE0gcAALAHsQ+ADiQ/AMrT+45T+gAAAHYi9gHQjeQHQG1632uUPgAAgP2IfQB0JvkBUJje + 95zSBwAAsCuxD4AhJD8AqtL7HlP6AAAA9ib2ATCQ5AdASXrfgdIHAADQgdgHwHCSHwD16H1KHwAA + QB9iHwBBSH4AFDNz71P6AAAAuhH7AAhF8gOgkjl7n9IHAADQk9gHQECSHwBlzNb7lD4AAIDOxD4A + wpL8AKhhnt6n9AEAAPQn9gEQnOQHQAEz9D6lDwAAYAixD4AUJD8Asqvd+5Q+AACAUcQ+ABKR/ABI + rWrvU/oAAAAGEvsASEfyAyCver1P6QMAABhL7AMgKckPgKQq9T6lDwAAYDixD4DUJD8AMqrR+5Q+ + AACACMQ+AAqQ/ABIJ3vvU/oAAACCEPsAKEPyAyCXvL1P6QMAAIhD7AOgGMkPgEQy9j6lDwAAIBSx + D4CSJD8AssjV+5Q+AACAaMQ+AAqT/ABIIUvvU/oAAAACEvsAKE/yAyC++L1P6QMAAIhJ7ANgEpIf + AMFF7n1KHwAAQFhiHwBTkfwAiCxm71P6AAAAIhP7AJiQ5AdAWNF6n9IHAAAQnNgHwLQkPwBiitP7 + lD4AAID4xD4AJif5ARBQhN6n9AEAAKQg9gHAmeQHQDxje5/SBwAAkIXYBwAPJD8AQhnV+5Q+AACA + RMQ+AHhC8gMgjv69T+kDAADIRewDgBdJfgAE0bP3KX0AAADpiH0AcITkB0AEfXqf0gcAAJCR2AcA + b5L8ABhu796n9AEAACQl9gHAQpIfAGPt1/uUPgAAgLzEPgA4ieQHwEB79D6lDwAAIDWxDwBWkPwA + GKVt71P6AAAAshP7AGA1yQ+AIVr1PqUPAACgALEPADaS/ADob3vvU/oAAABqEPsAoAnJD4DOtvQ+ + pQ8AAKAMsQ8AGpL8AOhpXe9T+gAAACoR+wCgOckPgG5O7X1KHwAAQDFiHwDsRPIDoI+Tep/SBwAA + UIzYBwC7kvwA6GB571P6AAAAihH7AKADyQ+AvS3sfUofAABAMWIfAHQj+QGwqyW9T+kDAAAoRuwD + gM4kPwD2s6L3KX0AAACpiX0AMITkB8BOTup9Sh8AAEB2Yh8ADCT5AbCHhb1P6QMAAChA7AOA4SQ/ + AJp7s/cpfQAAADWIfQAQhOQHQFtHep/SBwAAUIbYBwChSH4ANPRi71P6AAAAKhH7ACAgyQ+AVp70 + PqUPAACgGLEPAMKS/ABo4nHv8w8EAABAMWIfAAQn+QGw3UPvG34SAAAA2hL7ACAFyQ+AjQ69b/gx + AAAAaEvsA4BEJD8Atji//mf4GQAAAGhL7AOAdCQ/AAAAAOBA7AOApCQ/AAAAAEDsA4DUJD8AAAAA + mJnYBwAFSH4AAAAAMCexDwDKkPwAAAAAYDZiHwAUI/kBAAAAwDzEPgAoSfIDAAAAgBmIfQBQmOQH + AAAAALWJfQBQnuQHAAAAAFWJfQAwCckPAAAAAOoR+wBgKpIfAAAAAFQi9gHAhCQ/AAAAAKhB7AOA + aUl+AAAAAJCd2AcAk5P8AAAAACAvsQ8AOJP8AAAAACAnsQ8AeCD5AQAAAEAuYh8A8ITkBwAAAABZ + iH0AwIskPwAAAACIT+wDAI6Q/AAAAAAgMrEPAHiT5AcAAAAAMYl9AMBCkh8AAAAARCP2AQAnkfwA + AAAAIA6xDwBYQfIDAAAAgAjEPgBgNckPAAAAAMYS+wCAjSQ/AAAAABhF7AMAmpD8AAAAAKA/sQ8A + aEjyAwAAAICexD4AoDnJDwAAAAD6EPsAgJ1IfgAAAACwN7EPANiV5AcAAAAA+xH7AIAOJD8AAAAA + 2IPYBwB0I/kBAAAAQFtiHwDQmeQHAAAAAK2IfQDAEJIfAAAAAGwn9gEAA0l+AAAAALCF2AcADCf5 + AQAAAMA6Yh8AEITkBwAAAACnEvsAgFAkPwAAAABYTuwDAAKS/AAAAABgCbEPAAhL8gMAAACA48Q+ + ACA4yQ8AAAAAXiP2AQApSH4AAAAA8JzYBwAkIvkBAAAAwGNiHwCQjuQHAAAAAAdiHwCQlOQHAAAA + AGIfAJCa5AcAAADAzMQ+AKAAyQ8AAACAOYl9AEAZkh8AAAAAsxH7AIBiJD8AAAAA5iH2AQAlSX4A + AAAAzEDsAwAKk/wAAAAAqE3sAwDKk/wAAAAAqErsAwAmIfkBAAAAUI/YBwBMRfIDAAAAoBKxDwCY + kOQHAAAAQA1iHwAwLckPAAAAgOzEPgBgcuuS352Lm1+SHwAAAABjiX0AAGeSHwAAAAA5iX0AAA8k + PwAAAAByEfsAAJ6Q/AAAAADIQuwDAHiR5AcAAABAfGIfAMARkh8AAAAAkYl9AABvkvwAAAAAiEns + AwBYSPIDAAAAIBqxDwDgJJIfAAAAAHGIfQAAK0h+AAAAAEQg9gEArCb5AQAAADCW2AcAsJHkBwAA + AMAoYh8AQBOSHwAAAAD9iX0AAA1JfgAAAAD0JPYBADQn+QEAAADQh9gHALATyQ8AAACAvYl9AAC7 + kvwAAAAA2I/YBwDQgeQHAAAAwB7EPgCAbiQ/AAAAANoS+wAAOpP8AAAAAGhF7AMAGELyAwAAAGA7 + sQ8AYCDJDwAAAIAtxD4AgOEkPwAAAADWEfsAAIKQ/AAAAAA4ldgHABCK5AcAAADAcmIfAEBAkh8A + AAAAS4h9AABhSX4AAAAAHCf2AQAEJ/kBAAAA8BqxDwAgBckPAAAAgOfEPgCARCQ/AAAAAB4T+wAA + 0pH8AAAAADgQ+wAAkpL8AAAAABD7AABSk/wAAAAAZib2AQAUIPkBAAAAzEnsAwAoQ/IDAAAAmI3Y + BwBQjOQHAAAAMA+xDwCgJMkPAAAAYAZiHwBAYZIfAAAAQG1iHwBAeZIfAAAAQFViHwDAJCQ/AAAA + gHrEPgCAqUh+AAAAAJWIfQAAE5L8AAAAAGoQ+wAApiX5AQAAAGQn9gEATE7yAwAAAMhL7AMA4Ezy + AwAAAMhJ7AMA4IHkBwAAAJCL2AcAwBOSHwAAAEAWYh8AAC+S/AAAAADiE/sAADhC8gMAAACITOwD + AOBNkh8AAABATGIfAAALSX4AAAAA0Yh9AACcRPIDAAAAiEPsAwBgBckPAAAAIAKxDwCA1SQ/AAAA + gLHEPgAANpL8AAAAAEYR+wAAaELyAwAAAOhP7AMAoCHJDwAAAKAnsQ8AgOYkPwAAAIA+xD4AAHYi + +QEAAADsTewDAGBXkh8AAADAfsQ+AAA6kPwAAAAA9iD2AQDQjeQHAAAA0JbYBwBAZ5IfAAAAQCti + HwAAQ0h+AAAAANuJfQAADCT5AQAAAGwh9gEAMJzkBwAAALCO2AcAQBCSHwAAAMCpxD4AAEKR/AAA + AACWE/sAAAhI8gMAAABYQuwDACAsyQ8AAADgOLEPAIDgJD8AAACA14h9AACkIPkBAAAAPCf2AQCQ + iOQHAAAA8JjYBwBAOpIfAAAAwIHYBwBAUpIfAAAAgNgHAEBqkh8AAAAwM7EPAIACJD8AAABgTmIf + AABlSH4AAADAbMQ+AACKkfwAAACAeYh9AACUJPkBAAAAMxD7AAAoTPIDAAAAahP7AAAoT/IDAAAA + qhL7AACYhOQHAAAA1CP2AQAwFckPAAAAqETsAwBgQpIfAAAAUIPYBwDAtCQ/AAAAIDuxDwCAyUl+ + AAAAQF5iHwAAnEl+AAAAQE5iHwAAPJD8AAAAgFzEPgAAeELyAwAAALIQ+wAA4EWSHwAAABCf2AcA + AEdIfgAAAEBkYh8AALxJ8gMAAABiEvsAAGAhyQ8AAACIRuwDAICTSH4AAABAHGIfAACsIPkBAAAA + EYh9AACwmuQHAAAAjCX2AQDARpIfAAAAMIrYBwAATUh+AAAAQH9iHwAANCT5AQAAAD2JfQAA0Jzk + BwAAAPQh9gEAwE4kPwAAAGBvYh8AAOxK8gMAAAD2I/YBAEAHkh8AAACwB7EPAAC6kfwAAACAtsQ+ + AADoTPIDAAAAWhH7AABgCMkPAAAA2E7sAwCAgSQ/AAAAYAuxDwAAhpP8AAAAgHXEPgAACELyAwAA + AE4l9gEAQCiSHwAAALCc2AcAAAFJfgAAAMASYh8AAIQl+QEAAADHiX0AABCc5AcAAAC8RuwDAIAU + JD8AAADgObEPAAASkfwAAACAx8Q+AABIR/IDAAAADsQ+AABISvIDAAAAxD4AAEhN8gMAAICZiX0A + AFCA5AcAAABzEvsAAKAMyQ8AAABmI/YBAEAxkh8AAADMQ+wDAICSJD8AAACYgdgHAACFSX4AAABQ + m9gHAADlSX4AAABQldgHAACTkPwAAACgHrEPAACmIvkBAABAJWIfAABMSPIDAACAGsQ+AACYluQH + AAAA2Yl9AAAwOckPAAAA8hL7AACAM8kPAAAAchL7AACAB5IfAAAA5CL2AQAAT0h+AAAAkIXYBwAA + vEjyAwAAgPjEPgAA4AjJDwAAACIT+wAAgDdJfgAAABCT2AcAACwk+QEAAEA0Yh8AAHASyQ8AAADi + EPsAAIAVJD8AAACIQOwDAABWk/wAAABgLLEPAADYSPIDAACAUcQ+AACgCckPAAAA+hP7AACAhiQ/ + AAAA6EnsAwAAmpP8AAAAoA+xDwAA2InkBwAAAHsT+wAAgF1JfgAAALAfsQ8AAOhA8gMAAIA9iH0A + AEA3kh8AAAC0JfYBAACdSX4AAADQitgHAAAMIfkBAADAdmIfAAAwkOQHAAAAW4h9AADAcJIfAAAA + rCP2AQAAQUh+AAAAcCqxDwAACEXyAwAAgOXEPgAAICDJDwAAAJYQ+wAAgLAOye/qVvIDAACAl4l9 + AABAfBcff0h+AAAA8JzYBwAAZCH5AQAAwBNiHwAAkIvkBwAAAA/EPgAAICPJDwAAAM7EPgAAIDPJ + DwAAgMmJfQAAQHaSHwAAANMS+wAAgBokPwAAACYk9gEAAJVIfgAAAExF7AMAAOqR/AAAAJiE2AcA + AFQl+QEAAFCe2AcAANQm+QEAAFCY2AcAAMxA8gMAAKAksQ8AAJiH5AcAAEAxYh8AADAbyQ8AAIAy + xD4AAGBOkh8AAAAFiH0AAMDMJD8AAABSE/sAAAAkPwAAAJIS+wAAAA4kPwAAANIR+wAAAB6T/AAA + AEhE7AMAAHhO8gMAACAFsQ8AAOA1kh8AAADBiX0AAADHSX4AAACEJfYBAAAsIfkBAAAQkNgHAACw + nOQHAABAKGIfAADAqSQ/AAAAghD7AAAA1pH8AAAAGE7sAwAA2ELyAwAAYCCxDwAAYDvJDwAAgCHE + PgAAgFYkPwAAADoT+wAAANqS/AAAAOhG7AMAANiD5AcAAEAHYh8AAMB+JD8AAAB2JfYBAADsTfID + AABgJ2IfAABAH5IfAAAAzYl9AAAAPUl+AAAANCT2AQAA9Cf5AQAA0ITYBwAAMIrkBwAAwEZiHwAA + wFiSHwAAAKuJfQAAABFIfgAAAKwg9gEAAMQh+QEAAHASsQ8AACAayQ8AAICFxD4AAICYJD8AAADe + JPYBAABEJvkBAABwhNgHAAAQn+QHAADAi8Q+AACALCQ/AAAAnhD7AAAAcpH8AAAAeCD2AQAAZLQu + +Q0/NgAAAG25AAIAAOR1avIbfmAAAADacgEEAADIbnnyG35UAAAA2nIBBAAAqGFJ8ht+SAAAANpy + AQQAAKjkePIbfjwAAADacgEEAACo57XkN/xgAAAAtCX2AQAAVPU8+Q0/EgAAAG2JfQAAALU9Tn7D + DwMAAEBbYh8AAMAMDslv+DEAAABoS+wDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAASErsAwAAAAAAgKTEPgAAAAAA + AEhK7AMAAAAAAICkxD4AAAAAAABISuwDAAAAAACApMQ+AAAAAAAACOv8+tv5h+8HFx9/XH76+dhr + se/JL7v7jQ9/yPn1P8M/FAAAAAAAANRwyHkXH74fwty7L3/uXN3+fS3ktfL+69/D33V58ygIXn8b + /oUAAAAAAABATP8f0Pv8++r2z95Fb527g91HQAUQAAAAAACAiZ1ff/t3ZO8+7e0+rLdn/vv7b/7T + /gAAAAAAAKjr/L+69/5r4rp33GEFqPYHAAAAAABAdv+O7938DLuWc293H/zu49/v/BT+AAAAAAAA + yOB87sD3Rvgz8QcAAAAAAEAw90N8H39cfv49vKml8O7LH+N+AAAAAAAAjHV+/c/lJ0N8613d/r28 + +Xn3NQ7/UQIAAAAAADCJ+8Z3v6jz7/BYVsbdl3lx8+viw/fhP1wAAAAAAABKOr/+pvF1qH5m/QAA + AAAAAGjl8D4+uzr7Vz/v9QMAAAAAAGC1iw/fL25+Dc9ek7v8/Pvi44/hDwMAAAAAAAAp/DfKZ11n + IO+/HtZ7GvQDAAAAAADgZedG+cK7H/T78H34owIAAAAAAEAcFx9/vPvirXxpeKMfAAAAAAAANnam + dr/b85PdngAAAAAAANM5v/52+enn+68yXwUXN78kPwAAAAAAgBnIfFVJfgAAAAAAAIXJfDOQ/AAA + AAAAAIqR+WYj+QEAAAAAABQg883s8uan5AcAAAAAAJDUxccfV7cy39Tef/17+UnyAwAAAAAAyOT8 + w/er2z/DSxNBXN3+vfj4Y/hjCQAAAAAAwHH3ezs//x5elwjo3Zc/5x++D39EAQAAAAAAeO7wer7h + RYngLm5+2eoJAAAAAAAQysX93k6v52OR919t9QQAAAAAAAjB3k7Wud/qef3P8AcYAAAAAABgWhcf + f7z/aqCP9S4//bTVEwAAAAAAoLPz62/vvvwZnooo4Or27/mH78MfaQAAAAAAgElcfvo5vBBRzOWN + ET8AAAAAAIB9GehjP0b8AAAAAAAA9uMNfXRw+enn8EcdAAAAAACgkvPrb5effw/PQEzi6vaPlZ4A + AAAAAABNnH/4bqCPzv7H3t3mto1sCRjeyy1S1GxhQEiiRc0yRp+m7v5XME7SnauJE7csSzpV5AM8 + 6F/daCNhHcB4UafePrlqeQj/+AEAAAAAAIpWr47h3YfJqrqTK34AAAAAAAA3SO226Yfw3MPEfV/p + uQs/DgAAAAAAAAWxupN8WOkJAAAAAABwPas7yVDVncKPBgAAAAAAQM5Su61fXsOzDvzW95WenvAD + AAAAAAD4jdTuPNJH5uabsyf8AAAAAAAAfuGRPgriCT8AAAAAAICfquUhPN/Ap9TdMfzgAAAAAAAA + hKu7Y3i4gRtU3ckTfgAAAAAAwGSldlt1p/BkAzdr+kHvAwAAAAAAJii126YfwmMNfNH33rcLP1AA + AAAAAABPo/QxJvPNWe8DAAAAAAAmIrW7+eYcHmjgjr71vsU+/HABAAAAAAA8lNLHiFXLQ/gRAwAA + AAAAeBClj9HT+wAAAAAAgFGqFnuljynQ+wAAAAAAgJGplofwBANPo/cBAAAAAACjofQxQXofAAAA + AAAwAkofk6X3AQAAAAAARVP6mDi9DwAAAAAAKFRqd+GpBcLpfQAAAAAAQHFSu5tvzuGdBXKg9wEA + AAAAAAVR+uAXeh8AAAAAAFAEpQ/eezsUb0cj/HgCAAAAAAB8ILXbph/CwwpkSO8DAAAAAABypvTB + x773vm34UQUAAAAAAHivfnkNjymQuaYf9D4AAAAAACA3VXcKzyhQhNl6CD+wAAAAAAAAP1XLQ3hA + gYJU3Sn82AIAAAAAALypFvvwdALFqZaH8MMLAAAAAABMXGp38805vJtAiarFPvwIAwAAAAAAk5Xa + bdMrfXCj+eac2l34QQYAAAAAAKZpth7CcwkUremH1G7DzzIAAAAAADA1dXcMDyUwAvXLa/hxBgAA + AAAAJqVaHsITCYxGvTqGH2oAAAAAAGAiUrubbzzVB/eUFvvwow0AAAAAAIxeardN76k+uLP55uzx + PgAAAAAA4NGq7hSeRWCUmn4IP+AAAAAAAMCIeaoPHsrjfQAAAAAAwIOkduupPng0j/cBAAAAAACP + 4Kk+eAKP9wEAAAAAAHdXr47hEQQmon55DT/yAAAAAADAaKTFPjx/wKRUy0P4wQcAAAAAAEYgtdum + 91QfPJVlngAAAAAAwF3UnQWeEGC2HsKPPwAAAAAAUDQLPCGQZZ4AAAAAAMDNLPCEWJZ5AgAAAAAA + N7PAE8JZ5gkAAAAAANwgtbvwzAH8l2WeAAAAAADA5zX9EN44gP+yzBMAAAAAAPikemWBJ2Sk6k7h + YwEAAAAAAChCarfzzTm8bgCX0mIfPhwAAAAAAID81S+v4V0D+EXTD+HDAQAAAAAAyFxa7MOjBvBb + 1fIQPiIAAAAAAICcNb0FnpCp+eac2m34lAAAAAAAAPJULQ/hOQP4QN0dwwcFAAAAAACQodRu5xvX + +iB3LvcBAAAAAADv1d0xvGIA/2i2HsLHBQAAAAAAkJXUbsMTBnCltNiHDw0AAAAAACAfVXcK7xfA + lZre5T4AAAAAAOAvqd2FxwvgU6rlIXx0AAAAAAAAOZith/ByAXxK05/DRwcAAAAAABAuLfbh2QK4 + gct9AAAAAACAa31QKJf7AAAAAABg4lzrg6K53AcAAAAAAFPmWh8UzeU+AAAAAACYLNf6YARc7gMA + AAAAgGlyrQ9GwOU+AAAAAACYoNTuwiMFcBcu9wEAAAAAwNRU3Sm8UAB30fRD+EgBAAAAAACeJrXb + 8DwB3FFa7MMHCwAAAAAA8Bx1dwxvE8AdzdYu9wEAAAAAwCSkdjvfnMPbBHBfb0c7fLwAAAAAAACP + Vi0P4VUCuLuqO4WPFwAAAAAA4NGa3rU+GKH55uxyHwAAAAAAjFu12IcnCeBBquUhfMgAAAAAAACP + U7+8hvcI4EGa/hw+ZAAAAAAAgAdJ7TY8RgAPlRb78FEDAAAAAAA8Qr06hpcI4KGq7hQ+agAAAAAA + gEdo+nN4iQAeLbXb8GkDAAAAAADcV7XYhzcI4Amq5SF84AAAAAAAAPdVdafwBgE8QdMP4QMHAAAA + AAC4o9RuwwME8DSp3YWPHQAAAAAA4F6q5SG8PgBPU3fH8LEDAAAAAADcy2w9hNcH4Gma/hw+dgAA + AAAAgLuwwxMmqFrsw4cPAAAAAADwdXZ4wgRV3Sl8+AAAAAAAAF/X9HZ4wuTMNzZ5AgAAAABA8ezw + hMmyyRMAAAAAAEpnhydMlk2eAAAAAABQOjs8YbJs8gQAAAAAgKLZ4QkTl9pd+CACAAAAAABuY4cn + TFzdHcMHEQAAAAAAcJv65TW8NQCBmn4IH0QAAAAAAMBt5ptzeGsAYqV2Gz6LAAAAAACAz0qLfXhl + AMJVy0P4OAIAAAAAAD6r7o7hlQEIV7+8ho8jAAAAAADgs5p+CK8MQLj55hw+jgAAAAAAgE9J7TY8 + MQCZSIt9+FACAAAAAACuV3mwD/hbvTqGDyUAAAAAAOB6HuwDfpqth/ChBAAAAAAAXM+DfcCl8KEE + AAAAAABcyYN9wC882wcAAAAAAKXwYB/wC8/2AQAAAABAKTzYB/zCs30AAAAAAFCK2dqDfcD/M9+c + w0cTAAAAAABwjfCsAGQotbvw6QQAAAAAAHwsebAP+J1qeQgfUAAAAAAAwMeq5SG8KQAZqrtj+IAC + AAAAAAA+VnWn8KYAZGi2HsIHFAAAAAAA8LGmH8KbApCn8AEFAAAAAAB8LLwmANlK7S58RgEAAAAA + AH+S2l14TQCyVS324WMKAAAAAAD4k2p5CK8JQLbq1TF8TAEAAAAAAH9Sr47hNQHIVv3yGj6mAAAA + AACAP5mth/CaAGSr6YfwMQUAAAAAAPxJ04t9wEfCxxQAAAAAAPAn4R0ByFxqd+GTCgAAAAAAeC+1 + u/COAGQuLfbhwwoAAAAAAHgvLfbhHQHIXL06hg8rAAAAAADgvXp1DO8IQObqTuwDAAAAAIAciX3A + P5qth/BhBQAAAAAAvDdbD+EdAchc04t9AAAAAACQI7EPuEb4sAIAAAAAAN6bb87hEQHIX/iwAgAA + AAAA3gsvCEAR0mIfPq8AAAAAAIBLqd2GFwSgCGIfAAAAAADkJi324QUBKEK1PISPLAAAAAAA4JLY + B1ypXh3DRxYAAAAAAHCpWh7CCwJQBLEPAAAAAAByU6+O4QUBKELVncJHFgAAAAAAcEnsA640Ww/h + IwsAAAAAALhUd2IfcBWxDwAAAAAAcjNbD+EFASiC2AcAAAAAALkR+4ArzTfn8JEFAAAAAABcEvuA + 64WPLAAAAAAA4JLYB1wvfGQBAAAAAACXmv4cng+AUoSPLAAAAAAA4FJ4OwAKEj6yAACAe6lXRwAA + YATC2wFQkPCRBQAA3Ev47xcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAABEqVdHAABgBMJ/uQAKUnWn8KkFAADcxb/++38BAIARCG8HQEFSuw2fWgAAAAAAwE/h + 7QAoSPjIAgAAAAAALoW3A6Ag4SMLAAAAAAC41PRDeD4AShE+sgAAAAAAgEuztdgHXCt8ZAEAAAAA + AJfEPuB64SMLAAAAAAC4JPYBV5pvzuEjCwAAAAAAuCT2AVd6GxfhIwsAAAAAALhUd8fwggAUQewD + AAAAAIDc1CuxD7iK2AcAAAAAALkR+4ArVd0pfGQBAAAAAACXquUhvCAARahXx/CRBQAAAAAAXEqL + fXhBAIog9gEAAAAAQG7EPuBK1fIQPrIAAAAAAIBLqd2GFwSgCGmxDx9ZAAAAAADAL8ILAlAEsQ8A + AAAAADI035zDIwKQv/BhBQAAAAAAvDdbD+ERAchf+LACAAAAAADeq19ewyMCkLmmH8KHFQAAAAAA + 8F69OoZ3BCBzs7XYBwAAAAAAOaqWh/COAGSu7o7hwwoAAAAAAHgvLfbhHQHIXL0S+wAAAAAAIEep + 3YZ3BCBzabEPH1YAAAAAAMBvhXcEIHOp3YVPKgAAAAAA4LeafghPCUDOwscUAAAAAADwJ/XLa3hK + ALLV9EP4mAIAAAAAAP6kXh3DawKQrfrlNXxMAQAAAAAAf1It9uE1AchWvTqGjykAAAAAAOBPUrsL + rwlAtqrFPnxMAQAAAAAAHwivCUC2UrsNn1EAAAAAAMAHZushPCgAeQofUAAAAAAAwMfq7hgeFIAM + zdZD+IACAAAAAAA+Vi0P4U0ByFDdHcMHFAAAAAAA8LHU7sKbApCharEPH1AAAAAAAMA/Cm8KQIZS + uw2fTgAAAAAAwD+arYfwrABkZb45h48mAAAAAADgGvXqGF4WgKzUL6/howkAAAAAALhGtdiHlwUg + K9XyED6aAAAAAACAa6R2G14WgKykxT58NAEAAAAAAFdqes/2Af8RPpQAAAAAAIDr1Z1n+4C/zNZD + +FACAAAAAACu59k+4Kd6dQwfSgAAAAAAwPU82wf8lNpd+FACAAAAAAA+xbN9wJv55hw+jgAAAAAA + gM+qV57tA/5dv7yGjyMAAAAAAOCzkmf7gP/5d7U8hI8jAAAAAADgBvPNOTw0ALFSuw2fRQAAAAAA + wA2q7hQeGoBATT+EDyIAAAAAAOA21fIQ3hqAQHV3DB9EAAAAAADAbVK7DW8NQKDU7sIHEQAAAAAA + cLP65TU8NwAhmv4cPoIAAAAAAICvsMkTJssOTwAAAAAAKJ1NnjBZabEPH0EAAAAAAMAXNf0QHh2A + J5tv7PAEAAAAAIAxsMkTJsgOTwAAAAAAGAebPGGCUrsLHz4AAAAAAMBd1C+v4ekBeJqmt8MTAAAA + AADGwyZPmBQ7PAEAAAAAYExSu51vzuEBAniOtyMfPnYAAAAAAIA7qrpTeIAAnqDph/CBAwAAAAAA + 3Fda7MMbBPAE1fIQPnAAAAAAAIC7a3qbPGHk5puzHZ4AAAAAADBK1fIQXiKAh6q6U/ioAQAAAAAA + HiG12/ASATxUWuzDRw0AAAAAAPAgVXcKjxHAgzT9ED5kAAAAAACAx0mLfXiPAB6kWh7ChwwAAAAA + APBQTX8OTxLA3c0359RuwycMAAAAAADwUNXyEF4lgLuru2P4eAEAAAAAAB4ttdv5xuU+GBvX+gAA + AAAAYCLq1TE8TAB3VHWn8MECAAAAAAA8R2q34W0CuKO02IcPFgAAAAAA4Gmq7hSeJ4C7mK2H8JEC + AAAAAAA8k8t9MBqVa30AAAAAADA9LvfBCDT9OXyYAAAAAAAAz5faXXinAL6oWh7ChwkAAAAAABBi + th7CUwVwM9f6AAAAAABgytJiH14rgJu51gcAAAAAABPnch8UyrU+AAAAAADA5T4olGt9AAAAAADA + m6o7hWcL4FNc6wMAAAAAAH5I7Ta8XACfkhb78NEBAAAAAABkwuU+KMhsPYQPDQAAAAAAIB+p3c43 + 5/CEAVzDtT4AAAAAAOAX9eoYnjCAf1S/vIaPCwAAAAAAIDcu90ER3o5q+LgAAAAAAAAyVC0P4SED + +EC9OoYPCgAAAAAAIFtNP4TnDOC35puza30AAAAAAMAH0mIfXjSA36qWh/ARAQAAAAAAZK7qTuFR + A/jFbD2EDwcAAAAAACB/qd3ON+fwtAFcSu0ufDgAAAAAAABFqJaH8LQB/FR3x/CxAAAAAAAAFGS2 + HsIDB/Cm6c+p3YbPBAAAAAAAoCCp3YU3DuBNtdiHDwQAAAAAAKA49eoYnjlg4uqX1/BRAAAAAAAA + FKrpLfOEMPONBZ4AAAAAAMDtLPOEQBZ4AgAAAAAAX2SZJ4SwwBMAAAAAALgLyzzhySzwBAAAAAAA + 7sUyT3gyCzwBAAAAAIA7qpaH8PwBE1F1p/AjDwAAAAAAjMxsbZknPFzTW+AJAAAAAADcX2q38805 + PIXAuKV2F37YAQAAAACAUaoW+/AUAiNWLQ/hxxwAAAAAABixujuGBxEYpdl6CD/gAAAAAADA6DW9 + x/vgzjzVBwAAAAAAPIfH++DuPNUHAAAAAAA8TfJ4H9yPp/oAAAAAAIAnq1ce74M7qLpT+HEGAAAA + AAAmqH55DQ8lULSmHzzVBwAAAAAAhEjttumH8FwChZpvzkofAAAAAAAQKLXb+eYcHk2gRKndhR9h + AAAAAABg4tJiHx5NoDjV8hB+eAEAAAAAAN5Uy0N4OoGC1N0x/NgCAAAAAAD8VHfH8IACRai6U/iB + BQAAAAAA+EXVncIzCmSu6YfUbsNPKwAAAAAAwHtNP4THFMiW0gcAAAAAAOQstVu9D35rvjmndhd+ + SAEAAAAAAD6g98F7Sh8AAAAAAFCK1O7mm3N4XoFMKH0AAAAAAEBZ9D74qVrsw48kAAAAAADAp+h9 + 8KZaHsIPIwAAAAAAwA30PiZO6QMAAAAAAIqm9zFZSh8AAAAAADACeh8TpPQBAAAAAACjofcxKUof + AAAAAAAwMnofE6H0AQAAAAAAo6T3MXpKHwAAAAAAMGJ6H2P19mG/fd7hRwwAAAAAAOChUrtt+iE8 + zcAdKX0AAAAAAMB06H2MSdMrfQAAAAAAwLSkdlu/vIZnGviiph/ePubwAwUAAAAAAPB8VXcKjzVw + s9la6QMAAAAAACatWh7Ckw3coOpO4ccHAAAAAAAgXLU8zDfn8HYD13v7aMMPDgAAAAAAQCZSu9P7 + KMLbh1ot9uFHBgAAAAAAICup3Tb9EJ5y4ANvn2hqd+GHBQAAAAAAIE9VdwoPOvBbs/WQ2m34GQEA + AAAAAMhZtTyEZx34Rb06hh8NAAAAAACAIqR21/Se8CMLHukDAAAAAAD4rNRu65fX8NDDxH1/pM/q + TgAAAAAAgFtY6UmgurO6EwAAAAAA4Eus9OT5rO4EAAAAAAC4l9Ruq+4UHoCYiNna6k4AAAAAAIA7 + qxb7+cYVPx7o24W+5SH8UwcAAAAAABil1G7rl9fwJMQoNf2Q2l34Rw4AAAAAADBu1fLgih/3Va+O + 4R82AAAAAADARLjix7240AcAAAAAABDCK358hRf6AAAAAAAAYn274tcdw7MRxZmth7ePJ/wDBgAA + AAAAIC32TT+E9yOK0PTnarEP/2gBAAAAAAC4VC0PtnrysXp1dKEPAAAAAAAgT6ndVt0pvCiRIXs7 + AQAAAAAAipDa3Wxtqyd/afoh2dsJAAAAAABQlO8P+dnqOWnfnudbHsI/RQAAAAAAAG5TLQ+S3wTN + N2fP8wEAAAAAAIxDvTrON5LfJMh8AAAAAAAA45PareQ3bjIfAAAAAADAuEl+oyTzAQAAAAAATEdq + t97yGweZDwAAAAAAYLK+J78hvFhxg6Y/v/31yXwAAAAAAAATlxb7+uU1vF5xpdl6qJaH8M8GAAAA + AACAfHx7zq/znF/Wqu6U2l34pwIAAAAAAECe/n7Oz27PjNjYCQAAAAAAwKekdueiX7hvV/kW+/CP + AQAAAAAAgEJVy4MX/Z7sx6t8rvIBAAAAAABwF9Z7PsHbH6/GBwAAAAAAwOOofo9ofPXqqPEBAAAA + AADwND+qnw2fX2l87vEBAAAAAAAQ61v1W+yr7tT05/CClrn55vz2B6XxAQAAAAAAkKHU7n5c95tv + hL//mK1/LOrchf8FAQAAAAAAwDXSYl+vjpMNf38FvsU+/C8CAAAAAAAAvuLHjb/vqz6H8Az3IE3/ + c0WnG3wAAAAAAACMVlrsv2377I6zdcHt7+2H/6vuLfbe4AMAAAAAAGCaUrv9a+fn9/zX9Nmt/Zxv + zj/S3o/NnO7uAQAAAAAAwAd+FMBvFwD/joCP7oA/it63t/a649v/9O8re7oeAAAAAAAA3NOPFPjT + X03wuz+1vJ//wl8V7ycbOAEAAAAAACAPf4p94T8YAAAAAAAA8DGxDwAAAAAAAAol9gEAAAAAAECh + xD4AAAAAAAAolNgHAAAAAAAAhRL7AAAAAAAAoFBiHwAAAAAAABRK7AMAAAAAAIBCiX0AAAAAAABQ + KLEPAAAAAAAACiX2AQAAAAAAQKHEPgAAAAAAACiU2AcAAAAAAACFEvsAAAAAAACgUGIfAAAAAAAA + FErsAwAAAAAAgEKJfQAAAAAAAFAosQ8AAAAAAAAKJfYBAAAAAABAocQ+AAAAAAAAKJTYBwAAAAAA + AIUS+wAAAAAAAKBQYh8AAAAAAAAUSuwDAAAAAACAQol9AAAAAAAAUCixDwAAAAAAAAol9gEAAAAA + AEChxD4AAAAAAAAolNgHAAAAAAAAhRL7AAAAAAAAoFBiHwAAAAAAABRK7AMAAAAAAIBCiX0AAAAA + AABQKLEPAAAAAAAACiX2AQAAAAAAQKHEPgAAAAAAACiU2AcAAAAAAACFEvsAAAAAAACgUGIfAAAA + AAAAFErsAwAAAAAAgEKJfQAAAAAAAFAosQ8AAAAAAAAKJfYBAAAAAABAocQ+AAAAAAAAKJTYBwAA + AAAAAIUS+wAAAAAAAKBQYh8AAAAAAAAUSuwDAAAAAACAQol9AAAAAAAAUCixDwAAAAAAAAol9gEA + AAAAAEChxD4AAAAAAAAolNgHAAAAAAAAhRL7AAAAAAAAoFBiHwAAAAAAABRK7AMAAAAAAIBCiX0A + AAAAAABQKLEPAAAAAAAACiX2AQAAAAAAQKHEPgAAAAAAACiU2AcAAAAAAACFEvsAAAAAAACgUGIf + AAAAAAAAFErsAwAAAAAAgEKJfQAAAAAAAFAosQ8AAAAAAAAKJfYBAAAAAABAocQ+AAAAAAAAKJTY + BwAAAAAAAIUS+wAAAAAAAKBQYh8AAAAAAAAUSuwDAAAAAACAQol9AAAAAAAAUCixDwAAAAAAAAol + 9gEAAAAAAEChxD4AAAAAAAAolNgHAAAAAAAAhRL7AAAAAAAAoFBiHwAAAAAAABRK7AMAAAAAAIBC + iX0AAAAAAABQKLEPAAAAAAAACiX2AQAAAAAAQKHEPgAAgOlI7Tb8ZwAAAOCOxD4AAIApSO226k5v + v+69/VPyAwAAGA2xDwAAYNx+Zr5Lkh8AAMA4iH0AAABj9dvMJ/kBAACMidgHAAAwPv+Y+SQ/AACA + cRD7AAAAxuRTmU/yAwAAKJ3YBwAAMA43Zz7JDwAAoFxiHwAAQOnukvkkPwAAgBKJfQAAAOW6e+aT + /AAAAMoi9gEAAJTotszX9GfJDwAAYEzEPgAAgLLclvnmm3O9Or7959XyIPkBAACMhtgHAABQiq9k + vl9SneQHAAAwDmIfAABA/u6Y+S5JfgAAAKUT+wAAAHL2oMx3SfIDAAAol9gHAACQpydkvkuSHwAA + QInEPgAAgNw8OfNdkvwAAADKIvYBAADkIzDzXZL8AAAASiH2AQAA5CCTzHdJ8gMAAMif2AcAABAr + w8x3SfIDAADImdgHAAAQJfPMd0nyAwAAyJPYBwAA8HwFZb5Lkh8AAEBuxD4AAIBnKjTzXZL8AAAA + 8iH2AQAAPMcIMt8lyQ8AACAHYh8AAMCjjSzzXZL8AAAAYol9AAAAjzPizHdJ8gMAAIgi9gEAADzC + RDLfJckPAADg+cQ+AACA+5pg5rsk+QEAADyT2AcAAHAvE898lyQ/AACA5xD7AAAAvk7m+y3JDwAA + 4NHEPgAAgK+Q+f6R5AcAAPA4Yh8AAMBtZL5PkfwAAAAeQewDAAD4LJnvZpIfAADAfYl9AAAA15P5 + 7kLyAwAAuBexDwAA4Boy391JfgAAAF8n9gEAAHxM5nsoyQ8AAOArxD4AAIA/kfmeRvIDAAC4jdgH + AADwnswXQvIDAAD4LLEPAADgkswXTvIDAAC4ntgHAADwg8yXFckPAADgGmIfAABAarf16jjffC4t + yXxPIPkBAAB8TOwDAACmTOYrguQHAADwJ2IfAAAwTTJfcSQ/AACA98Q+AABgamS+okl+AAAAl8Q+ + AABgOmS+0ZD8AAAAfhD7AACAKZD5RknyAwAAEPsAAIBxk/lGT/IDAACmTOwDAADGSuabFMkPAACY + JrEPAAAYH5lvsiQ/AABgasQ+AABgTGQ+/iX5AQAAUyL2AQAA4yDz8QvJDwAAmAKxDwAAKJ3Mxwck + PwAAYNzEPgAAoFwyH1eS/AAAgLES+wAAgBLJfNxA8gMAAMZH7AMAAMoi8/FFkh8AADAmYh8AAFAK + mY87kvwAAIBxEPsAAID8yXw8iOQHAACUTuwDAAByJvPxBJIfAABQLrEPAADIk8zHk0l+AABAicQ+ + AAAgNzIfgSQ/AACgLGIfAACQD5mPTEh+AABAKcQ+AAAgBzIfGZL8AACA/Il9AABALJmPzEl+AABA + zsQ+AAAgisxHQSQ/AAAgT2IfAADwfDIfhZL8AACA3Ih9AADAM8l8jIDkBwAA5EPsAwAAnkPmY2Qk + PwAAIAdiHwAA8GgyHyMm+QEAALHEPgAA4HFkPiZC8gMAAKKIfQAAwCPIfEyQ5AcAADyf2AcAANyX + zMfESX4AAMAziX0AAMC9yHzwk+QHAAA8h9gHAAB8ncwHvyX5AQAAjyb2AQAAXyHzwT+S/AAAgMcR + +wAAgNvIfPApkh8AAPAIYh8AAPBZMh/cTPIDAADuS+wDAACuJ/PBXUh+AADAvYh9AADANWQ+uDvJ + DwAA+DqxDwAA+JjMBw8l+QEAAF8h9gEAAH8i88HTSH4AAMBtxD4AAOA9mQ9CSH4AAMBniX0AAMAl + mQ/CSX4AAMD1xD4AAOAHmQ+yIvkBAADXEPsAAACZD7Il+QEAAB8T+wAAYMpkPiiC5AcAAPyJ2AcA + ANMk80FxJD8AAOA9sQ8AAKZG5oOiSX4AAMAlsQ8AAKZD5oPRkPwAAIAfxD4AAJgCmQ9GSfIDAADE + PgAAGDeZD0ZP8gMAgCkT+wAAYKxkPpgUyQ8AAKZJ7AMAgPGR+WCyJD8AAJgasQ8AAMZE5gP+JfkB + AMCUiH0AADAOMh/wC8kPAACmQOwDAIDSyXzAByQ/AAAYN7EPAADKJfMBV5L8AABgrMQ+AAAokcwH + 3EDyAwCA8RH7AACgLDIf8EWSHwAAjInYBwAApZD5gDuS/AAAYBzEPgAAyJ/MBzyI5AcAAKUT+wAA + IGcyH/AEkh8AAJRL7AMAgDzJfMCTSX4AAFAisQ8AAHIj8wGBJD8AACiL2AcAAPmQ+YBMSH4AAFAK + sQ8AAHIg8wEZkvwAACB/Yh8AAMSS+YDMSX7wf+zdzY5s53WY4XspMSI05VCISYgiCFD2gOYgFigo + 5KFknoEz0CQCRzKgUQxEM4EzG4hncqBZbNg3IF1AdEE5djUqB/1TtWvv72et9T3AMzzdvetr1Nq7 + 14vTDQAQmdgHAACzyHxAIpIfAADEJPYBAMB4Mh+QlOQHAADRiH0AADCSzAcUIPkBAEAcYh8AAIwh + 8wHFSH4AABCB2AcAAL3JfEBhkh8AAMwl9gEAQD8yH7AIyQ8AAGYR+wAAoAeZD1iQ5AcAAOOJfQAA + 0JbMByxO8gMAgJHEPgAAaEXmA7iQ/AAAYAyxDwAAjpP5AJ4l+QEAQG9iHwAAHCHzAdwk+QEAQD9i + HwAA7CPzAdxF8gMAgB7EPgAAuJfMB7Cb5AcAAG2JfQAAsJ3MB9CE5AcAAK2IfQAAsIXMB9Cc5AcA + AMeJfQAAcJ3MB9CV5AcAAEeIfQAA8BKZD2AYyQ8AAPYR+wAA4CmZD2CKdz746t7ZK/kBALA4sQ8A + AN4m8wHMtW8OS34AACxL7AMAgDOZDyAOyQ8AADYS+wAAQOYDiEnyAwCAm8Q+AABWJvMBxCf5AQDA + FWIfAABrkvkAcpH8AADgWWIfAACrkfkA8pL8AADgEbEPAIB1yHwANUh+AABwIfYBALACmQ+gHskP + AABOYh8AANXJfAC1SX4AACxO7AMAoCqZD2Adkh8AAMsS+wAAqEfmA1iT5AcAwILEPgAAKpH5AJD8 + AABYitgHAEANMh8Ab5P8AABYhNgHAEB2Mh8AL5H8AAAoT+wDACAvmQ+ALSQ/AAAKE/sAAMhI5gPg + XpIfAAAliX0AAOQi8wFwhOQHAEAxYh8AAFnIfAC0IvkBAFCG2AcAQHwyHwA9SH4AABQg9gEAEJnM + B0Bvkh8AAKmJfQAAxCTzATCS5AcAQFJiHwAA0ch8AMwi+QEAkI7YBwBAHDIfABFIfgAAJCL2AQAQ + gcwHQDSSHwAAKYh9AADMJfMBEJnkBwBAcGIfAACzyHwAZCH5AQAQltgHAMB4Mh8AGUl+AAAEJPYB + ADCSzAdAdpIfAAChiH0AAIwh8wFQieQHAEAQYh8AAL3JfABUJfkBADCd2AcAQD8yHwArkPwAAJhI + 7AMAoAeZD4DVSH4AAEwh9gEA0JbMB8DKJD8AAAYT+wAAaEXmA4AzyQ8AgGHEPgAAjpP5AOApyQ8A + gAHEPgAAjpD5AOA6yQ8AgK7EPgAA9pH5AGA7yQ8AgE7EPgAA7iXzAcA+kh8AAM2JfQAAbCfzAcBx + kh8AAA2JfQAAbCHzAUBbkh8AAE2IfQAAXCfzAUA/kh8AAAeJfQAAvETmA4AxJD8AAHYT+wAAeErm + A4DxJD8AAHYQ+wAAeJvMBwBzSX4AANxF7AMA4EzmA4A4JD8AADYS+wAAkPkAICbJDwCAm8Q+AICV + yXwAEJ/kBwDAFWIfAMCaZD4AyEXyAwDgWWIfAMBqZD4AyEvyAwDgEbEPAGAdMh8A1CD5AQBwIfYB + AKxA5gOAeiQ/AABOYh8AQHUyHwDUJvkBACxO7AMAqErmA4B1SH4AAMsS+wAA6pH5AGBNkh8AwILE + PgCASmQ+AEDyAwBYitgHAFCDzAcAvE3yAwBYhNgHAJCdzAcAvETyAwAoT+wDAMhL5gMAtpD8AAAK + E/sAADKS+QCAe0l+AAAliX0AALnIfADAEZIfAEAxYh8AQBYyHwDQiuQHAFCG2AcAEJ/MBwD0IPkB + ABQg9gEARCbzAQC9SX4AAKmJfQAAMcl8AMBIkh8AQFJiHwBANDIfADCL5AcAkI7YBwAQh8wHAEQg + +QEAJCL2AQBEIPMBANFIfgAAKYh9AABzyXwAQGSSHwBAcGIfAMAsMh8AkIXkBwAQltgHADCezAcA + ZOQZBgAgILEPAGAkKzIAIDvPMwAAoYh9AABjWIsBAJV4tgEACELsAwDozSoMAKjKcw4AwHRiHwBA + P9ZfAMAKPPMAAEwk9gEA9GDlBQCsxvMPAMAUYh8AQFvWXADAyjwLAQAMJvYBALRitQUAcOa5CABg + GLEPAOA46ywAgKc8IwEADCD2AQAcYYUFAHCd5yUAgK7EPgCAfaytAAC28+wEANCJ2AcAcC+rKgCA + fTxHAQA0J/YBAGxnPQUAcJxnKgCAhsQ+AIAtrKQAANryfAUA0ITYBwBwnTUUAEA/nrUAAA4S+wAA + XmL1BAAwhucuAIDdxD4AgKesmwAAxvMMBgCwg9gHAPA2KyYAgLk8jwEA3EXsAwA427dWeuOdH/zc + WgkAoC3JDwBgI7EPAEDmAwCISfIDALhJ7AMAVibzAQDEJ/kBAFwh9gEAa5L5AABykfwAAJ4l9gEA + q5H5AADykvwAAB4R+wCAdch8AAA1SH4AABdiHwCwApkPAKAeyQ8A4CT2AQDVyXwAALVJfgDA4sQ+ + AKAqmQ8AYB2SHwCwLLEPAKhH5gMAWJPkBwAsSOwDACqR+QAAkPwAgKWIfQBADTIfAABvk/wAgEWI + fQBAdjIfAAAvkfwAgPLEPgAgL5kPAIAtJD8AoDCxDwDISOYDAOBekh8AUJLYBwDkIvMBAHCE5AcA + FCP2AQBZyHwAALQi+QEAZYh9AEB8Mh8AAD1IfgBAAWIfABCZzAcAQG+SHwCQmtgHAMQk8wEAMJLk + BwAkJfYBANHIfAAAzCL5AQDpiH0AQBwyHwAAEUh+AEAiYh8AEIHMBwBANJIfAJCC2AcAzCXzAQAQ + meQHAAQn9gEAs8h8AABkIfkBAGGJfQDAeDIfAAAZSX4AQEBiHwAwkswHAEB2kh8AEIrYBwCMIfMB + AFCJ5AcABCH2AQC9yXwAAFQl+QEA04l9AEA/Mh8AACuQ/ACAicQ+AKAHmQ8AgNVIfgDAFGIfANCW + zAcAwMokPwBgMLEPAGhF5gMAgDPJDwAYRuwDAI6T+QAA4CnJDwAYQOwDAI6Q+QAA4DrJDwDoSuwD + APaR+QAAYDvJDwDoROwDAO4l8wEAwD6SHwDQnNgHAGwn8wEAwHGSHwDQkNgHAGwh8wEAQFuSHwDQ + hNgHAFwn8wEAQD+SHwBwkNgHALxE5gMAgDEkPwBgN7EPAHhK5gMAgPEkPwBgB7EPAHibzAcAAHNJ + fgDAXcQ+AOBM5gMAgDgkPwBgI7EPAJD5AAAgJskPALhJ7AOAlcl8AAAQn+QHAFwh9gHAmmQ+AADI + RfIDAJ4l9gHAamQ+AADIS/IDAB4R+wBgHTIfAADUIPkBABdiHwCsQOYDAIB6JD8A4CT2AUB1Mh8A + ANQm+QHA4sQ+AKhK5gMAgHVIfgCwLLEPAOqR+QAAYE2SHwAsSOwDgEpkPgAAQPIDgKWIfQBQg8wH + AAC8TfIDgEWIfQCQncwHAAC8RPIDgPLEPgDIS+YDAAC2kPwAoDCxDwAykvkAAIB7SX4AUJLYBwC5 + yHwAAMARkh8AFCP2AUAWMh8AB73zwVfTrwGAICQ/AChD7AOA+GQ+AI5754Ov/KwHwCOSHwAUIPYB + QGQyHwBNnEufn/UAeJbkBwCpiX0AEJPMB0Arl9J3vk1Mvx4AYpL8ACApsQ8AopH5AGjo7dKn9wFw + k+QHAOmIfQAQh8wHQFtPS5/eB8AWkh8AJCL2AUAEMh8Azb1U+vQ+ADaS/AAgBbEPAOaS+QDo4Xrp + 0/sA2E7yA4DgxD4AmEXmA6CTLaVP7wPgLpIfAIQl9gHAeDIfAP1sL316HwD3kvwAICCxDwAGk/kA + 6Ofe0qf3AbCD5AcAoYh9ADDMOx989e5HMh8AvdwsfVe2snofAPeS/AAgCLEPAAaQ+QDobUvp+85/ + /tL/7wOgLckPAKYT+wCgK5kPgAE2lr7Tyz8D6n0AHCH5AcBEYh8AdCLzATDG9tL3xrsffa33AdCJ + 5AcAU4h9ANCczAfAMHeVvocP+cHP9T4A+pH8AGAwsQ8AGpL5ABhpR+l7+EC9D4DOJD8AGEbsA4Am + ZD4ABttd+h4+XO8DoD/JDwAGEPsA4CCZD4DxDpa+h0+i9wEwhOQHAF2JfQCwm8wHwBRNSt/Dp9L7 + ABhF8gOATsQ+ANhB5gNgloal7+ET6n0ADCT5AUBzYh8A3EXmA2Ci5qXv4dPqfQCMJfkBQENiHwBs + JPMBMFen0vfwyfU+AIaT/ACgCbEPAG6S+QCYrmvpe/gSeh8AM0h+AHCQ2AcAV8h8AEQwoPQ9fCG9 + D4BJJD8A2E3sA4BnyXwABDGs9D18Ob0PgHkkPwDYQewDgEdkPgDiGFz6Hr6o3gfAVJIfANxF7AOA + C5kPgFCmlL6HL633ATCb5AcAG4l9AHCS+QCIZ2Lpe7gAvQ+AACQ/ALhJ7ANgcTIfAAFNL30Pl6H3 + ARCD5AcAV4h9ACxL5gMgpiCl7+FibvW+//ThX7szAjCG5AcAzxL7AFiQzAdAWKFK38Ml3ep97370 + tVskAMNIfgDwiNgHwFJkPgAiC1j6Hi5M7wMgGMkPAC7EPgAWIfMBEFzY0vdweXofAPFIfgBwEvsA + WIDMB0B8wUvfw0XqfQCEJPkBsDixD4DCZD4AUkhR+h4uVe8DICrJD4BliX0AlCTzAZBFotL3cMF6 + HwCBSX4ALEjsA6AYmQ+ARNKVvofL1vsAiE3yA2ApYh8AZch8AOSStPQ9XLzeB0B4kh8AixD7AChA + 5gMgndSl7+El6H0AZCD5AVCe2AdAajIfABkVKH0PL0TvAyAJyQ+AwsQ+AJKS+QBIqkzpe3g5eh8A + eUh+AJQk9gGQjswHQF7FSt/Di9L7AEhF8gOgGLEPgERkPgBSK1n6Hl6a3gdANpIfAGWIfQCkIPMB + kF3h0vfwAvU+ABKS/AAoQOwDIDiZD4ACype+h5ep9wGQk+QHQGpiHwBhyXwA1LBI6Xt4sXofAGlJ + fgAkJfYBEJDMB0AZS5W+h5es9wGQmeQHQDpiHwChyHwAVLJg6Xt44XofAMlJfgAkIvYBEITMB0Ax + y5a+h5ev9wGQn+QHQApiHwDTyXwA1LN46Xs4BL0PgBIkPwCCE/sAmEjmA6Akpe//H4XeB0AVkh8A + YYl9AEwh8wFQldL3+ED0PgAKkfwACEjsA2AwmQ+AwpS+549F7wOgFskPgFDEPgCGkfkAqE3pu3Y4 + eh8A5Uh+AAQh9gEwgMwHQHlK3+0j0vsAqEjyA2A6sQ+ArmQ+AFag9G09KL0PgKIkPwAmEvsA6ETm + A2ARSt99x6X3AVCX5AfAFGIfAM3JfACsQ+nbc2h6HwClSX4ADCb2AdCQzAfAUpS+/Uen9wFQneQH + wDBiHwBNyHwArEbpO3qAeh8AC5D8ABhA7APgIJkPgAUpfW2OUe8DYA2SHwBdiX0A7CbzAbAmpa/l + Yep9ACxD8gOgE7EPgB1kPgCWpfS1P1K9D4CVSH4ANCf2AXAXmQ+AlSl9vQ5W7wNgMZIfAA2JfQBs + JPMBsDilr+/x6n0ArEfyA6AJsQ+Am2Q+AFD6Rhyy3gfAkiQ/AA4S+wC4QuYDgJPSN/Ko9T4AViX5 + AbCb2AfAs2Q+ADhT+kYfuN4HwMIkPwB2EPsAeETmA4ALpW/Oset9AKxN8gPgLmIfABcyHwC8Temb + efh6HwDLk/wA2EjsA+Ak8wHAE0rfdHofAJwkPwA2EPsAFifzAcBTSl8Qeh8AnEl+AFwh9gEsS+YD + gGcpfaHofQBwIfkB8CyxD2BBMh8AvETpC0jvA4C3SX4APCL2ASxF5gOAK5S+sPQ+AHhE8gPgQuwD + WITMBwDXKX3B6X0A8JTkB8BJ7ANYgMwHADcpfSnofQDwLMkPYHFiH0BhMh8AbKH0JaL3AcBLJD+A + ZYl9ACXJfACwkdKXjt4HAFdIfgALEvsAipH5AGA7pS8pvQ8ArpP8AJYi9gGUIfMBwF2UvtT0PgC4 + SfIDWITYB1CAzAcA91L6CtD7AGALyQ+gPLEPIDWZDwB2UPrK0PsAYCPJD6AwsQ8gKZkPAPZR+orR + +wBgO8kPoCSxDyAdmQ8AdlP6StL7AOAukh9AMWIfQCIyHwAcofQVpvcBwL0kP4AyxD6AFGQ+ADhI + 6StP7wOAHSQ/gALEPoDgZD4AOE7pW4TeBwD7SH4AqYl9AGHJfADQhNK3FL0PAHaT/ACSEvsAApL5 + AKAVpW9Beh8AHCH5AaQj9gGEIvMBQENK37L0PgA4SPIDSETsAwhC5gOAtpS+xel9AHCc5AeQgtgH + MJ3MBwDNKX2c9D4AaETyAwhO7AOYSOYDgB6UPi70PgBo5d+T3w9+du8SQ/IDGEDsA5hC5gOATpQ+ + HtH7AKChNzfNm/dWyQ9gMLEPYDCZDwD6Ufp4lt4HAG1JfgChiH0Aw8h8ANCV0scVeh8ANCf5AQQh + 9gEMIPMBQG9KHzfpfQDQg+QHMJ3YB9CVzAcAAyh9bKT3AUAnkh/ARGIfQCcyHwCMofRxF70PAPqR + /ACmEPsAmpP5AGAYpY8d9D4A6EryAxhM7ANoSOYDgJGUPnbT+wCgN8kPYBixD6AJmQ8ABlP6OEjv + A4ABJD+AAcQ+gINkPgAYT+mjCb0PAMaQ/AC6EvsAdpP5AGAKpY+G9D4AGEbyA+hE7APYQeYDgFmU + PprT+wBgJMkPoDmxD+AuMh8ATKT00YneBwCDSX4ADYl9ABvJfAAwl9JHV3ofAIwn+QE0IfYB3CTz + AcB0Sh8D6H0AMIXkB3CQ2AdwhcwHABEofQyj9wHALJIfwG5iH8CzZD4ACELpYzC9DwAmkvwAdhD7 + AB6R+QAgDqWPKfQ+AJhL8gO4i9gHcCHzAUAoSh8T6X0AMJ3kB7CR2AdwkvkAIB6lj+n0PgCIQPID + uEnsAxYn8wFAQEofQeh9ABCE5AdwhdgHLEvmA4CYlD5C0fsAIA7JD+BZYh+wIJkPAMJS+ghI7wOA + UCQ/gEfEPmApMh8ARKb0EZbeBwDRSH4AF2IfsAiZDwCCU/oITu8DgIAkP4CT2AcsQOYDgPiUPlLQ + +wAgJskPWJzYBxQm8wFACkofieh9ABCW5AcsS+wDSpL5ACALpY909D4AiEzyAxYk9gHFyHwAkIjS + R1J6HwAEJ/kBSxH7gDJkPgDIRekjNb0PAOKT/IBFiH1AATIfAKSj9FGA3gcAKUh+QHliH5CazAcA + GSl9lKH3AUAWkh9QmNgHJCXzAUBSSh/F6H0AkIjkB5Qk9gHpyHwAkJfSR0l6HwDkIvkBxYh9QCIy + HwCkpvRRmN4HAOlIfkAZYh+QgswHANkpfZSn9wFARpIfUIDYBwQn8wFAAUofi9D7ACApyQ9ITewD + wpL5AKAGpY+l6H0AkJfkByQl9gEByXwAUIbSx4L0PgBITfID0hH7gFBkPgCoROljWXofAGQn+QGJ + iH1AEDIfABSj9LE4vQ8ACpD8gBTEPmA6mQ8A6lH64KT3AUAVkh8QnNgHTCTzAUBJSh9c6H0AUIbk + B4Ql9gFTyHwAUJXSB4/ofQBQieQHBCT2AYPJfABQmNIHz9L7AKAYyQ8IRewDhpH5AKA2pQ+u0PsA + oB7JDwhC7AMGkPkAoDylD27S+wCgJMkPmE7sA7qS+QBgBUofbKT3AUBVkh8wkdgHdCLzAcAilD64 + i94HAIVJfsAUYh/QnMwHAOtQ+mAHvQ8AapP8gMHEPqAhmQ8AlqL0wW56HwCUJ/kBw4h9QBMyHwCs + RumDg/Q+AFiB5AcMIPYBB8l8ALAgpQ+auPlW0vsAoAbJD+hK7AN2k/kAYE1KHzSk9wHAOiQ/oBOx + D9hB5gOAZSl90JzeBwBLkfyA5sQ+4C4yHwCsTOmDTvQ+AFiN5Ac0JPYBG8l8ALA4pQ+60vsAYEGS + H9CE2AfcJPMBAEofDKD3AcCaJD/gILEPuELmAwBOSh8MpPcBwLIkP2A3sQ94lswHAJwpfTCY3gcA + K5P8gB3EPuARmQ8AuFD6YAq9DwAWJ/kBdxH7gAuZDwB4m9IHE+l9AIDkB2wk9gEnmQ8AeELpg+n0 + PgDgJPkBG4h9sDiZDwB4SumDIPQ+AOBM8gOuEPtgWTIfAPAspQ9C0fsAgAvJD3iW2AcLkvkAgJco + fRCQ3gcAvE3yAx4R+2ApMh8AcIXSB2HpfQDAI5IfcCH2wSJkPgDgOqUPgtvW+7xJAWAtkh9wEvtg + ATIfAHCT0gcpeKsCAM+S/GBxYh8UJvMBAFvIB5CINywA8JJ9ye/dj16/ecCYfvHAEWIflCTzAQAb + CQeQjrctAHCF5AcLEvugGJkPANhOMoCkvHkBgOskP1iK2AdlyHwAwF3EAkjNWxgAuEnyg0WIfVCA + zAcA3EsmgAK8kQGALSQ/KE/sg9RkPgBgB4EAyvB2BgA2kvygMLEPkpL5AIB9pAEoxpsaANhO8oOS + xD5IR+YDAHYTBaAkb20A4C6SHxQj9kEiMh8AcIQcAIV5gwMA95L8oAyxD1KQ+QCAg4QAKM/bHADY + QfKDAsQ+CE7mAwCOkwBgEd7sAMA+kh+kJvZBWDIfANCE5T8sxVseANhN8oOkxD4ISOYDAFqx9ocF + eeMDAEdIfpCO2AehyHwAQEMW/rAsb38A4CDJDxIR+yAImQ8AaMuqHxZnCAAAx0l+kILYB9PJfABA + c5b8wMkoAAAakfwgOLEPJpL5AIAerPeBCwMBAGhF8oOwxD6YQuYDADqx2AceMRYAgIYkPwhI7IPB + 9mW+7/7waz99AwA3WekDzzIcAIC2JD8IReyDYfZnvvdfTb94ACA+y3zgCiMCAGhO8oMgxD4YQOYD + AHqzxgduMigAgB4kP5hO7IOuZD4AYAALfGAj4wIA6ETyg4nEPuhE5gMAxrC6B+5iaAAA/Uh+MIXY + B83JfADAMJb2wA5GBwDQleQHg4l90JDMBwCMZF0P7GaAAAC9SX4wjNgHTch8AMBgFvXAQcYIADCA + 5AcDiH1wkMwHAIxnRQ80YZgAAGNIftCV2Ae7yXwAwBSW80BDRgoAMIzkB52IfbCDzAcAzGItDzRn + sAAAI0l+0JzYB3eR+QCAiSzkgU6MFwBgMMkPGhL7YCOZDwCYyyoe6MqQAQDGk/ygCbEPbpL5AIDp + LOGBAYwaAGAKyQ8OEvvgCpkPAIjA+h0YxsABAGaR/GA3sQ+eJfMBAEFYvAODGTsAwESSH+wg9sEj + Mh8AEIeVOzCF4QMAzCX5wV3EPriQ+QCAUCzbgYmMIABgOskPNhL74CTzAQDxWLMD0xlEAEAEkh/c + JPaxOJkPAAjIgh0IwjgCAIKQ/OAKsY9lyXwAQExW60AohhIAEIfkB88S+1iQzAcAhGWpDgRkNAEA + oUh+8IjYx1JkPgAgMut0ICwDCgCIRvKDC7GPRch8AEBwFulAcMYUABCQ5AcnsY8FyHwAQHxW6EAK + hhUAEJPkx+LEPgqT+QCAFCzPgUSMLAAgLMmPZYl9lCTzAQBZWJsD6RhcAEBkkh8LEvsoRuYDABKx + MAeSMr4AgOAkP5Yi9lGGzAcA5GJVDqRmiAEA8Ul+LELsowCZDwBIx5IcKMAoAwBSkPwoT+wjNZkP + AMjIehwow0ADALKQ/ChM7CMpmQ8ASMpiHCjGWAMAEpH8KEnsIx2ZDwDIy0ocKMlwAwBykfwoRuwj + EZkPAEjNMhwozIgDANKR/ChD7CMFmQ8AyM4aHCjPoAMAMpL8KEDsIziZDwAowAIcWIRxBwAkJfmR + mthHWDIfAFCD1TewFEMPAMhL8iMpsY+AZD4AoAxLb2BBRh8AkJrkRzpiH6HIfABAJdbdwLIMQAAg + O8mPRMQ+gpD5AIBiLLqBxRmDAEABkh8piH1MJ/MBAPVYcQOcDEMAoArJj+DEPiaS+QCAkiy3AS6M + RACgDMmPsMQ+ppD5AICqrLUBHjEYAYBKJD8CEvsYTOYDAAqz0AZ4lvEIABQj+RGK2McwMh8AUJtV + NsAVhiQAUI/kRxBiHwPIfABAeZbYADcZlQBASZIf04l9dCXzAQArsL4G2MjABACqkvyYSOyjE5kP + AFiExTXAXYxNAKAwyY8pxD6ak/kAgHVYWQPsYHgCALVJfgwm9tGQzAcALMWyGmA3IxQAKE/yYxix + jyZkPgBgNdbUAAcZpADACiQ/BhD7OEjmAwAWZEEN0IRxCgAsQvKjK7GP3WQ+AGBNVtMADRmqAMA6 + JD86EfvYQeYDAJZlKQ3QnNEKACxF8qM5sY+7yHwAwMqsowE6MWABgNVIfjQk9rGRzAcALM4iGqAr + YxYAWJDkRxNiHzfJfAAAVtAAAxi2AMCaJD8OEvu4QuYDADhZPgMMZOQCAMuS/NhN7ONZMh8AwJm1 + M8BgBi8AsDLJjx3EPh6R+QAALiycAaYwfgGAxUl+3EXs40LmAwB4m1UzwESGMACA5MdGYh8nmQ8A + 4AlLZoDpjGIAgJPkxwZi3+JkPgCAp6yXAYIwkAEAziQ/rhD7liXzAQA8y2IZIBRjGQDgQvLjWWLf + gmQ+AICXWCkDBGQ4AwC8TfLjEbFvKTIfAMAVlskAYRnRAACPSH5ciH2LkPkAAK6zRgYIzqAGAHhK + 8uMk9i1A5gMAuMkCGSAF4xoA4FmS3+LEvsJkPgCALayOARIxtAEAXiL5LUvsK+md91/JfAAAW1ga + A6RjdAMAXCH5LUjsK+Y777/67g+/lvkAALawLgZIygAHALhO8luK2FeGzAcAcBeLYoDUjHEAgJsk + v0WIfQXIfAAA97IiBijAMAcA2ELyK0/sS03mAwDYwXIYoAwjHQBgI8mvMLEvKZkPAGAfa2GAYgx2 + AIDtJL+SxL50ZD4AgN0shAFKMt4BAO4i+RUj9iUi8wEAHGEVDFCYIQ8AcC/JrwyxLwWZDwDgIEtg + gPKMegCAHSS/AsS+4GQ+AIDjrH8BFmHgAwDsI/mlJvaFJfMBADRh8QuwFGMfAGA3yS8psS8gmQ8A + oBUrX4AFGf4AAEdIfumIfaHIfAAADVn2AizLLQAA4CDJLxGxLwiZDwCgLWtegMW5EQAAHCf5pSD2 + TSfzAQA0Z8ELwMntAACgEckvOLFvIpkPAKAHq10ALtwUAABakfzCEvumkPkAADqx1AXgEbcGAICG + JL+AxL7BZD4AgH6scwF4lhsEAEBbkl8oYt8wMh8AQFcWuQBc4TYBANCc5BeE2DeAzAcA0JsVLgA3 + uVkAAPQg+U0n9nUl8wEADGB5C8BGbhkAAJ1IfhOJfZ3IfAAAY1jbAnAXNw4AgH4kvynEvuZkPgCA + YSxsAdjB7QMAoCvJbzCxryGZDwBgJKtaAHZzEwEA6E3yG0bsa0LmAwAYzJIWgIPcSgAABpD8BhD7 + DpL5AADGs54FoAk3FACAMSS/rsS+3WQ+AIApLGYBaMhtBQBgGMmvE7FvB5kPAGAWK1kAmnNzAQAY + SfJrTuy7i8wHADCRZSwAnbz5sf3NTcQtBgBgGMmvIbFvI5kPAGAupQ+Art7cRPQ+AIDBJL8mxL6b + ZD4AgOmUPgAG0PsAAKaQ/A4S+66Q+QAAIlD6ABhG7wMAmEXy203se5bMBwAQhNIHwGB6HwDARJLf + DmLfIzIfAEAcSh8AU+h9AABzSX53EfsuZD4AgFCUPgAm0vsAAKaT/DYS+04yHwBAPEofANPpfQAA + EUh+Ny0e+2Q+AICAlD4AgtD7AACCkPyuWDb2yXwAADEpfQCEovcBAMQh+T1rwdgn8wEAhKX0ARCQ + 3gcAEIrk98hSsU/mAwCITOkDICy9DwAgGsnvYpHYJ/MBAASn9AEQnN4HABCQ5HdaIPbJfAAA8Sl9 + AKSg9wEAxLR48isc+2Q+AIAUlD4AEtH7AADCWjb5lYx9Mh8AQBZKHwDpbOp9NgwAAJMsmPyKxT6Z + DwAgEaUPgKRu9r433vmgwq+EAgBIaqnkVyb2yXwAALkofQCkpvcBAMS3SPIrEPtkPgCAdJQ+AArQ + +wAAUiif/FLHPpkPACAjpQ+AMvQ+AIAsCie/pLFP5gMASErpA6AYvQ8AIJGSyS9d7JP5AADyUvoA + KEnvAwDIpVjySxT7ZD4AgNSUPgAK0/sAANIpk/xSxD6ZDwAgO6UPgPL0PgCAjAokv+CxT+YDAChA + 6QNgEXofAEBSqZNf2Ngn8wEA1KD0AbAUvQ8AIK+kyS9g7JP5AADKUPoAWJDeBwCQWrrkFyr2yXwA + AJUofQAsS+8DAMguUfILEvtkPgCAYpQ+ABan9wEAFJAi+U2PfTIfAEA9Sh8AnPQ+AIAqgie/ibFP + 5gMAKEnpA4ALvQ8AoIywyW9K7JP5AACqUvoA4BG9DwCgkoDJb3Dsk/kAAApT+gDgWXofAEAxoZLf + sNgn8wEA1Kb0AcAVeh8AQD1Bkt+A2CfzAQCUp/QBwE16HwBASdOTX9fYJ/MBAKxA6QOAjfQ+AICq + Jia/TrFP5gMAWITSBwB30fsAAAqbkvyaxz6ZDwBgHUofAOyg9wEA1DY4+TWMfTIfAMBSlD4A2E3v + AwAob1jyaxL7ZD4AgNUofQBwkN4HALCCAcnvYOyT+QAAFqT0AUATeh8AwCK6Jr/dsU/mAwBYk9IH + AA3pfQAA6+iU/HbEPpkPAGBZSh8ANKf3AQAspXnyuyv2yXwAACt75/1XSh8A9KD3AQCspmHy2xj7 + ZD4AgMXdXEIqfQBwhN4HALCgJsnvZuyT+QAAUPoAYAC9DwBgTQeT35XYJ/MBAHBS+gBgIL0PAGBZ + u5PflWYn8wEAoPQBwGB6HwDAyvYlv+NkPgCAkpQ+AJhC7wMAWNzI5CfzAQBUpfQBwER6HwAAvZOf + zAcAUJjSBwDT6X0AAJz6JD+ZDwCgNqUPAILQ+wAAOGuV/GQ+AIDylD4ACEXvAwDg4kjyk/kAAFag + 9AFAQHofAABn33n/1Xd/+PW+2PfuR689NAIA1Kb0AUBYeh8AwOKOZD7JDwBgBUofAASn9wEArKlV + 5pP8AAAKU/oAIAW9DwBgKT0yn+QHAFCP0gcAieh9AAAr6J35JD8AYK73PvnyJ7949bfffv6///jx + v/zp/QHefKG/+8e/+vk3r77/6avpL78tpQ8A0tH7AAAKG5n5JD8AYLwPf/zq7/7xr8YEvpf89vd/ + +dnrIslP6QOApPQ+AIB69mW+Kx+y47NJfgBAP+998uX0zPco+WX/X35KHwCkpvcBAJSxO/O9+cA3 + H/7SP9j9mSU/AKC5z16/GvYbO+/y82+y9j6lDwAK0PsAALI7mPnOrsS+I19F8gMAWvns9avpUe+K + X/7mp9OP6F5KHwCUofcBACTVJPOd3Yx9R76i5AcAHBS89GXsfUofABSj9wEA5NIw851tjH1Hvrrk + BwDs86Mvvpoe8jbK8vs8lT4AKEnvAwBIoXnmO7sr9h25EskPALjLe598GfPv9L3k+59G731KHwAU + pvcBAETWKfOd7Yh9R65K8gMANvrbbz+f3u/u8tvf/+X0Q7tC6QOA8vQ+AICAuma+s92x78gVSn4A + wHUf/jjBn+p76rPXQf9zn9IHAIvQ+wAA4hiQ+c4Oxr4jVyv5AQAv+eVvfjq93JX5z31KHwAsRe8D + AJhuWOY7axL7jly55AcAPPK9D7+Ynu12i/aX+5Q+AFiQ3gcAMMvgzHfWMPYdeRWSHwBw8ckXX/3z + n95P6r/9ev4BXih9ALAsvQ8AYLApme+seew78ookPwDg9B+/w3N6s9vtH/7tL6Yf4JnSBwCL0/sA + AMaYmPnOOsW+I69O8gOAxf3Dv/3F9GZ3xCdfzH+SUfoAgJPeBwDQ2fTMd9Y19h15pZIfAKzpvU++ + nF7rDvrlb3469wyVPgDgQu8DAOghSOY7GxD7jrxqyQ8AVvOTX7yaXusO+qc/fjzxAJU+AOARvQ8A + oKFQme9sWOw7cgKSHwCs41fffj691h332etXp/5n9ZTSBwA8S+8DADguYOY7Gxz7jpyG5AcAK/in + P348PdUd96tvPx9/dEofAHCF3gcAsFvYzHc2JfYdORnJDwAK+/DHr/75T39Ww/c+/GLk0Sl9AMBN + eh8AwL2CZ76zibHvyClJfgBQ0s+++XJ6pGvlJ78Y90Sn9AEAG+l9AAAbpch8Z9Nj35ETk/wAoJjf + /v7T6ZGulTevZcyhKX0AwF30PgCA6xJlvrMgse/I6Ul+AFDD9z78Ynqha+u9T7onNqUPANhB7wMA + eFa6zHcWKvYdOUnJDwCy+9EXdf5g39nPvulb2ZQ+AGA3vQ8A4G1JM99ZwNh35FQlPwDI629+/V// + z//9s0r+/l//vN9xKX0AwEF6HwDAKXnmOwsb+46csOQHABn9/b/++fQ819z3P+3y1Kf0AQBN6H0A + wMoKZL6z4LHvyGlLfgCQyHuffDk9zPXwN79uf1ZKHwDQkN4HACyoTOY7SxH7jpy85AcAKXz2+tX0 + MNfD7/7wcduDUvoAgOb0PgBgHcUy31mi2HfkuyD5AUBwv/r28+lhrpMffdHsUVDpAwA60fsAgPJK + Zr6zdLHvyHdE8gOAsH73h4+nV7lO/vv//GmTI1L6AICu9D4AoKrCme8saew78t2R/AAgmu9/WvN3 + eJ797g8ff+/DLw4ekdIHAAyg9wEAxZTPfGepY9+R75TkBwBx/OybL6cnua4+e33o+VDpAwCG0fsA + gBoWyXxnBWLfke+a5AcAEfyP//Vfpve4rn717ee7D0fpA4D/x96dPtlR3gm+/1/wdKC5b2yI6MUT + VlWdUyq6y2VQCRAII1NVahuBMAizSTJgBBYGIbELSSxaEPu+2AZhtEtoq5Jk6Lj2HfdMT9jd977o + 7rkOz9gR43njSXHcp2UtVadOZeYvl8+Jzwtsqaoy8+TzZOl848kkZ3ofAFBqtcp8LZWJfTN5ByU/ + AAj0H5sj4TEuB93dyVPpAwBC6H0AQBnVMPO1VCz2zeTdlPwAIMRXR6r8wL62r9887V8alT4AIJDe + BwCUSG0zX0slY995M3hnJT8AyNkN910TXuJy8OSb86Z1WJQ+ACCc3gcAFF/NM19LhWNfi+QHAAW3 + aftQeInLx4WDnbY5pQ8AKAi9DwAoLJmvrfKxr0XyA4BiunBw9Id/N7smFi3vKM8pfQBAoeh9AEDR + yHynqUnsa5H8AKBoLl28KLzB5WbT9qEpD4jSBwAUkN4HABSEzHdWtYp9LZIfABTH3eu/Ht7g8vSf + hif7xVLpAwAKS+8DAGLJfJOoYexrkfwAoAhePXhReIDL021rv3GuQ6H0AQAFp/cBACFkvinVNva1 + SH4AEOg/DY+F17ecvXrworMeCqUPACgFvQ8AyJPM16Gax74WyQ8AQnz95trFvsRXR07/bVPpAwBK + RO8DAHIg802L2Ncm+QFAzh54/orw9Ja/0+7kqfQBAKWj9wEA2ZH5uiD2nUbyA4DchHe3KP+xOdI6 + AkofAFBSeh8AkDqZr2ti31lJfgCQta+O1PEeni2XLj75C4PSBwCUmt4HAKRF5pshsW8Skh8AZOeG + ++q7su/u9V9X+gCACtD7AIAZkvlSIfZNSfIDgCw88ea88OgW5f2/a/7lZdcrfQBABeh9AEB3ZL4U + iX0dkvwAIEUXDo6GF7fA0vfO3w1/Y/kNSh8AUA16HwAwLTJf6sS+aZH8ACAVly5eFB7dAkvf259d + +tg7Y0ofAFAZeh8A0AmZLyNiXxckPwCYodvWfuP9v+upm/c+a7792fBbn13a8ldn3MlT6QMAykvv + AwAmIfNlSuzrmuQHAF175eBF4ekttvQlvv3gEqUPAKgSvQ8AOJPMlwOxb4YkPwCYri8Pj4Wnt/DS + l3jm43//TUzpAwCqQe8DANpkvtyIfamQ/ACgc1fdXK/Yd9bS19L79SVKHwBQMXofACDz5UzsS5Hk + BwCdeOD5K8IDXBFKX+L2J5YofQBA9eh9AFBbMl8IsS91kh8ATC48wBWk9CVePHSl0gcAVJLeBwB1 + I/MFEvsyIvkB1MGs5khjwVhb8j/DN6n4kgMV3uAKUvqSP03+zuCIX2gBgGrS+wCgJmS+cGJfpiQ/ + gOqZ1Ry5dPGiu9df9crBgff/bvZpkv8z+aOrbhb+zumGe68587hVz3ufNd7+bO6kpW9u8neSv5mc + MOFvCgBARvQ+AKg2ma8gxL4cSH4A1XDh4Ohtaxd2nnuSv5x8SfhmF83jb84LL3HFKX0t0jAAUGF6 + HwBUksxXKGJfbiQ/gFJbtHy0u+7zwPNXNBb4HeaPLhzs8jCWyHRLX+LSxa71AECV6X0AUCUyXwGJ + fTmT/ABKZ1ZzZOaL0R54/gpB57wZNNOy6KL0tU6P8LcGACBTeh8AVIDMV1hiXwjJD6Asvjw8dtZn + 83Xnue1DdU5+s5ojKR7MAuqu9LW44ysAUHl6HwCUl8xXcGJfIMkPoOAuHBzNIk4l33PR8tEaPqat + 2sv6ZlL63v/8CY/hbxAAQNb0PgAoHZmvFMS+cJIfQDHNao489ua89z6bnZFXDg7cunZhfdZztcpp + dscz1rufNd76bPjNzy49l+RPk78z+TfxbEcAoA70PgAoC5mvRMS+gpD8AAol69J3qlvXLvzycPV/ + BcrteJa09CWe3T5Uw/Wep0mOQGPBWNuF7m4KAFWk9wFAwcl8pSP2FYrkB1AEeZa+th9svaLCC7tu + XbswPMkVvPS13FrLm3kmI27e4kV3r7/qXGs/k9Fx1c3CHwBUit4HAMUk85WU2FdAkh9AoJDS15b8 + 6HmLqzaZK33T+p616n0XDo7ecO81nd/ftVZ3vgWAytP7AKBQZL5SE/sKS/IDyF9s6Wt7dvvQvMWL + KnBHx2QXfrD1ivDjmZEsSl9LHXrfhYOjXVfgG+69Zlbt73cKANWg9wFAEch8FSD2FVz3yc8oA5im + gpS+tlcODixaPlreqDE4Mtb5iq3SmbL0Jd79rPvdT07Fqi5haywYu3v9VTM8/snxqcOTLgGgDvQ+ + AAgk81WG2FcKRhxADgp7t8nS3bpwcGSswgv63su+9LW0am/4u5mixoI0T4zk+Oh9AFANeh8A5E90 + qBixr0SMPoDs3Fr458olW9hYUOj5fFZzZN7iRc9uHwo/VpnKp/S1PfbmvIK/753I6MTQ+wCgMvQ+ + AMiN0FBJYl/pGIkAqSt+6Wv7wdYrCph+LhwcveHeayp80862nEtfW3KKlvGGrjn03+SsayzwGw4A + VIHeBwBZExcqTOwrKaMSIC0lKn1tz24fmre4EB90pPL8tbKIKn0trxwcuOrm0lzEZzVHFi0fza3/ + FmQ4AAAzpPcBQEYEhcoT+0rNCAWYoTKWvrZntw9ddfNYyIKvmtyx81Sxpa/tB1uvKPiNKy8cHE2G + Vf7LPPU+AKgGvQ8A0iUi1ITYVwFGK0B3Sl362l45OLBo+eiFg6P5HLT63LHzVAUpfW3JW1DAu3q2 + Ml/g26T3AUA1fOEro+fPmeJTDr0PAKYkHNSK2FcZRi7AtMxbvCg8IaXr1rULM01+tbpj56mKVvpa + nt0+NDhSlCt4cm78YOsV4e/Ue3ofAFTFF74yovcBQNfEghoS+yrGKAboxLzFi949GXEq6K71V/Ut + GEv9cD325rzwXQvxzmfNKUvfO58NRG3e/VuvyG1R51kNjowl2xD+Np1K7wOAatD7AKALAkFtiX2V + ZEQDTKLCpe/UBjTzZV8XDo4uWj768icXhe9OlIKXvrbkbQoZR89sHwrf97PS+wCgGvQ+AOicKFBz + Yl+FGd0AZ6pD6Wt7ZvtQd9Wjb8HYLWsXhm9/rLKUvnf/7b1OfUXnWc1qjlx181hhM1/bknvjZxsA + YOb0PgCYkhDAeWJfDRjpAG21Kn1tz2wfWrR8dFZzpMNDVNs7dp6qXKWv7a71V3X4Rnch+c7lWul5 + y9qF4XMOADBzeh8AnIsP/2kT+2rCqAeoZ+k71V3rr7rq5rEvD58+sV84OJocnFvWLny5xnfsPFVJ + S19L8iYm73K6Yyc5Q0p6euh9AFANeh8AnMYH/pxG7KsVMwBQW18eHgvvDpRCqUtf22Nvzjuz6nY3 + cMp+Q1e9DwCqQe8DgBYf8nNWYl8NmQ2Auvny8NjL1qzRgWqUvrYl917T9V09+xaM3b/1ivBdSIXe + BwDVoPcBUHM+2GcSYl9tmRmAmlD66FDFSl9LcvJ3/sTGlnmLF1Um87XpfQBQDXofAPXkw3ymJPbV + nFkCqLYLB0eVPjpRydLXloyCJfdeM/mNPZPBctXNY89sHwrf2ozcsnZh1+scAYDi0PsAqBUf4NMh + sY/zzBhAdT325rzwxEDxVbv0neqZ7UN3rb9q0fLRxODIWOs/blm7sMKN71TJhKD3AUAF6H0A1EF3 + H9qfP2fxf/ChfS2JfbRJfkDFLFo+Gh4XKL76lD7e1fsAoCr0PgAqrPvM59pXY2Ifp5H8gGpwA086 + ofTVkN4HANWg9wFQPTIfXRP7OCvJDyi7JfdeE94UKDilr7b0PgCoBr0PgMqQ+ZghsY9JSH5Aeb30 + yUXvfNYD5/L2p803Px1+89NLJ/H2pwPh20lGHn1D7wOAKtD7ACg7mY9UiH1MSfIDSudvRsbCUwJF + pvTxjt4HAFXRUe9rfDN8OwHgNDIfKRL76JDkB5TIknuvCe8IFJbSR5veBwDVoPcBUC4yH6kT+5gW + yQ8ohVVbrwiPCBST0sdp9D4AqAa9D4BSkPnIiNhHFyQ/oOA8sI+zUvo4qyX3xs9aAMDM6X0AFJnM + R6bEProm+QGFFd4OKCClj0n0LfDLCQBUgd4HQAHJfORA7GOGJD+ggMLDAUWj9DG5VVuvCJ+4AIBU + 6H0AFIfMR27EPlIh+QGF8s6ns6Ht7U8bb346981P503i7U/nhG8nsSzuA4DK0PsACCfzkTOxjxRJ + fkBBhFcDikPpo0O3rl0YPncBAGnR+wCIIvMRQuwjdZIfEO7RN4bDwwFFoPTRuZc+GQifuwCAFOl9 + AORM5iOQ2EdGJD8g0K1rF4aHA8IpfUzXl4f9EgIAlaL3AZAPmY9wYh+ZkvyAEPMWj4VXA2IpfXTh + qpv9+gEAVaP3AZApmY+CEPvIgeQH5GxWc+Ttk7mHmnrr08Ybnw6/8em8Sbz16UD4dlI0Y8tHw6cv + ACB1eh8AWZD5KBSxj9xIfkCevvvUVeHhgBBKH127/t74uQsAyILeB0CKZD4KSOwjZ5IfkI++BWPh + 4YD8KX3MxKqt88PnLgAgI3ofADMn81FYYh8hJD8gB6u2zg9vB+RJ6WOGrOwDgGrT+wDomsxHwYl9 + BJL8gExZ3FcrSh8z55l9AFB5eh8A0yXzUQpiH+EkPyA7ntxXE0ofqRhe7FcLAKg+vQ+ADsl8lIjY + R0FIfkAWLhgcDc8HZE3pIy1fHvZLBQDUgt4HwORkPkpH7KNQJD8gdbesXRheEMiO0kdanv5wKHy+ + AgByo/cBcFYyHyUl9lFAkh+QIov7KkzpI0XX3xs/XwEAedL7ADiVzEepiX0UluQHpMXivkpS+kjX + BYOj4ZMVAJAzvQ+A82Q+KkHso+AkP2DmLO6rHqWPdK3aOj98pgIAQuh9AHUm81EZYh+lIPkBM2Rx + X5UofaTub0b8wgAA9aX3AdSQzEfFiH2UiOQHdM3ivspQ+kjd0x8Ohc9RAEAsvQ+gPmQ+Kknso3Qk + P6A7t6xd+NbJVESJvflp4/VPh1//dN4k3vx0IHw7KZcFS/2GAADofQDVJ/NRYWIfJSX5AdN1weBo + eFNgJpQ+svDCJwOzmiPhExQAUAR6H0BVyXxUnthHqUl+wLRcd+814WWB7ih9ZOSWtQvDpyYAoDj0 + PoCKkfmoCbGPCpD8gA7Nao688IkeVD5KH9m5YHA0fGoCAApF7wOoBpmPWhH7qAzJD+jE6HI38ywZ + pY/sfH/r/PBJCQAoIL0PoNRkPmpI7KNiJD9gchb3lYvSR6b+ZsTVHwA4O70PoIxkPmpL7KOSJD9g + Ehb3lYXSR6Y2fjgUPh0BAEWm9wGUiMxHzYl9VJjkB5yVxX2loPSRtQVLXe4BgCnofQDFJ/PBeWIf + NSD5AWeyuK/glD5yMKs5Ej4XAQDFp/cBFJbMB21iHzUh+QGnsrivyJQ+cnDL2oXhExEAUBZ6H0DR + yHxwGrGPWpH8gDaL+4pJ6SMffzXsyg4ATIPeB1AQMh+cldhHDUl+wHkW9xWS0kc+vr91fvgUBACU + jt4HEEvmg0mIfdSW5AdY3FcoSh+5GV7sUg4AdEPvAwgh88GUxD5qTvKDmtvw4dCbP51NuDd+2nzt + p8Ov/XTeJN746UD4dlIByagPn3kAgPLS+wDyJPNBh8Q+OE/ygxobXjwWnh5It/S9fLxny3jvc0d7 + nzjUSKw90Fi1r9ly797mHbv6zyX50/bfTL6q9eXJ90m+W/I9w48SaRldPho+8wAApab3AeRA5oNp + EfugTfKDerK4L9YMS9+W8d6nDvc9dvBk0fvensla3sy1auAThxpPH+lLfm74oaM7s5oj4dMOAFB2 + eh9AdmQ+6ILYB6eR/KBuLO4L1EXpa9W9B/c3sk57Hea/tQcayfa8cMzSv3L4zpqF4XMOAFANeh9A + 6mQ+6JrYB2cl+UGtWNwXovPSt2W89/HP1+7dvqu/sJbv6n9gv/BXdH817DINAKRG7wNIi8wHMyT2 + wSQkP6gJi/vyN2Xpe+H4vKcO//UD+xvhFa+78LfmQGPjkb7XTsQfatru2zo/fLYBACpG7wOYIZkP + UiH2wZQkP6gDi/vyNEnpe+H4vCcPz1u577I7dg2GN7tUrNrXfOpw38vHLfeLN7zYdRkASJ/eB9Ad + mQ9SJPZBhyQ/qDaL+3Lzxk8br/107jkb3+7PVaX0nVb9Nh7ptdYvyoYPvxo+zwAAVaX3AUyLzAep + E/tgWiQ/qLANH341vEdU3pmlb/2ReQ8cuPSPja+6pe9Uaw40njvaG/5e1M3o8tHwSQYAqDC9D6AT + Mh9kROyDLkh+UEkW92Xt1NL3wvF5Dx+ct2LPZX+S+WpQ+tru3tN8/KCH+uVnVnMkfJIBAKpN7wOY + hMwHmRL7oGuSH1TPfVvnhyeJqmqXvufGz1jKV7/Sd6o1BxovH49/g6rtO2sWhk8vAEAd6H0AZ5L5 + IAdiH8yQ5AdV0rvA4r5MtErf+iOnPJVP6ftTq/Y1t4z3hL9TVfVXw+7hCQDkRO8DaJP5IDdiH6RC + 8oPKsLgvdW/8tLH+yPDde8+d+Wpf+iS/TCWDOnxiAQBqRe8DkPkgZ2IfpEjygwroXTD2xsk+RTo2 + Hum/e++lk2W+Vunb2U/b9/c2N4/3hr93lTF3sYssAJA3vQ+oLZkPQoh9kDrJD8ruvi1XhOeJCtg8 + 3nvXnovu2KX0SX6Rth0YCJ9SAIB60vuAupH5IJDYBxmR/KC8LO6baV6Z6Pn+3uYdO5W+FKw50Hjp + WE/4e1peI8s9rQ8ACKP3ATUh80E4sQ8yJflBSVnc151XT/SsOdC4fWe/0peiFbv6nzjYlxzb8Pe3 + jC4YFPsAgEh6H1BtMh8UhNgHOZD8oHQs7uvCukN9K3b1K30ZuXtP89mj7uo5PTevWRg+mQAA6H1A + Jcl8UChiH+RG8oNysbivc637draalNKXqQf2Nyzx61zvAhdQAKAQ9D6gSmQ+KCCxD3Im+UFZWNzX + oScO9rVTlNKXgxW7+tcd6gt/34tv7evD4dMIAECb3gdUgMwHhSX2QQjJD0rh5jULw4NFkW2b6Fm5 + p6n0hfj+3qYlfpObu9gVEwAoFr0PKC+ZDwpO7INAkh8U3F8Nj4YHi8Jad6jv1Pak9OVvxa5+T/E7 + l20HBsInEACAM+l9QOnIfFAKYh+Ek/ygyNa+PhyeLYrm1RP//oQ+pS/cmgOe4ncWI8tHw2cPAICz + 0vuAspD5oETEPigIyQ+K6cqlntz3JzaP967Y9SexSekLt3JPc9uE3vcnLhgU+wCA4tL7gIKT+aB0 + xD4oFMkPiuaCQXfy/HdPHOw7LTMpfQWxYlf/xiNu6flHN69ZGD51AABMTu8Diknmg5IS+6CAJD8o + lG0HBsLjRbgzb92p9BXQmgON8FOlCHoXuBoCACWg9wGFIvNBqYl9UFiSHxTEfVuueP2ns+vs+Yne + u3af3pWUvmJauaf56ome8HMm0PoPhsInDQCADul9QBHIfFABYh8UnOQH4Woe+5450nfaQ/qUvoK7 + a3f/8xO94WdOlMX3xk8aAACd0/uAQF/4yqjMB9Ug9kEpSH4QaPG914T3iygbDved2ZKUvuJbsat/ + 83hNe9/cxS58AEDJ6H1A/pKZJ5lYZD6oDLEPSkTygxC1Xdn3yIHGmRVJ6SuRDYf7ws+i/HlgHwBQ + RnofkBuZDypJ7IPSkfwgZ/WMfWuUvkpYd6h2vS98xgAA6I7eB2RN5oMKE/ugpCQ/yM36D4bC+0We + Xj3Ro/RVSfJuhp9UeQqfMQAAuqb3ARmR+aDyxD4oNckPsnbB4Gh4vMjTqyd6Vu5pnhmMlL5Sq1Xv + C580AABmQu8D0iXzQU2IfVABkh9kZ+7isfB4kZtXT/Tcs6d5287+09y+869v23Xp7bsvm8zOwTO/ + kOJ46EAz/ATLx6zmSPi8AQAwE3ofkAqZD2pF7IPKkPwgCyueuio8XuRD6au8mvS+3gUuagBA6el9 + wEzIfFBDYh9UjOQHKarPPTz/WPp29J/m9p0XnSx9uy6bzM7BM7+QYnpof/V735VLXc4AgCrQ+4Au + yHxQW2IfVJLkB6kYWV6X2Hef0lcble99K566KnzqAABIhd4HdE7mg5oT+6DCJD+YofUfDIWXixw8 + tF/pq5fHP+kLP+uy8/yBAY/tAwAqQ+8DpiTzAeeJfVADkh90569HxsKzRQ6UvnracLjKvW/uYtcv + AKA69D7gXGQ+oE3sg5qQ/GC6lq5Z+NqJ2dX25MHGmRlI6auJ9Yf7ws/AjDz1wVD4BAIAkCK9DziN + zAecRuyDWpH8oEOzmiPhwSJr6w/3nRmAlL76WL6zf+tEb/h5mJFLLO4DAKpF7wNaZD7grMQ+qCHJ + D6Z0xdKx8FqRqa0TvWfWH6Wvbpbv7H/lRE/42ZjJGe7JfQBA5eh9UHMyHzAJsQ9qS/KDSTz1wVB4 + rcjOKyd6lu88vfsoffV0z55mVXvfNctHw2cSAIB06X1QTzIfMCWxD2pO8oMz9S6o8rK+V0703LOn + eVrxUfrq7KH9zfDTMgtbDwxcMKj3AQBVo/dBrch8QIfEPuA8yQ/+1NI1C8M7RXYe2q/0cbonDzbC + z8wsJGM5fD4BAEid3gd1IPMB0yL2AW2SHyRmNUdeO/GVqlp/uO+0yqP00bJ1oif8/MxC7wJXKACg + gvQ+qDCZD+iC2AecRvKj5i5ZPBaeJzKydeL0R/UpfbTduav/leOzw8/S1N27ZX74rAIAkAW9D6pH + 5gO6JvYBZyX5UVtrXh8OzxNZeOX47NMe1af0cZr79zXDT9QsXLLYhQkAqCa9DypD5gNmSOwDJiH5 + UTd/NTwaHiYy8vCBxqlZR+njrNYd7As/V1P31AdD4XMLAEBG9D4oO5kPSIXYB0xJ8qM+lq65OjxM + ZOHpI72nBh2lj3NZvrOaD++7ZvlI+PQCAJARvQ9KSuYDUiT2AR2S/Ki8Wc2RrQcGwqtE6l45PvvU + R/UpfUzunj0VvJlnMrSTAR4+yQAAZETvg3KR+YDUiX3AtEh+VNgli8deOzG7eu7f9++P6lP66MRj + nzTCz9vULV1zdfgkAwCQHb0PSkHmAzIi9gFdkPyopJVb5of3iNSdegNPpY/ObRnvCT97U3fB4Gj4 + PAMAkB29D4pM5gMyJfYBXZP8qJILBkfDS0TqXj7lBp5KH9Ny38mbec6umJVb5odPNQAAmdL7oIBk + PiAHYh8wQ5If1XDtymvCS0TqHj7QaIUbpY8uPHmwL/wcTl3PlS49AEDF6X1QHDIfkBuxD0iF5EfZ + bdk/EJ4h0vXc0Z5WslH66M7ynf0vH48/k9O17oOh8NkGACBreh+Ek/mAnIl9QIokP0rqksVj4Q0i + dffsbt6+o//2HRfdvvPSO3ZdNonbdwx+/jfhdKv3N8LP5NRdsdQVBwCoPr0Posh8QAixD0id5Efp + rNwyPzxApOupQ32fxxqlj5l67mhP+Pmcri37B2Y1R8KnHQCArOl9kDOZDwgk9gEZkfwoiwsGR8Pr + Q7pePj57+clMo/SRgvv2NMNP6dRds1zsAwBqQe+DfMh8QDixD8iU5EfxLVu3IDw9pOuxAw2ljxQ9 + dagv/KxO3QWDo+GTDwBADvQ+yJTMBxSE2AfkQPKjsHqurNrT+rZN9Ch9FfbAvvnv/t+Pffb/7fr7 + fxn/3f/+H3/4wx+S/0h89J+fffSTsYx+6J27+sNP7NQtW7cgfP4BAMiH3gdZkPmAQhH7gNxIfhTN + rObIug+GwqNDuh7cP6D0VdKGIzf+/b+M/2HS17/+9h9f/fT+LH76kwcruLiv50oXFwCgLvQ+SJHM + BxSQ2AfkTPKjOFZumR+eG9K1baJ5+85Lb9t12WR2DN76cT8lcvfui4/88v0/dPz61a9//ugnY+lu + w7Id/S8fjz/D07Vl/8Cspof3AQB1offBzMl8QGGJfUAIyY9wS9dcHd4a0vXKicaDB+YpfRXz6Cdj + v/r1z/8wzdfv/vf/eOXT+1PekgON8JM8dQ+9Pqz3AQD1ofdB12Q+oODEPiCQ5EeIWc2R1a8Pv3pi + dpW8fKKxeWKu0lcxj34y1nowX3evdHvfsh39Lx3vCT/VU7da7wMA6kTvg+mS+YBSEPuAcJIfebpo + ZGzz/oHwvpCul080Xjox94H9lyp9VTLD0tda35fu/TyfONgXfrZnYfXrwxcMjobPTgAA+dD7oEMy + H1AiYh9QEJIfWeu5cuyeLfPDs0LqWqVv88Q8pa9KZl76Wq9f/frnKW7Vd3f1h5/wGdm8f2D+UlcT + AKAu9D6YnMwHlI7YBxSK5EfqLhgcnb90rHr37Wxplb4XT8x76MClSl9lpFX6Wq90b+a57lA1F/e1 + 3LNl/kUjriYAQC3ofXBWMh9QUmIfUECSHzP3l8Oj31p5TVUbX0u79G07Pm+Z0lcV6Za+5PWvv/3H + FDfve7ub4Wd+1p78YCiZPXqudEEBACpO74NTyXxAqYl9QGFJfnThopGxpWuufvKDofBekLV26Us8 + dnCe0lcNqZe+1mvLsRUpbuSzR3rDz/98bN4/sGzdgvlLxzzRDwCoKr0PzpP5gEoQ+4CCk/yY0qzm + yCWLx5atW7B5/0B4HcjHqaUv8d3dSl8VZFT6ktfe//pyitu5am/1F/ed6ckPhpauuTqZapIJJ3zS + AwBIkd5Hncl8QGWIfUApSH6cqfUwvnu2zA+vADk7rfQ9fXSe0lcB2ZW+5PWLfx5Pd2ufn+gJHwiB + Vr8+/K2V13i6HwBQGXofNSTzARUj9gElIvlxXj0exjeJ00pf4oH9lyp9ZZdp6UteyTdPeYMPNMLH + QkHcs2X+/KVjybwUPjcCAMyE3kd9yHxAJYl9QOlIfvVUn4fxTeLM0rft+Dylr+yyLn2tV7rb/N1d + /eHDoWhaD/i7ZLEH/AEAZaX3UXkyH1BhYh9QUpJfHbQexnfTmqs37x945fjsmnvpePPFPy19iccO + zlP6Si2f0pd67Es8c6Q3fFAU1hM/Hmrd59MD/gCActH7qCqZD6g8sQ8oNcmvkr70+cP47li3IPwT + ++I4a+lL3L1H6Sux3Erfv/72H1Pf+Af3NcLHRSk8+NrwN5aN9FzpogMAlIPeR8XIfEBNiH1ABUh+ + 1fCXw6PfWDby4GvD4R/OF825St+z4/OUvvLKrfQlr1/883jq279sR3/40CiXzfsH7li3wAP+AIDi + 0/uoBpkPqBWxD6gMya+kLhoZ+9bKa5748VD4R/HFdK7Sl3jowKVKX0nlWfqS1/b//GwWe7HuUF/4 + ACmpZMa7ac3Vlywe+5IH/AEAhaT3UWoyH1BDYh9QMZJfKXgYX4cmKX2J7+6+7Padl9328eBtH/dT + IjmXvuSV/MQsduT+Pc3wMVIBD7423HrAX/jMDABwKr2PMpL5gNoS+4BKkvyKycP4pmXy0vfs+Dyl + r4zyL32/+vXPs9udF4/1hI+UKrlny/xvLBtxn08AoCC+8JWRP2t+S++jFGQ+oObEPqDCJL+C8DC+ + Lkxe+hJrP5mn9JVO/qUveW05tiK7Pdpw2J08M9F6wJ/7fAIARTBlQNH7iCXzAZwn9gE1IPlF8TC+ + rk1Z+hLf2/U34emKaQkpfb/45/FMd+rBfY3w8VJ5rQf8uc8nABBI76OYZD6ANrEPqAnJLx+zmiMX + jXgY34x0Uvq2TgyEpyumJaT0/erXP79798WZ7teyHf3hQ6Y+nvjx0CWLXZIAgBh6H4Ui8wGcRuwD + akXyy07PlScbX/iH4WXXSel76fjAukN94fWKzoWUvuQnJj83h73bdLQ3fODUyhM/Hkrm2/A5HwCo + Ib2PIpD5AM5K7ANqSPJL15cGR7+3Zf7Lx2czQy8db75wfO4Lx+dN4sXjA8nfXLWnGR6w6FC1S1/i + kQON8LFTQwuXjYRP/gBADel9BJL5ACYh9gG1Jfml4pLFY5v2DYR/7l0BnZe+xLId8Q2LTlS+9CVW + 7m6GD596umnN1eGXAACghvQ+8ifzAUxJ7ANqTvKbiZvWXB3+cXc1TKv0bTraG96w6EQdSl9L+Aiq + Lb0PAAih95EbmQ+gQ2IfwHmSX1eUvrRMq/QlHv/EA/tKoD6lL/H0kd7wcVRblyyu72UIAAik95E1 + mQ9gWsQ+gDbJr3MLl42Ef8RdDS8db3xe+oYn8eLxOad+iQf2FV+tSt9tJx/b1xc+lGpr076BLw2O + hl8UAIAa0vvIiMwH0AWxD+A0kt+Ueq4cC/98uxq6KH2JOz7uv/XjORTWI58sCil9yc+N2mWP7Yv1 + vS2Xh18XAIB60vtIl8wH0DWxD+CsJL9zmdUcefzHQ+EfbldAd6Vv68TsW38yh8J65MDY737/m7xL + 3+9/k/zcwL2+w2P7ovVcWfFLDwBQWHofqZD5AGZI7AOYhOR3JjfwTEV3pS+x/lBveM/iXOpZ+lqe + O9oTPqzq7PZ1C8KvDgBAbel9zITMB5AKsQ9gSpLfqTbtGwj/WLvsui59iYf394VnHc6qzqUvse6g + x/YFm9UcCb9AAAC1pffRBZkPIEViH0CHJL/EJYs9rW+mZlL6EvfuboZnHc5U89KXeHi/2BcsmZ/D + rxEAQJ3pfXRO5gNIndgHMC01T363r1vw0slcRdca247P3XZ8eBIvHB+Y5Dvc8XH/rR9RLJGlL3rf + 21buakYPrrr75spvhF8jAICa0/uYkswHkBGxD6ALtU1+z+0beCn7j6yra6alb9tET3jT4TRKX8sd + H/dHj6+6+97m+eHXCACAKTvO+XOu/cJX3H68jmQ+gEyJfQBdq1vy+9LgaPin2WU209KX2Hi4N7zp + cCql71TRQ6zuHv/xUPhlAgDgPL2PM8h8ADkQ+wBmqD7Jb/aVY+GfZpdWCqUv8diBxi0fzaEgHg4q + fcnPDd/3s9p4uDd6oNVd+GUCAKBF76NF5gPIjdgHkIo6JD+xr1vplL7E2v1iX1EofWd68pO+6LFW + d+GXCQCANr2v5mQ+gJyJfQApqnbyE/u6klrpS6zc1QwPOiQe3h9U+vYXt/Ql1u4T+4KFXyYAAE6l + 99WTzAcQQuwDSF1Vk5/YN31plr6XImLfw/vHXj5+/4c/f6Zt/aEb79p5cXhXCqT0ncsP9jSjR1zd + hV8mAABOo/fViswHEEjsA8hI9ZKf2DdNKZe+RG7VZtXu+Xv+/uV/+e0/nqs9ffr/7nr5+P3hdSl/ + St8kVu4S+4KFXyYAAM6k99WBzAcQTuwDyFSVkp/YNx3pl76Xcol9d+28+MOfP9NhhPrVr39eigiV + FqVvcnfu6I8ed3UXfpkAADgrva/CZD6AghD7AHJQjeQn9nUsk9K3Zbznlu1zMrVq9/xf/frn061R + J5f4ZbxhRXDXjosnWeqY0etk6ds3Fr7vnYseenUXfpkAADgXva96ZD6AQhH7AHJT9uQ3+8qxF4/P + ZiqN54/Pff748CS2HRvo4jtvONz3ne1zsrN2X/fL1vb8/cuZblu4O3dc/Mv/f9oZdIav5O1I3pTw + fZ+W6NFXd+GXCQCASeh9lSHzARSQ2AeQs/ImP7GvA1mVvhczjn13znjZ2uH/9l54acru4Ch9Hdp8 + tCd6DNZa+AUOAGByel/ZyXwAhSX2AYQoY/IT+6aSYelLPPFJhrHvF/98dOZ9qpK9T+mblg2H+6KH + Ya2FX9oAAKak95WUzAdQcGIfQKByJT+xb1LZlr7Emr2N73w4Jwubj65Iq1Kd7H3ZbGSIOz8OKn17 + x8L3vTtiX6zwixoAQCf0vnKR+QBKQewDCFeW5Cf2nVvmpe/FLGPfv/zPGd3A87RXZXqf0tcFsS9W + +OUMAKBDel8pyHwAJSL2ARRE8ZOf2HcOeZS+FzOLfWv3jqVerCrQ+5S+7jx1sDd6PNZa+IUMAKBz + el+RyXwApSP2ARRKkZOf2Hc2OZW+FzOLfXt+8VIW3arUvU/p61pylkYPyVoLv4QBAEyL3ldAMh9A + SYl9AAVUzOQn9p0hv9L3Ymax7xf/fDSjelXS3ney9P33n/0h31c1St93xL5o4RcvAIDp0vuKQ+YD + KDWxD6Cwipb8xL4/lWvpS3xvR/PmD+akLtOGdfi/vZfFNmfnuz+JKX1r9o6F73sqxL5Y4ZctAIAu + 6H3hZD6AChD7AAruCz1jya/QRUh+Yt8p8i59L5Yz9v2hVL1P6Zs5sS9W+AULAKA7el8UmQ+gMsQ+ + gFJIfpEOT36zrxx74dhsXjjW3Hps7tZjw5N4/thA6j+3pLHvDyXpfUpfKh7a24genrUWfqkCAOia + 3pczmQ+gYsQ+gBKJTX5i3+diSt8Ln8e+73wwJ3X5VK3D//BeFhuflsDSF77v6RL7YoVfpAAAZkLv + y4fMB1BJYh9A6UQlP7EvsPS9kFns+5f/+Y/5tK3C9j6lL0ViX6zwyxMAwAzpfZmS+QAqTOwDKKn8 + k1/tY19k6Us8sKeRRZ359J925la4Ctj7lL50iX2xwi9MAAAzp/dlQeYDqDyxD6DU8kx+9Y59waUv + 8dDeTGLfS8dW5dm5CtX7lL7UiX2xwi9JAACp0PtSJPMB1ITYB1AB+SS/Gse++NKXeGhP4+Yfz0nd + dz+6OOfadfgf3stiR7rY8ZjSt3ssfN+z8/iBvujRWmvhFyMAgLTofTMn8wHUitgHUBlZJ7+6xr5C + lL4XPo99S388JwuH/+G9nJtX8hMz2pcOrdgeVvpidzxr6w+JfZHCL0MAACnS+7om8wHUkNgHUDHZ + Jb9axr6ilL4Xsox99+2Y/7vf/ybn8hXY+5S+7Ih9scIvQAAA6dL7pkvmA6gtsQ+gkrJIfvWLfQUq + fYmH9zWyazQvjuf65L7WK6T3KX2ZEvtihV96AABSp/d1SOYDqDmxD6DC0k1+s68c23aspzaaW47N + 3XJs3iS2HhvIc5PWH+xb+qM52cn/Zp5/aPW+LHfqNJGlL8fdDLTxcG/0yK218IsOAEAW9L7JyXwA + nCf2AdRAWsmvTrGvcKVvW/axb2nVe5/Sl4PokVt34ZcbAICM6H1nJfMB0Cb2AdTEzJNfbWJfEUtf + YuPh3hxiTVV7n9KXj+jBW3fhFxoAgOzofaeS+QA4jdgHUCszSX71iH0FLX0t+fSa6vU+pS8fd3zY + Hz1+6y78EgMAkCm97zyZD4BzEPsAaqi75Ne85rrnj1X7w/xCl77ETT+ck49D//XdP+T+Sn5oFvuy + /MOY0vfQrrHc3q+CuOujZvQQrrvwiwsAQNbq3PtkPgAmIfYB1NZ0k1//2JLPa9fFFU1+RS99ibs+ + auYWbqrR+5S+PN3zsdgXOj9snh9+WQEAyEENe5/MB8CUxD6Amus8+bVi379lr4olvxKUvm35xr6b + yt/7lL6crd7dCB8jdXbrk1eFX1AAAPJRn94n8wHQIbEPgPM6S36nxr5qJb9ylL7E6t2NnPNNeXuf + 0pe/R/eJfZG+vmw0/FICAJCbyvc+mQ+AaRH7AGibPPl95etLzhHCSp38SlP6Emv3Npb+cE7Oonrf + TLZ5+QdhpS//N6g41h/sCx8jdfYXw2IfAFAvVe19Mh8AXRD7ADjNJMlv/b4rzl3Eypj8ylT6EusP + 9oVEnHL1PqUvypbx+DFSW4/+aCj82gEAkL+K9T6ZD4CuiX0AnNVZk99tT1+7+di8SWw5dvHWif7n + j/WUQXPzsbmT787WYxdFb+SfePZIb1THKUvvU/qi3PKjsgz8anIPTwCgtqrR+2Q+AGZI7ANgEqcl + v+GlN0xex8qT/MpX+lpu+VF/VM0pfu9T+gLd9VEzfHTU1sa9F53fLPrnVwAA2Sl175P5AEiF2AfA + lNrJ70tfu+6pfVd00vuKnfzKWvoSd37UvOn9OVGiel8n27YsqPSt3jUW+I4Ux/07G+Gjo7Yuvcmy + PgCg7srY+2Q+AFIk9gHQoVbyu+Z7SzYfG+7clmNf+zz5zS6Mxuelb7Jt3npsIHojz+n+nY3YplPM + 3hdW+nYqfX/0yN6+8NFRT3duvjz86gAAUAQl6n0yHwCpE/sAmJb/66JFT+27bFq9r0jJr9ylL/HI + 3r7wrFO03qf0FcGGQ73ho6OGNu4dcANPAIC24vc+mQ+AjIh9AEzXnJGxrccGNh+7pGzJr/SlL7Hh + UG941rmpSL1P6SuI8KFRQxv3DvzFsBt4AgD8icL2PpkPgEyJfQB0YclDVz9/bHapkl8VSl/Ld37Y + H152bipG71P6CuLO7c3wcVE3Sh8AwLkUrffJfADkQOwDoDut3vd8OZJfdUpf4s7tzZvem1MEh/5L + RO/7L++2fvryHweVvh1j4Ue+aO7f0QgfF7Vy5+bL3b0TAGASBel9Mh8AuRH7AOhau/c9X+jkV6nS + l3hwVyM87rRF9T6lr1Ce2N8XPi5q4pEfDX3t2rHwyR8AoPhie5/MB0DOxD4AZuLqZSOnfhBdvORX + tdKXeOqT3vC4c6qQ3ve73/8m/5+o9J3L5vGe8HFReateHZb5AACmJaT3yXwAhBD7AJihvxgeXfXq + 8NaJ2W1bJgY2TVyyaWJ4WjYfu3jrRP+p32fGGpsm5k7+Q5NNTfUn5uTG9+YUysGI3pfn63e//82D + O8bCj3MxLfugf2v253xtJbPrpTeNfmnQ4/kAALqRZ++T+QAIJPYBkIqvXTv23c2Xn/oZdXTyq2zp + S9z9UTM88Zymwr1P6Zvcqh3N8BFRPbc8uSCZVDU+AICZy6H3yXwAhBP7AEjRlwZHL71p9JYnF2zY + 88eOFpT8qlz6Eg/tboQnnjNVsvcpfVNa90lf+IiojFbjO785cl720zUAQH1k1/tkPgAKQuwDICOz + rxz7+rKR1h0+801+FS99iacP94QnnrOqWO9T+qZ08/tzwodD2W3YM6DxAQBkLfXeJ/MBUChiHwBZ + O7850j8ytuShq9f+aDj75Ff90tdy64/6w0PPWVWm9yl9nbj7I/fw7NKGPQPJrJjMjeFTNABATaTV + +2Q+AApI7AMgT38xPHr5d75568ZvZpP86lL6Eqt2NG58d04xHfz70ve+k6Xv47HwI1l8D+91D8/p + 0fgAAALNsPfJfAAUltgHQIjkHzvN0eu/+YPrV70xklLyq1HpO5kMDvWGh55JlLr3KX2d2zTeEz4W + SuHhHw0tWvmN2VdqfAAAwbrrfTIfAAUn9gEQKPmHT/LPny997brhpTd8+7Hr1nx4dbfJr16lr+WW + H/Z/+905hVXS3ve73//mgY/Hwo9eKdy13T08p9BqfH8xPBo+2QIA0Dat3ifzAVAKYh8A4VrJr3UB + +srXl1xxx5JbN147neRXx9KX+P7HzW+/M6fIStf7/lj6oo9bWbiH57msenX468tGND4AgMLqrPeN + ynwAlIXYB0BBnJr8WppjS6a8z+fmYxfXs/QlNhzsDc89UypR71P6pmvTUffw/BOrXh2+9KbRLw1q + fAAAJdBFyJP5ACgssQ+AQjkz+SX+/LLr5y694YbHrnty7/znJoanZfPEwJaJnqq65f3+8OIzpVL0 + PqVvuu7+sBl+/hfE9z9vfF/U+AAAyiat3ifzARBO7AOggM6a/E69z+dd2xYpfYkf7GiER59OFLz3 + /e73v3nwJ0rf9Kzd0xd+/sf6zpMLhq4dO785Ej5hAgDQtRn2PpkPgIIQ+wAorEmSX8vg4pP3+fz+ + GyP1LH2JjYd7vv32nFL45O/f+UMhXyfX9H00Gn58ymXpO/3hJ38UjQ8AoGL+rPktmQ+AshP7ACi4 + KZPfWe/zuWniki0TtegRy3/cf8Pbc0qhgL3vt7//zQ8+Gg0/MqVz38f1uofn+j0D16++WuMDAKiY + L3xlpIuVfTIfAAUk9gFQCp0kv/Z9Pr/xvT/e53PTxMWVT35rd/fd8NacsvjkFwXqfb/9X5+Xvuhj + UkYbD8ef+TloNb7+kbHwCRAAgHTJfABUjNgHQIn8Wd/fdv4PsS997bor7ljy0AdXVz753fROfP3p + XEF6n9LXteU/qvJoatH4AACqqrvM92+x79rky8N3AQDOJPYBUBZf+MrorIHFXfyLbO7SG57cO7/C + ye/+HY3wADQt4b1P6ZuJtbv7ws/57Fy/+uovDo6GT3cAAKRuJplP7wOg4MQ+AEqh69LXXuVX4Rt7 + bjzcEx6Apiu29z29d1n4ESip77xbteHT9v1Xh/9iWOYDAKigVDKf3gdAkYl9ABTfDEtf2w2PXffc + xHAlk9/K7c3wDDRdUb3v+YP3he97ea3e2Qg/27PwnScXnN/0iQ0AQNV0l/lm6X0AlI3YB0DBdVL6 + kn++nT+noxrY7n0VS34bD/cseWtO6Rz4z3n3vq2f3Be+1+V149tznjsaf7an7vrVV4dPdAAApKu7 + zJf8u/I/9C5KvnzKr9X7ACgUsQ+AIuuo9H3+b7FE8h+dJL8bHrvu2YnhtucmLt48MWfzRE/ZLfth + /5I355ROnr3vZOmL3t9SW/VxI/w8T913N10ePtEBAJCiGWa+Nr0PgBIR+wAorGmVvrYpk9+Xvnbd + 6g+uPrX3VSP5Pb6/LzwGdSef3qf0zdCNb8959khv+HmerjU/HHL3TgCAykgr87XpfQCUhdgHQDF1 + V/raJk9+zbElp8W+aiS/ki7uW5J971P6Zq6Sy/pmXzkWPtcBADBzqWe+Nr0PgFIQ+wAooBmWvrZJ + kt+tG689a+8rdfI7ubjvjTkllV3v23rgvvC9K7sb3+qv3rI+N/AEAKiA7DJfm94HQPGJfQAUTVql + r+2sye9ci/vKnvyW/7A/PAx1LYvep/SlYtVPKris78+HR8OnOwAAupZD5mvT+wAoOLEPgEJJvfS1 + nZn87ty2aPLeV8bkt+FQ7/VvzCmvdHvf1gP3he9RBXz7rTmW9QEAUBx5Zr42vQ+AIhP7ACiO7Epf + 26nJb+7SG6aMfWVMfnd/0Lz+9TnllVbv27r/3vB9qYZKLusbutbT+gAAyick87XpfQAUltgHQEHk + UPra2slv9QdXd9j7SpT8Nhzq/fab8YVoJmbe+5S+tNz8dn/4KZ26NT8cCp/xAACYltjM16b3AVBM + Yh8ARZBn6WtLvuHCu6/vPPaVKPmt+kkjPBLN0Ex6n9KXokf29IWfz6mbd5On9QEAlEZBMl+b3gdA + AYl9AIQLKX0t5zdHnhu/6NmJS6ab/J6duHjTxJxN4z3F9MyR3qVv9Yd3ohl6//iG6Wa+3/6v3zzy + kxvCt7wylr3fH34yp27dnouSgR8+7wEAMKWiZb42vQ+AohH7AIgVWPparlt99abxnuolv4d3l35x + X2LD7jv++Te/6rD0/eyfDt/93uXh21wlGw71hp/JqUuGfPi8BwDA5Aqb+dr0PgAKRewDIFB46Uv8 + +fBouwJULPnd8X7/da/NKbtb3vra+8c3TJ78fvZPhx/+6IbwTa2Y73/UCD+Hs/DFQffwBAAoruJn + vja9D4DiEPsAiFKE0teyYtPlp7aAyiS/DYd6b3gjvhml5f4fj756aO2B/+ftn/3T4Zb3j2/Ysv/e + u969PHzbqufmt/qfOVLBZX03P7kgfOoDAOCsSpT52vQ+AApC7AMgRHFKX2Lo2rEzo0A1kt8PPm6E + ZyPK6LF9feFnbxa+cuVY+OwHAMBpypj52vQ+AIpA7AMgf4UqfS0P/XDorGmgAsnv9vf6r3t1DnRu + 5YfN8PM2C8kwD5/9AAA4VakzX5veB0A4sQ+AnBWw9CWuWjYySSModfJbf7D3htf1Pjq19M1q3sAz + MXStZX0AAEVRjczXpvcBEEvsAyBPxSx9ifObI1OWgvImv5M384xOSJRFVW/guW7PReETIAAA51Uu + 87XpfQAEEvsAyE1hS1/Ldauv7iQZlDT53f5u/+JX58Dk7vmgmjfwTFy1zOcqAADBqpr52vQ+AKKI + fQDko+ClL/HFwdHOw0Hpkt8zR3qXvNa/+JU5cC63vNUfnuSykwzw8GkQAKC2Kp/52vQ+AEKIfQDk + oPilr2X5pvnPnQx5nXp2/KJnxi95ZnzeNF383HhzWj8oFY/u7QvPSRTWktf6nzrYm/9pmY/Fq68O + n14AAOqpPpmvTe8DIH9iHwBZK0vpS/SPjHXREZ4dH/g8+Q1P01efG+/LOXnct70RHpUoprW78z4b + 8/Tnw5b1AQDkrYaZr03vAyBnYh8AmSpR6WtZ/f5QdzWhLMnv9nfczJPT3fNBI7zHZWf5pvnhEwsA + QK3UOfO16X0A5EnsAyA7pSt9ieGbRmeSFYqf/J4+0rP0db2Pf3fLW/3hPS5T/SNj4RMLAEBNyHyn + 0vsAyI3YB0BGylj6Euc3R57cPTDDuFDw5PfE/t7rX+2/9pU5kJwJTx+J73HZWf3+UPisAgBQBzLf + Wel9AORD7AMgCyUtfS2LV1+dSmUocvJ78OO+a1/up+auf6X/if294T0uU8M3eVofAEC2ZL7J6X0A + 5EDsAyB1pS59iS8OjqbYGgqb/O79sBEem4j14Me5Pi8yf0/uHji/6WMTAICsyHwd0vsAyJrYB0C6 + yl76WpZvmp9udChm8vvu+83w3kSUype+xMg93wifTAAAKknmmy69D4BMiX0ApKgapS/RPzKWRXoo + YPK77a3mtS/1Uzfffb8ZXuJy8MVB9/AEAEiZzNc1vQ+A7Ih9AKSlMqWvZfX7QxkFiEIlv6eP9Hzn + jfj2RJ5qUvqWb5ofPo0AAFSJzDdzeh8AGRH7AEhFxUpfYuSebzx7Msxl5ZnxgafH5z49PjxNX312 + vC/dLdl4pGfpG/3feolaWPZuM9MTuziGb7KsDwAgHTJfivQ+ALIg9gEwc9Urfed9fifPHHpEQZLf + xiM9N7/ef+2LVFzyLifvdXiGy8efD4t9AAAzJfNlQe8DIHViHwAzVMnSlzi/OZJblShC8tP7Kq9W + pS8RPocAAJSazJcpvQ+AdIl9AMxEVUtfS85tIjz56X0VVrfSd+8rc8MnEACAkpL58qH3AZAisQ+A + rlW79CXufWVu/pEiNvnpfZVUt9KXWL5pfvgEAgBQOjJfzvQ+ANIi9gHQncqXvsTyTfOjUkVg8tP7 + KmbFe826lb5nxT4AgGmS+aLofQCkQuwDoAt1KH2J1e8PxQaLqOS34XDvTa/1f/MFSm/Fe83w7hZC + 7AMA6JDMF07vA2DmxD4Apqsmpe+83J/Zdy4hyW/D4d4V7za/9UI/5ZW8g+Fnb6DwCQQAoOC6y3zJ + Pwb/rO9vtad06X0AzJDYB8C01Kf0fXFwNLxWnCok+el95fXATxrhJ22sZAiHTyNQTN/YsgOAutu6 + c2Tb7tEX905X8lXxG19RU74j12zbE76RABTWuS4f4RsGQAFds3XnlP/6u+b5XeHbmYrb394QXivO + lH/ye+AnjfBuxbRc92L/Qztm+ujGCkiGcPg0AgV08cott5z47wAAAAAAlffoxKpnjvYU1PjAxvG5 + G8eHp+foV5852ujixz20o++6F/u/tY0S+PYr/Y/v640/RQsgGcLh0wgAAAAAABBi2Ylfbjw6GF4r + ppBj8nt8X+9Nr8WXLCZ3yxvNDYeVvj9KhnAykMMnEwAAAAAAIH8PTrwQnio6lVfyW3+o97a3mt/c + 1k8x3fl+M/5sLJiHJp4On0wAAAAAAID8bRy/PLxTTE9eye++DxvhVYvTLH6hf/WOvviTsHg2Hh0M + n0wAAAAAAICc/eDY2+GRoku5JL/H9vbd8FLzm8/3UwQ3vtL/5Cdu3XlOyXAOn1IAAAAAAIA8PTU+ + Fl4oZiT75Lf+UO/yd/S+ePf8sPHM0R4msXH88vApBQAAAAAAyM3KY/vC80Q6sk9+q3f0LX5B8otx + w0vNx/a6dWdHLO4DAAAAAID6eHx8RXibSFPGyW/9od7b3mz+7dZ+8nTne43kyMefXSVhcR8AAAAA + ANTEncd/Hh4mMpFx8nvw475vPd/82y1k7saX+9fusqBv2izuAwAAAACAOnh0YlV4lchQlslv/aHe + O99thLewCvvW883veUJft54aHwufXgAAAAAAgEwtO/HLp4/21MBFG47O3XB0eJq++vTRxpTf/JG9 + vTe/Gt/FqufW15tPHOiLPnPKbeWxfeGTDAAAAAAAkJ2HJp4O7xE5yjD53b+9seSF+EBWDd9+6eR9 + O6PPlip4YvzG8EkGAAAAAADIzoajg+E9IndZJb+nDvbe9X7jW1ubizbTpeteaN6/vfF0Om80J1nc + BwAAAAAAVXX/sbfDS0Qcya9YkiOWHLfos6KCnhi/MXyqAQAAAAAAsrBh/PLwEhEtw+R393ufJ79N + TCE5SsmxSo5Y9MlQWRb3AQAAAABA9dx3bHt4gygMyS/GddtO3rRT5sva4+MrwiccAAAAAAAgXU+M + 3xjeIAomw+S36sO+67Y1xzbxR99+sZkck+h3vEZWHP9Z+JwDAAAAAACkZeWxfeH1oaiySn6JB3/S + d8urzdHnau2ONxoP7ZT58vbIxKrwaQcAAAAAAEjLIxOrwutDsWWY/J440Hf3e43Fz8d3tzwl+3vv + j9yxM5LFfQAAAAAAUA0rjv9s49FeOnDR+qNz1x8dnqavbjza6OT7P/CTvtvfaH5zc3Ps2cpK9m7F + W42H9/RFv5X0PjxucR8AAAAAAFTB2olHwrtDqWSb/DZ+Xv1ue73xt5uao89WRLIvyR4l+xX93vEn + LO4DAAAAAICyW3bil+uPDoZHhxLKPPklHviob8VbjcVbGqPPlNIN26zjKzSL+wAAAAAAoOxWTzwd + XhzKLI/kl3h8f989P2zc/Epz0abmyDOFdu2Wxm2vN+77oJFsc/S7wxTWHx1cduKX4bMQAAAAAADQ + tfVHLw8vDuWXU/JreXhP330fnAxqS7bFp72WG19sLn9L4Cul1RNPh89CAAAAAABAd+4/9nZ4a6iQ + XJNf2+odJxf9LX+zceOLJ1fV5bN2L/lZd75zsjk+vFvdKzeL+wAAAAAAoLws68tATPI71cO7+1oF + 8M53+m57rfHtF5uJazc3Rp6ehiXPN1tfuOzNk98n+W7J95T2KsniPgAAAAAAKKOVx/aFV4bqik9+ + U1p38OSqwJbkv6OPGGEs7gMAAAAAgDJ6YvzG8MpQdSVIfrDR4j4AAAAAACibFcd/tvFoD7kYWH/0 + kuknv8GNR/uit5y6WH/0svBJCQAAAAAA6NzD46s2HOkhP0cHnjp6yVNHh6dl/dHBDUf64jeeGlg1 + 8Vb4vAQAAAAAAHRixfGfhZeFmpL8KKqnLO4DAAAAAICSWD2xMbws1JrkRyFZ3AcAAAAAAMW37MQv + 1x8ZDM8KSH4UjcV9AAAAAABQfA9MvBDeFPh3kh9FYnEfAAAAAAAU3FNHLwsPCpxO8qMYnjg6Gj5H + AQAAAAAA57Jq4q3wmsA5SX4UwD3H9oXPVAAAAAAAwFk9Pn5jeEpgCpIfoZJZInymAgAAAAAAznTP + sX3hHYFOSX7EsbgPAAAAAAAK6NHxFeERgemR/IhgcR8AAAAAABTNiuM/W3+kh3IaWHfkknVHhqfl + qaNfXX+kEb3llJXFfQAAAAAAUChrx1eF5wNmRvIjP4+OrwiftQAAAAAAgJZlJ365/shgeD4gDZIf + OVlx/GfhcxcAAAAAAJB4cGJjeDggVZIfmVs7vip87gIAAAAAABKW9VWU5EemBsPnLgAAAAAAYNXE + W9HJgExJfmTlnmP7wmcwAAAAAACouXVHLwtPBmRP8iN9D05sDJ/BAAAAAACgzu479mF4LyBHkh9p + euzojeGTGAAAAAAA1NljR28M7wXkTvIjHWIfAAAAAAAEuvv4sfBYQBzJj5kS+wAA/k97967bxp0F + cPjNLLhIAGaBbACp2koPYAGLBZagYMeyTJvWlbo5AMtFVLPaQr0Ki3Mh2RHbap9kGTlrOI6jiOLl + zOUDvsJwYZPnP5zmhzkDAAAAgQ6y7k/JE+rt2/fJ9xfJDzN5n3z3U/I0+pMT70TsAwAAAACAOBfJ + engsoBgkPx5D7AMAAAAAgCjbo0l4KaBgJD9mI/YBAAAAAECU3fwqvBRQSJIfD7WX98JvZQAAAAAA + UE97eS+8FFBgkh9/bje/Cr+VAQAAAABAPYl9PIDkx32a49vwWxkAAAAAANST2MeDSX58xWH2Jvw+ + BgAAAAAAtSX2MSPJj9/YGV6H38cAAAAAAKC2OvlleCyghCQ/fnGSboXfxAAAAAAAoM52htfhvYDS + kvzq7sVwGH4TAwAAAACAOmuOb98P1uDxkm8vkr+eJz/M5CL57n3yNP7DM4dOfhl+BwMAAAAAAE6T + zfBqQOlJfjVzmL0Jv3cBAAAAAAD/uHttX3g4oCIkv3pQ+gAAAAAAoDh+2eSZNMLzAdUh+VWa0gcA + AAAAAEXzLuuFFwSqRvKroqN0O/x+BQAAAAAAfKE5vj1PNsI7AhUk+VXIabI5vVeE368AAAAAAIDf + 2xleh6cEKkvyKz+lDwAAAAAACs4yT5ZL8istpQ8AAAAAAErhMHsTnhUKJGmcpFtH6fa7rDc1/fNU + /Kcqu1Ilv/Nk4+MF0M77O8Pr3fxq+uf9rHuabMZPclWUPgAAAAAAKBG97zTZ7OSX26PJH41oZ3i9 + n3XfJ43wj1piBU9+SWN6xC+Gw3t+Kc3xbTvvV776KX0AAAAAAFA6B+mbi8FaDXXTrZfD64cPqp33 + D9Pt8I9dZt+ez578zpPvLgZPl/WRksa7rDdT3ppeM1X9yZwofQAAAAAAUE4HNet9s2a+z22PJu+y + 3lmyEf4tSqsoyW962T+6bU0vg/2se5E0ooe5MEofAAAAAACUWk1631my0c77C5nYbn7lQb85RCa/ + brp1/9LOB2qOb99mlxUov0ofAAAAAABUQDvvh0eH5Vlg5vucB/3ms+rkNz2p3fxqGb+dbroVPcxH + UvoAAAAAAKAyKtn7lpT5vrCbXx2kNX374dxWkvxmfz3frMr4Oj+lDwAAAAAAKqZSvS9pvM0uVzm9 + yux1jLDE5HeQvtkeTVZzDZTodX5KHwAAAAAAVFIVet/yH+O6Xxkf8iqGBSe/bro1PYvVXwDFz75K + HwAAAAAAVNhd73tSStGZ73P/Lz7r8WMpmW/Ok+9nTX53D9M9/fSPTMe+gvWtD/kpddNn0fP8naTR + VPoAAAAAAKDSytf7ipT5vnD3oF/7rkY94cEemfzOk78U7Ur49QKIH+mdpPFimIfPBAAAAAAAWLZ2 + 3j8fPCmFg7S9speyPVpzfNvJeueDRvi4SuWbs8H3Z8kPD7SfdbdH/wk/66+aXqJ7aTf6AlD6AAAA + AACgRorf+0qR+T7XHN/eFZ8nzOLPk99R8vcfhx/Cz/chF8D0Z3WWrEeMUekDAAAAAIDaKWzvK13m + +9yr/OrcI34z+3ryO03+9jr/d/iZPuIaOE6erXB6Sh8AAAAAANRU0XrfcfKsAtli+hX0vkf5TfJ7 + m/3rn+P/hp/mPJfBQdpe/tCUPgAAAAAAqLWC9L7j5NnL4XX4NBZF75vDN4fpdmFfzzer7dFkme9z + VPoAAAAAAIDg3lexzPfJ9EtFV7NS6mS98LNbuOW8zk/pAwAAAAAAfhXS+7rJZiUz3yd7aTe8nZXL + 9DoMP7WlWtTr/M6SdaUPAAAAAAD43Cp731myXvms84+757kW/TBXldXhkvhoztf5HaWt6aUV/i0A + AAAAAICiWcGb5mqS+T4pyCsRi28v7YYf1oo94nV+Vd15CwAAAAAALMryel/dMt8ny+6nFdBNNsOP + KcrH1/kdpa37fzsHaVvmAwAAAAAAHuLFMD8bNM5u1hZm0OhkvfDvFWUv7S5ymFUkY300ncPrvD/9 + sXzyKr9qjSbhHwwAAAAAACiXhfW+u8xX8/eL/TLM6JpWZEfJVvgZAQAAAAAAVExrNDlONmW+hZhr + klXnsT4AAAAAAIAl6WS9RzziJ/N94XXeD29qxXQ6WA8/HQAAAAAAgAprjm87We90sP7n7WbQ2Eu7 + XjH21RmGZ7Viml4w4acDAAAAAABQBy+H152sd5Rsfb6U8nSwPv2b6d+/yq/CP2GR7aft8LJWQC+G + efjRAAAAAAAAwP1e5VfhZa1o7PAEAAAAAACgLB60CrVO7PAEAAAAAACgLDpZL7yvFYodngAAAAAA + AJRFazQJ72vFcZxshp8IAAAAAAAAPNxRsnV6s8bUm+wy/DgAAAAAAADg4V7n/fDKVhCt0ST8OAAA + AAAAAGAmp4NGeGgLZ4cnAAAAAAAAZbSXtsNbWzg7PAEAAAAAACij58M8vLWFs8MTAAAAAACAkjoZ + rIfntkB2eAIAAAAAAFBeb7LL8OIWyA5PAAAAAAAAyqs5vg0vboHs8AQAAAAAAKDU9pNWeHQLMf3i + 4cMHAAAAAACAebzKr8K7W4jXeT98+AAAAAAAADCn7mD95Gatbprj2/DJAwAAAAAAwJzepd3w9LZi + dngCAAAAAABQDa3RJLy+rdhu1g8fOwAAAAAAACzE0WAzPMCtkh2eAAAAAAAAVMZu1g8PcCtjhycA + AAAAAABV0hzfntw0wjPcatjhCQAAAAAAQMXspe3wDLcSDTs8AQAAAAAAqJgf8+voDLcKe2k7fNQA + AAAAAACwcN3BeniMW7ad/Cp8zgAAAAAAALBwr7PL8Bi3ZI3wIQMAAAAAAMAytEaT7oe1CnuX2OEJ + AAAAAABAZe0lrfAktzx2eAIAAAAAAFBhu1k/PMktix2eAAAAAAAAVF33phEf5pbADk8AAAAAAAAq + r5N2w8PcMtjhCQAAAAAAQOU9H+bhYW7hjm82wgcLAAAAAAAAK3A42AzPc4vVSbvhUwUAAAAAAIAV + 2M364XlusZ4P8/CpAgAAAAAAwAo0x7fheW6B7PAEAAAAAACgVjpJ+/jDWjW8TezwBAAAAAAAoEZ2 + 8qvwSLcodngCAAAAAABQN0c3G+Gdbn5HdngCAAAAAABQP+20F57q5meHJwAAAAAAADXUGk3CU938 + 7PAEAAAAAACgnvYHz8Jr3TwOBpvhMwQAAAAAAIAQu1k/PNjNo539HD5DAAAAAAAAiHJ80whvdo/W + Gk3CBwgAAAAAAABROkk7vNk9jh2eAAAAAAAA1FxrNAnPdo+zm/XDpwcAAAAAAACxOkn76MNauRze + bITPDQAAAAAAAMK1RpOjD43wfjeTF/l1+NwAAAAAAACgCHbTn8P73cN1knb4xAAAAAAAAKA4yrLM + c/9mszm+DR8XAAAAAAAAFErxe5/SBwAAAAAAAH+kyL1vb/BM6QMAAAAAAIB77GT9ow+N8LT3hXba + C58MAAAAAAAAFF9zfFucR/z2Bs+eD/PwmQAAAAAAAECJtEaTdtrbv9kMaXyHNxtvk67MBwAAAAAA + APNojSYvs6t22luN6f+l8QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA + AAAAAAAAAAAAAABQRv8DDoB7iAplbmRzdHJlYW0KZW5kb2JqCjggMCBvYmoKPDwKL1R5cGUvRXh0 + R1N0YXRlCi9DQSAxCj4+CmVuZG9iago5IDAgb2JqCjw8Ci9UeXBlL0ZvbnREZXNjcmlwdG9yCi9B + c2NlbnQgOTIyCi9DYXBIZWlnaHQgNzE2Ci9EZXNjZW50IDIxMAovRmxhZ3MgMzIKL0ZvbnRCQm94 + Wy01ODAgLTI1NyAxNDczIDEwMDNdCi9JdGFsaWNBbmdsZSAwCi9TdGVtViAwCi9YSGVpZ2h0IDUx + OAovRm9udE5hbWUvSElCTEdJK01pY3Jvc29mdCMyMFNhbnMjMjBTZXJpZgovRm9udEZpbGUyIDkz + IDAgUgo+PgplbmRvYmoKMTAgMCBvYmoKPDwKL1R5cGUvRm9udAovU3VidHlwZS9UcnVlVHlwZQov + QmFzZUZvbnQvSElCTEdJK01pY3Jvc29mdCMyMFNhbnMjMjBTZXJpZgovRW5jb2RpbmcvV2luQW5z + aUVuY29kaW5nCi9Gb250RGVzY3JpcHRvciA5IDAgUgovRmlyc3RDaGFyIDAKL0xhc3RDaGFyIDI1 + NQovV2lkdGhzWzI5MiAyOTIgMjkyIDI5MiAyOTIgMjkyIDI5MiAyOTIgMjkyIDI5MiAyOTIgMjky + IDI5MiAyOTIgMjkyIDI5MiAyOTIgMjkyIDI5MiAyOTIgMjkyIDI5MiAyOTIgMjkyIDI5MiAyOTIg + MjkyIDI5MiAyOTIgMjkyIDI5MiAyOTIgMjY1IDI3NyAzNTQgNTU2IDU1NiA4ODkgNjY2IDE5MCAz + MzMgMzMzIDM4OSA1ODMgMjc3IDMzMyAyNzcgMjc3IDU1NiA1NTYgNTU2IDU1NiA1NTYgNTU2IDU1 + NiA1NTYgNTU2IDU1NiAyNzcgMjc3IDU4MyA1ODMgNTgzIDU1NiAxMDE1IDY2NiA2NjYgNzIyIDcy + MiA2NjYgNjEwIDc3NyA3MjIgMjc3IDUwMCA2NjYgNTU2IDgzMyA3MjIgNzc3IDY2NiA3NzcgNzIy + IDY2NiA2MTAgNzIyIDY2NiA5NDMgNjY2IDY2NiA2MTAgMjc3IDI3NyAyNzcgNDY5IDU1MSAzMzMg + NTU2IDU1NiA1MDAgNTU2IDU1NiAyNzcgNTU2IDU1NiAyMjggMjI4IDUwMCAyMjggODMzIDU1NiA1 + NTYgNTU2IDU1NiAzMzMgNTAwIDI3NyA1NTYgNTAwIDcyMiA1MDAgNTAwIDUwMCAzMzMgMjU5IDMz + MyA1ODMgMjkyIDU1NiAyOTIgMjc3IDU1NiAzOTEgNTY1IDU1NiA1NTYgMzMzIDEwMDAgNjY2IDMz + MyAxMDAwIDI5MiA2MTAgMjkyIDI5MiAyMjIgMjIyIDMzMyAzMzMgMzUwIDI5MiA1ODUgMzMzIDY4 + MyA1MDAgMzMzIDk0MyAyOTIgNTAwIDY2NiAyNjUgMjc3IDU1NiA1NTYgNTU2IDU1NiAyNTkgNTU2 + IDMzMyA3MzYgMzcwIDU1NiA1ODMgMzMzIDczNiA1MDAgMzk5IDU4MyAzMzMgMzMzIDMzMyA1NTYg + NTM3IDI3NyAzMzMgMzMzIDM2NSA1NTYgODMzIDgzMyA4MzMgNTU2IDY2NiA2NjYgNjY2IDY2NiA2 + NjYgNjY2IDEwMDAgNzIyIDY2NiA2NjYgNjY2IDY2NiAyNzcgMjc3IDI3NyAyNzcgNzIyIDcyMiA3 + NzcgNzc3IDc3NyA3NzcgNzc3IDU4MyA3NzcgNzIyIDcyMiA3MjIgNzIyIDY2NiA2NjYgNjEwIDU1 + NiA1NTYgNTU2IDU1NiA1NTYgNTU2IDg4OSA1MDAgNTU2IDU1NiA1NTYgNTU2IDIyOCAyMjggMjI4 + IDIyOCA1NTYgNTU2IDU1NiA1NTYgNTU2IDU1NiA1NTYgNTgzIDU1NiA1NTYgNTU2IDU1NiA1NTYg + NTAwIDU1NiA1MDBdCj4+CmVuZG9iagoxMSAwIG9iago8PAovVHlwZS9Gb250RGVzY3JpcHRvcgov + QXNjZW50IDkwNQovQ2FwSGVpZ2h0IDcxNgovRGVzY2VudCAyMTIKL0ZsYWdzIDMyCi9Gb250QkJv + eFstNjY1IC0zMjUgMjAwMCAxMDQwXQovSXRhbGljQW5nbGUgMAovU3RlbVYgMAovWEhlaWdodCA1 + MTkKL0ZvbnROYW1lL0hBRlBIRCtBcmlhbAovRm9udEZpbGUyIDk0IDAgUgo+PgplbmRvYmoKMTIg + MCBvYmoKPDwKL1R5cGUvRm9udAovU3VidHlwZS9UcnVlVHlwZQovQmFzZUZvbnQvSEFGUEhEK0Fy + aWFsCi9FbmNvZGluZy9XaW5BbnNpRW5jb2RpbmcKL0ZvbnREZXNjcmlwdG9yIDExIDAgUgovRmly + c3RDaGFyIDAKL0xhc3RDaGFyIDI1NQovV2lkdGhzWzc1MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDc1 + MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAgNzUw + IDc1MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAgMjc3IDI3NyAzNTQg + NTU2IDU1NiA4ODkgNjY2IDE5MCAzMzMgMzMzIDM4OSA1ODMgMjc3IDMzMyAyNzcgMjc3IDU1NiA1 + NTYgNTU2IDU1NiA1NTYgNTU2IDU1NiA1NTYgNTU2IDU1NiAyNzcgMjc3IDU4MyA1ODMgNTgzIDU1 + NiAxMDE1IDY2NiA2NjYgNzIyIDcyMiA2NjYgNjEwIDc3NyA3MjIgMjc3IDUwMCA2NjYgNTU2IDgz + MyA3MjIgNzc3IDY2NiA3NzcgNzIyIDY2NiA2MTAgNzIyIDY2NiA5NDMgNjY2IDY2NiA2MTAgMjc3 + IDI3NyAyNzcgNDY5IDU1NiAzMzMgNTU2IDU1NiA1MDAgNTU2IDU1NiAyNzcgNTU2IDU1NiAyMjIg + MjIyIDUwMCAyMjIgODMzIDU1NiA1NTYgNTU2IDU1NiAzMzMgNTAwIDI3NyA1NTYgNTAwIDcyMiA1 + MDAgNTAwIDUwMCAzMzMgMjU5IDMzMyA1ODMgNzUwIDU1NiA3NTAgMjIyIDU1NiAzMzMgMTAwMCA1 + NTYgNTU2IDMzMyAxMDAwIDY2NiAzMzMgMTAwMCA3NTAgNjEwIDc1MCA3NTAgMjIyIDIyMiAzMzMg + MzMzIDM1MCA1NTYgMTAwMCAzMzMgMTAwMCA1MDAgMzMzIDk0MyA3NTAgNTAwIDY2NiAyNzcgMzMz + IDU1NiA1NTYgNTU2IDU1NiAyNTkgNTU2IDMzMyA3MzYgMzcwIDU1NiA1ODMgMzMzIDczNiA1NTIg + Mzk5IDU0OCAzMzMgMzMzIDMzMyA1NzYgNTM3IDMzMyAzMzMgMzMzIDM2NSA1NTYgODMzIDgzMyA4 + MzMgNjEwIDY2NiA2NjYgNjY2IDY2NiA2NjYgNjY2IDEwMDAgNzIyIDY2NiA2NjYgNjY2IDY2NiAy + NzcgMjc3IDI3NyAyNzcgNzIyIDcyMiA3NzcgNzc3IDc3NyA3NzcgNzc3IDU4MyA3NzcgNzIyIDcy + MiA3MjIgNzIyIDY2NiA2NjYgNjEwIDU1NiA1NTYgNTU2IDU1NiA1NTYgNTU2IDg4OSA1MDAgNTU2 + IDU1NiA1NTYgNTU2IDI3NyAyNzcgMjc3IDI3NyA1NTYgNTU2IDU1NiA1NTYgNTU2IDU1NiA1NTYg + NTQ4IDYxMCA1NTYgNTU2IDU1NiA1NTYgNTAwIDU1NiA1MDBdCj4+CmVuZG9iagoxMyAwIG9iago8 + PAovVHlwZS9QYWdlCi9NZWRpYUJveFswIDAgNTk1LjI3NiA4NDEuODldCi9QYXJlbnQgMyAwIFIK + L0NvbnRlbnRzIDE0IDAgUgovUmVzb3VyY2VzCjw8Ci9Qcm9jU2V0IFsvUERGL1RleHQvSW1hZ2VC + L0ltYWdlQy9JbWFnZUldCi9FeHRHU3RhdGUKPDwKL0dTMCA2IDAgUgo+PgovRm9udAo8PAovRjAg + MTggMCBSCi9GMSAxMiAwIFIKPj4KPj4KL0Fubm90c1sxOSAwIFIgMjAgMCBSIDIxIDAgUiAyMiAw + IFIgMjMgMCBSIDI0IDAgUiAyNSAwIFIgMjYgMCBSIDI3IDAgUiAyOCAwIFIgMjkgMCBSIDMwIDAg + UiAzMSAwIFIgMzIgMCBSIDMzIDAgUiAzNCAwIFIgMzUgMCBSIDM2IDAgUiAzNyAwIFIgMzggMCBS + IDM5IDAgUiA0MCAwIFIgNDEgMCBSIDQyIDAgUl0KL0dyb3VwCjw8Ci9DUy9EZXZpY2VSR0IKL1Mv + VHJhbnNwYXJlbmN5Cj4+Cj4+CmVuZG9iagoxNCAwIG9iago8PAovTGVuZ3RoIDk5MwovRmlsdGVy + L0ZsYXRlRGVjb2RlCj4+CnN0cmVhbQp4nL1WS2/bRhC+61foVDhAtN734yhLSWogSVVJ6MmXLb2S + t6ZJhaRk+N93SO5SdEyzboIWAnSY5by++ebxbfJtcrWd4Gn9K/aTy08bPN2Xk8uPeMrpdLubUDxV + kiJuOJtub6cXizyrXFaV76bbv2o9xBWBf81Iow96RNZ6eDqTDBmsaaO2OT482OKp0VIKMakoeKxf + 8l0jJAYJLk0QVneukVKNOBcsSL/4pMjLfFe1ZmT/jUnRSBlBhGMZpAtXVH7nE1v5PGvejUJKGxLe + E8imyNPmRWgkJY8vtixdWT50qYJRRLXQ4Zk0wpmgBkkNSM0YR8xo3jwuXWV92uoJiQzprP6nySYv + kxWIMKr/fbJQOmZELBFthJcfSagtpE1C2lSe0/7t4IrGt219aIXI2cfGJcfCVy0FOMAlKH7uYCYI + GzA7f7SFyyC+1ihDwrCY0rawPvPZPhjFCBss3mL0i01rs80nkgNPZcR2VeSVSzoIa+A15+Fx1sKK + lGJRNM8q34oZRbq2j194YDVNKFH/c2SHQ9png6ZIER2hW/TYQJVBGpOoyMbiW9kquWvxFogJc843 + s3tXcyj2mYbX16Nr7MTSSQmh4fj1Ly0JgbykGxNrX963WAokBI9Qrm12H41QDqxlVL0liz+OaQZs + /dOnkZIGKI1J7KVNYrMzsShFMMiiYT5m+KurHvOiDRW6iFAxxH+YqBSsPi9FGWuOaYfSzcXXzeLm + XWARR9SwGKIYC2NxZ7N9IBHMaPO9r1BACNBQ8haDTfitQSH6U2cDI+pMWIWE7qq+dCeX5oeaE5dL + d0jzp44ezGBkhIqQytEBkCT5MejVwAmlhznHBUGcyoid+sd8hsvx4XQ22Gf453y/B0q8b1VEn99r + d/LuMfJF6X6QNrsdGNbztJ7WkbkwuTTXsdH1WODX2S4vHnpdzftjYCStVzroOwwZhMlxjMT8IITX + WeJvo8magOcI16485FkZBiPMJCxMVCNxrWIOWxqW7TN/V8fSd3tAmv4RUbPaZ8cYjBL9JbFKbQsV + g4kpuwF4c3G1WIXW4uPFWvrSlpUrXnb12iX5ycXDhvZbt3MLgw1hqWKbkW7804Ekl7ayAZo+oCNY + D03LVeFPNnkKrQZ7uC5ecM/GMH7FvQ+ZyP6Gg+WblT50CocNx8VPOZlX3XEkewCX0QNcUpp0KPIf + 8LB29e0KnfO+O0R1dx5d2eS+3VNw6vXSPB7aHn0G+qs8OeRlOH+o4UgrI38mYBh9kfBwSGIi5HDX + coLhnuqOUzHmqs+N7ougKMcUPy1X60EtNab16/VqPh9Ua8fch+3kd/j9DcdfDPYKZW5kc3RyZWFt + CmVuZG9iagoxNSAwIG9iago8PAovRmlyc3QgMTYgMCBSCi9MYXN0IDE2IDAgUgovQ291bnQgMQo+ + PgplbmRvYmoKMTYgMCBvYmoKPDwKL1RpdGxlPEZFRkYwMDQzMDA2RjAwNkUwMDc0MDA2NTAwNkUw + MDc0MDA3Mz4KL1BhcmVudCAxNSAwIFIKL0Rlc3RbMTMgMCBSIC9YWVogbnVsbCBudWxsIG51bGxd + Cj4+CmVuZG9iagoxNyAwIG9iago8PAovVHlwZS9Gb250RGVzY3JpcHRvcgovQXNjZW50IDkwNQov + Q2FwSGVpZ2h0IDcxNgovRGVzY2VudCAyMTIKL0ZsYWdzIDMyCi9Gb250QkJveFstNjI4IC0zNzYg + MjAwMCAxMDU2XQovSXRhbGljQW5nbGUgMAovU3RlbVYgMAovWEhlaWdodCA1MTkKL0ZvbnROYW1l + L05YV1dKSitBcmlhbCxCb2xkCi9Gb250RmlsZTIgOTUgMCBSCj4+CmVuZG9iagoxOCAwIG9iago8 + PAovVHlwZS9Gb250Ci9TdWJ0eXBlL1RydWVUeXBlCi9CYXNlRm9udC9OWFdXSkorQXJpYWwsQm9s + ZAovRW5jb2RpbmcvV2luQW5zaUVuY29kaW5nCi9Gb250RGVzY3JpcHRvciAxNyAwIFIKL0ZpcnN0 + Q2hhciAwCi9MYXN0Q2hhciAyNTUKL1dpZHRoc1s3NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAg + NzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3 + NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDc1MCA3NTAgNzUwIDI3NyAzMzMgNDc0IDU1 + NiA1NTYgODg5IDcyMiAyMzcgMzMzIDMzMyAzODkgNTgzIDI3NyAzMzMgMjc3IDI3NyA1NTYgNTU2 + IDU1NiA1NTYgNTU2IDU1NiA1NTYgNTU2IDU1NiA1NTYgMzMzIDMzMyA1ODMgNTgzIDU4MyA2MTAg + OTc1IDcyMiA3MjIgNzIyIDcyMiA2NjYgNjEwIDc3NyA3MjIgMjc3IDU1NiA3MjIgNjEwIDgzMyA3 + MjIgNzc3IDY2NiA3NzcgNzIyIDY2NiA2MTAgNzIyIDY2NiA5NDMgNjY2IDY2NiA2MTAgMzMzIDI3 + NyAzMzMgNTgzIDU1NiAzMzMgNTU2IDYxMCA1NTYgNjEwIDU1NiAzMzMgNjEwIDYxMCAyNzcgMjc3 + IDU1NiAyNzcgODg5IDYxMCA2MTAgNjEwIDYxMCAzODkgNTU2IDMzMyA2MTAgNTU2IDc3NyA1NTYg + NTU2IDUwMCAzODkgMjc5IDM4OSA1ODMgNzUwIDU1NiA3NTAgMjc3IDU1NiA1MDAgMTAwMCA1NTYg + NTU2IDMzMyAxMDAwIDY2NiAzMzMgMTAwMCA3NTAgNjEwIDc1MCA3NTAgMjc3IDI3NyA1MDAgNTAw + IDM1MCA1NTYgMTAwMCAzMzMgMTAwMCA1NTYgMzMzIDk0MyA3NTAgNTAwIDY2NiAyNzcgMzMzIDU1 + NiA1NTYgNTU2IDU1NiAyNzkgNTU2IDMzMyA3MzYgMzcwIDU1NiA1ODMgMzMzIDczNiA1NTIgMzk5 + IDU0OCAzMzMgMzMzIDMzMyA1NzYgNTU2IDMzMyAzMzMgMzMzIDM2NSA1NTYgODMzIDgzMyA4MzMg + NjEwIDcyMiA3MjIgNzIyIDcyMiA3MjIgNzIyIDEwMDAgNzIyIDY2NiA2NjYgNjY2IDY2NiAyNzcg + Mjc3IDI3NyAyNzcgNzIyIDcyMiA3NzcgNzc3IDc3NyA3NzcgNzc3IDU4MyA3NzcgNzIyIDcyMiA3 + MjIgNzIyIDY2NiA2NjYgNjEwIDU1NiA1NTYgNTU2IDU1NiA1NTYgNTU2IDg4OSA1NTYgNTU2IDU1 + NiA1NTYgNTU2IDI3NyAyNzcgMjc3IDI3NyA2MTAgNjEwIDYxMCA2MTAgNjEwIDYxMCA2MTAgNTQ4 + IDYxMCA2MTAgNjEwIDYxMCA2MTAgNTU2IDYxMCA1NTZdCj4+CmVuZG9iagoxOSAwIG9iago8PAov + VHlwZS9Bbm5vdAovTk0oNjhiOTk4ZmEtOWViZS00OWExLWEyZGQtZGU1NDkwM2E5NzM2KQovTShE + OjIwMjQwNjE4MDQzNTQyKzAwJzAwJykKL1N1YnR5cGUvTGluawovUmVjdFsyMCA2OTUuMTk1IDU1 + OC41ODMgNzEzLjU5NF0KL0JTIDw8L1R5cGUvQm9yZGVyL1cgMD4+Ci9Cb3JkZXIgWzAgMCAwXQov + RGVzdCBbNDMgMCBSL1hZWiBudWxsIG51bGwgMF0KPj4KZW5kb2JqCjIwIDAgb2JqCjw8Ci9UeXBl + L0Fubm90Ci9OTSg5MzliYTI4NS01M2IwLTQxNGEtYTczZi1hNDg0MmUwOTMxMWUpCi9NKEQ6MjAy + NDA2MTgwNDM1NDIrMDAnMDAnKQovU3VidHlwZS9MaW5rCi9SZWN0WzIwIDY2MC43OTcgNTU4LjU4 + MyA2NzkuMTk1XQovQlMgPDwvVHlwZS9Cb3JkZXIvVyAwPj4KL0JvcmRlciBbMCAwIDBdCi9EZXN0 + IFs1NyAwIFIvWFlaIG51bGwgbnVsbCAwXQo+PgplbmRvYmoKMjEgMCBvYmoKPDwKL1R5cGUvQW5u + b3QKL05NKDFkYmNlM2RmLWE4ZjMtNGYzNC05ZjQ2LTJjNTMzMDRmNTE2ZSkKL00oRDoyMDI0MDYx + ODA0MzU0MiswMCcwMCcpCi9TdWJ0eXBlL0xpbmsKL1JlY3RbMjggNjM0LjM5OSA1NTguNTgzIDY1 + Mi43OTddCi9CUyA8PC9UeXBlL0JvcmRlci9XIDA+PgovQm9yZGVyIFswIDAgMF0KL0Rlc3QgWzU3 + IDAgUi9YWVogbnVsbCBudWxsIDBdCj4+CmVuZG9iagoyMiAwIG9iago8PAovVHlwZS9Bbm5vdAov + Tk0oOTc2NmY3MzgtYTc0Mi00NjBiLWFlYzktYzcwNDY3ODg2YTM5KQovTShEOjIwMjQwNjE4MDQz + NTQyKzAwJzAwJykKL1N1YnR5cGUvTGluawovUmVjdFszNiA2MDggNTU4LjU4MyA2MjYuMzk5XQov + QlMgPDwvVHlwZS9Cb3JkZXIvVyAwPj4KL0JvcmRlciBbMCAwIDBdCi9EZXN0IFs1NyAwIFIvWFla + IG51bGwgbnVsbCAwXQo+PgplbmRvYmoKMjMgMCBvYmoKPDwKL1R5cGUvQW5ub3QKL05NKGFkZWM3 + YzgyLTkzMGUtNGE1Ny1iNDc0LWFiYTBlNTJmYzYwYikKL00oRDoyMDI0MDYxODA0MzU0MiswMCcw + MCcpCi9TdWJ0eXBlL0xpbmsKL1JlY3RbMzYgNTgxLjYwMiA1NTguNTgzIDYwMF0KL0JTIDw8L1R5 + cGUvQm9yZGVyL1cgMD4+Ci9Cb3JkZXIgWzAgMCAwXQovRGVzdCBbNTcgMCBSL1hZWiBudWxsIG51 + bGwgMF0KPj4KZW5kb2JqCjI0IDAgb2JqCjw8Ci9UeXBlL0Fubm90Ci9OTSgzM2ExMzY1OC0xNGRk + LTRlYWMtYTMzNi00YzM3NjE0ZmNhYjgpCi9NKEQ6MjAyNDA2MTgwNDM1NDIrMDAnMDAnKQovU3Vi + dHlwZS9MaW5rCi9SZWN0WzM2IDU1NS4yMDMgNTU4LjU4MyA1NzMuNjAyXQovQlMgPDwvVHlwZS9C + b3JkZXIvVyAwPj4KL0JvcmRlciBbMCAwIDBdCi9EZXN0IFs1OSAwIFIvWFlaIG51bGwgbnVsbCAw + XQo+PgplbmRvYmoKMjUgMCBvYmoKPDwKL1R5cGUvQW5ub3QKL05NKGRkYmFhMjUxLTQ5MTgtNGRj + My1hMTM0LWFjN2YwNGVkZDU0MSkKL00oRDoyMDI0MDYxODA0MzU0MiswMCcwMCcpCi9TdWJ0eXBl + L0xpbmsKL1JlY3RbMzYgNTI4LjgwNSA1NTguNTgzIDU0Ny4yMDNdCi9CUyA8PC9UeXBlL0JvcmRl + ci9XIDA+PgovQm9yZGVyIFswIDAgMF0KL0Rlc3QgWzU5IDAgUi9YWVogbnVsbCBudWxsIDBdCj4+ + CmVuZG9iagoyNiAwIG9iago8PAovVHlwZS9Bbm5vdAovTk0oNDNkZDYwZGMtOWFhOS00ZDM1LWIz + OTktY2IwYjRkOGU2MzcyKQovTShEOjIwMjQwNjE4MDQzNTQyKzAwJzAwJykKL1N1YnR5cGUvTGlu + awovUmVjdFszNiA1MDIuNDA2IDU1OC41ODMgNTIwLjgwNV0KL0JTIDw8L1R5cGUvQm9yZGVyL1cg + MD4+Ci9Cb3JkZXIgWzAgMCAwXQovRGVzdCBbNjEgMCBSL1hZWiBudWxsIG51bGwgMF0KPj4KZW5k + b2JqCjI3IDAgb2JqCjw8Ci9UeXBlL0Fubm90Ci9OTShlZWIzMjNjOS1kYTgxLTQyOTktYWE4MC1k + NjBkMzE3ZDcyNzEpCi9NKEQ6MjAyNDA2MTgwNDM1NDIrMDAnMDAnKQovU3VidHlwZS9MaW5rCi9S + ZWN0WzM2IDQ3Ni4wMDggNTU4LjU4MyA0OTQuNDA2XQovQlMgPDwvVHlwZS9Cb3JkZXIvVyAwPj4K + L0JvcmRlciBbMCAwIDBdCi9EZXN0IFs2MyAwIFIvWFlaIG51bGwgbnVsbCAwXQo+PgplbmRvYmoK + MjggMCBvYmoKPDwKL1R5cGUvQW5ub3QKL05NKGE1MTRlYzFmLWJiZTEtNGY3ZC05NWNlLTA5ZGQz + MjM2NmQ2ZSkKL00oRDoyMDI0MDYxODA0MzU0MiswMCcwMCcpCi9TdWJ0eXBlL0xpbmsKL1JlY3Rb + MzYgNDQ5LjYxIDU1OC41ODMgNDY4LjAwOF0KL0JTIDw8L1R5cGUvQm9yZGVyL1cgMD4+Ci9Cb3Jk + ZXIgWzAgMCAwXQovRGVzdCBbNjMgMCBSL1hZWiBudWxsIG51bGwgMF0KPj4KZW5kb2JqCjI5IDAg + b2JqCjw8Ci9UeXBlL0Fubm90Ci9OTSgwNDJjMmY2My04ZjAxLTRlMzMtYjFjYi03OGM0Mzc1MDJh + MjMpCi9NKEQ6MjAyNDA2MTgwNDM1NDIrMDAnMDAnKQovU3VidHlwZS9MaW5rCi9SZWN0WzM2IDQy + My4yMTEgNTU4LjU4MyA0NDEuNjFdCi9CUyA8PC9UeXBlL0JvcmRlci9XIDA+PgovQm9yZGVyIFsw + IDAgMF0KL0Rlc3QgWzY1IDAgUi9YWVogbnVsbCBudWxsIDBdCj4+CmVuZG9iagozMCAwIG9iago8 + PAovVHlwZS9Bbm5vdAovTk0oOTI0OTkyMzMtZGNhOS00YTQ1LWFjMDMtYTFlOTcwZjU3NDg0KQov + TShEOjIwMjQwNjE4MDQzNTQyKzAwJzAwJykKL1N1YnR5cGUvTGluawovUmVjdFszNiAzOTYuODEz + IDU1OC41ODMgNDE1LjIxMV0KL0JTIDw8L1R5cGUvQm9yZGVyL1cgMD4+Ci9Cb3JkZXIgWzAgMCAw + XQovRGVzdCBbNjcgMCBSL1hZWiBudWxsIG51bGwgMF0KPj4KZW5kb2JqCjMxIDAgb2JqCjw8Ci9U + eXBlL0Fubm90Ci9OTShkZjlhOGI5Yy1iYzY3LTQ1OTktOTMyOC0zYWU3ZGRlNjljYWYpCi9NKEQ6 + MjAyNDA2MTgwNDM1NDIrMDAnMDAnKQovU3VidHlwZS9MaW5rCi9SZWN0WzM2IDM3MC40MTQgNTU4 + LjU4MyAzODguODEzXQovQlMgPDwvVHlwZS9Cb3JkZXIvVyAwPj4KL0JvcmRlciBbMCAwIDBdCi9E + ZXN0IFs2OSAwIFIvWFlaIG51bGwgbnVsbCAwXQo+PgplbmRvYmoKMzIgMCBvYmoKPDwKL1R5cGUv + QW5ub3QKL05NKDhmNDQzYzk2LTZlODktNDQxMS04YTYxLTNmYTFlYTZiNWIwNikKL00oRDoyMDI0 + MDYxODA0MzU0MiswMCcwMCcpCi9TdWJ0eXBlL0xpbmsKL1JlY3RbMzYgMzQ0LjAxNiA1NTguNTgz + IDM2Mi40MTRdCi9CUyA8PC9UeXBlL0JvcmRlci9XIDA+PgovQm9yZGVyIFswIDAgMF0KL0Rlc3Qg + WzcxIDAgUi9YWVogbnVsbCBudWxsIDBdCj4+CmVuZG9iagozMyAwIG9iago8PAovVHlwZS9Bbm5v + dAovTk0oMTBmYjMyYmYtNmRlYi00ZGI3LThlYjEtY2UwZTZmYzhkODZjKQovTShEOjIwMjQwNjE4 + MDQzNTQyKzAwJzAwJykKL1N1YnR5cGUvTGluawovUmVjdFszNiAzMTcuNjE3IDU1OC41ODMgMzM2 + LjAxNl0KL0JTIDw8L1R5cGUvQm9yZGVyL1cgMD4+Ci9Cb3JkZXIgWzAgMCAwXQovRGVzdCBbNzUg + MCBSL1hZWiBudWxsIG51bGwgMF0KPj4KZW5kb2JqCjM0IDAgb2JqCjw8Ci9UeXBlL0Fubm90Ci9O + TShkNjBkMzEzYS0yNjAzLTRiNTUtOGNjYi0xYTg1ZDcyM2YwMjYpCi9NKEQ6MjAyNDA2MTgwNDM1 + NDIrMDAnMDAnKQovU3VidHlwZS9MaW5rCi9SZWN0WzM2IDI5MS4yMTkgNTU4LjU4MyAzMDkuNjE3 + XQovQlMgPDwvVHlwZS9Cb3JkZXIvVyAwPj4KL0JvcmRlciBbMCAwIDBdCi9EZXN0IFs3NyAwIFIv + WFlaIG51bGwgbnVsbCAwXQo+PgplbmRvYmoKMzUgMCBvYmoKPDwKL1R5cGUvQW5ub3QKL05NKGJm + MmVmYmUxLTVhMDUtNDE3Zi05MzMwLTVmMDhjYWE5NWM1NykKL00oRDoyMDI0MDYxODA0MzU0Misw + MCcwMCcpCi9TdWJ0eXBlL0xpbmsKL1JlY3RbMjggMjY0LjgyIDU1OC41ODMgMjgzLjIxOV0KL0JT + IDw8L1R5cGUvQm9yZGVyL1cgMD4+Ci9Cb3JkZXIgWzAgMCAwXQovRGVzdCBbNzkgMCBSL1hZWiBu + dWxsIG51bGwgMF0KPj4KZW5kb2JqCjM2IDAgb2JqCjw8Ci9UeXBlL0Fubm90Ci9OTSg4OTA5ZWVk + Mi1iZWNiLTRmYzItYjlkMi1kNjk2ZWI5NTc3YzQpCi9NKEQ6MjAyNDA2MTgwNDM1NDIrMDAnMDAn + KQovU3VidHlwZS9MaW5rCi9SZWN0WzM2IDIzOC40MjIgNTU4LjU4MyAyNTYuODJdCi9CUyA8PC9U + eXBlL0JvcmRlci9XIDA+PgovQm9yZGVyIFswIDAgMF0KL0Rlc3QgWzc5IDAgUi9YWVogbnVsbCBu + dWxsIDBdCj4+CmVuZG9iagozNyAwIG9iago8PAovVHlwZS9Bbm5vdAovTk0oY2IxYjZiYzAtYjRk + My00ODRmLWJjNzctZGZlYWI4ZjIzYzM2KQovTShEOjIwMjQwNjE4MDQzNTQyKzAwJzAwJykKL1N1 + YnR5cGUvTGluawovUmVjdFszNiAyMTIuMDI0IDU1OC41ODMgMjMwLjQyMl0KL0JTIDw8L1R5cGUv + Qm9yZGVyL1cgMD4+Ci9Cb3JkZXIgWzAgMCAwXQovRGVzdCBbODEgMCBSL1hZWiBudWxsIG51bGwg + MF0KPj4KZW5kb2JqCjM4IDAgb2JqCjw8Ci9UeXBlL0Fubm90Ci9OTShlZjhmOWZjOS0yNWY5LTRm + ZmItOTc4MC1mYjFhYzVkNjI5YWIpCi9NKEQ6MjAyNDA2MTgwNDM1NDIrMDAnMDAnKQovU3VidHlw + ZS9MaW5rCi9SZWN0WzM2IDE4NS42MjUgNTU4LjU4MyAyMDQuMDI0XQovQlMgPDwvVHlwZS9Cb3Jk + ZXIvVyAwPj4KL0JvcmRlciBbMCAwIDBdCi9EZXN0IFs4MSAwIFIvWFlaIG51bGwgbnVsbCAwXQo+ + PgplbmRvYmoKMzkgMCBvYmoKPDwKL1R5cGUvQW5ub3QKL05NKDIxNDRmMjYxLWI0ZDktNDA5Mi05 + Yjg3LWI0NjNmMjNkY2IyZCkKL00oRDoyMDI0MDYxODA0MzU0MiswMCcwMCcpCi9TdWJ0eXBlL0xp + bmsKL1JlY3RbMzYgMTU5LjIyNyA1NTguNTgzIDE3Ny42MjVdCi9CUyA8PC9UeXBlL0JvcmRlci9X + IDA+PgovQm9yZGVyIFswIDAgMF0KL0Rlc3QgWzgzIDAgUi9YWVogbnVsbCBudWxsIDBdCj4+CmVu + ZG9iago0MCAwIG9iago8PAovVHlwZS9Bbm5vdAovTk0oMGM0OTZiZTItYmM2MC00NjdmLWFiZTkt + OGVmODU4NDQ4ZjYzKQovTShEOjIwMjQwNjE4MDQzNTQyKzAwJzAwJykKL1N1YnR5cGUvTGluawov + UmVjdFszNiAxMzIuODI4IDU1OC41ODMgMTUxLjIyN10KL0JTIDw8L1R5cGUvQm9yZGVyL1cgMD4+ + Ci9Cb3JkZXIgWzAgMCAwXQovRGVzdCBbODUgMCBSL1hZWiBudWxsIG51bGwgMF0KPj4KZW5kb2Jq + CjQxIDAgb2JqCjw8Ci9UeXBlL0Fubm90Ci9OTSg2YWU0ZTM1Zi1mM2EzLTRiOGYtYTNmYy1jMzhi + MjAzOTZmZDgpCi9NKEQ6MjAyNDA2MTgwNDM1NDIrMDAnMDAnKQovU3VidHlwZS9MaW5rCi9SZWN0 + WzM2IDEwNi40MyA1NTguNTgzIDEyNC44MjhdCi9CUyA8PC9UeXBlL0JvcmRlci9XIDA+PgovQm9y + ZGVyIFswIDAgMF0KL0Rlc3QgWzg3IDAgUi9YWVogbnVsbCBudWxsIDBdCj4+CmVuZG9iago0MiAw + IG9iago8PAovVHlwZS9Bbm5vdAovTk0oMDk1YTU3NTktZTk4YS00NzliLTliZTMtZmIzNTczNTg5 + ZTE3KQovTShEOjIwMjQwNjE4MDQzNTQyKzAwJzAwJykKL1N1YnR5cGUvTGluawovUmVjdFszNiA4 + MC4wMzEgNTU4LjU4MyA5OC40M10KL0JTIDw8L1R5cGUvQm9yZGVyL1cgMD4+Ci9Cb3JkZXIgWzAg + MCAwXQovRGVzdCBbODkgMCBSL1hZWiBudWxsIG51bGwgMF0KPj4KZW5kb2JqCjQzIDAgb2JqCjw8 + Ci9UeXBlL1BhZ2UKL01lZGlhQm94WzAgMCA1OTUuMjc2IDg0MS44OV0KL1BhcmVudCAzIDAgUgov + Q29udGVudHMgNDQgMCBSCi9SZXNvdXJjZXMKPDwKL1Byb2NTZXQgWy9QREYvVGV4dC9JbWFnZUIv + SW1hZ2VDL0ltYWdlSV0KL0V4dEdTdGF0ZQo8PAovR1MwIDYgMCBSCi9HUzEgOCAwIFIKPj4KL0Zv + bnQKPDwKL0YwIDE4IDAgUgovRjEgMTIgMCBSCj4+Ci9YT2JqZWN0Cjw8Ci9JMCA0NyAwIFIKL0kx + IDUwIDAgUgovSTIgNTMgMCBSCi9JMyA1NiAwIFIKPj4KPj4KL0dyb3VwCjw8Ci9DUy9EZXZpY2VS + R0IKL1MvVHJhbnNwYXJlbmN5Cj4+Cj4+CmVuZG9iago0NCAwIG9iago8PAovTGVuZ3RoIDI2NzkK + L0ZpbHRlci9GbGF0ZURlY29kZQo+PgpzdHJlYW0KeJy1mt2O27gVgO/9FLoqskCtiD+SyMvJzy5S + 7C6yM4PeNL1QHc9Eux5pYnsS7Nv3yBLJc3xo0i1aBAkMUhE/kufjESl9XX1dvblfVcX0Z/+4ev3T + XVU8Hlavf6wKU9w/rFRtSilNYWRTKlPb4v5z8erm+fmH4v73lWjLtlUa/utU+nZ8et713bDZnip1 + W9ZN4ypvXo7jU3fsx2GubMqmqeRSeT+Ou/mGthRVXS/FD+N+LpWlMU27lP7Sb/bjYXw4nurUhCdd + nWrqubQCWNUspeJUNnVJNFOf1nVdldAhXcCvsq7U3Ku7l6enbv/n6eK2LVXTOr7xwdHVurFL4fHL + 3E9pSq1rFaVrG1zn6UQpdOXo3m73x/6h34TBsTCsxoqlfjMOx/0yPjAZMKSupjsctofD03Y4HpYe + CtdDZWyprIEewgCdfrAewqBO5fOtDsfu+HJw8yYUzDjtOkGinWygKa3Mf9hJY0orhaWdPJzPlJIt + zG/TFGutSmGtPF39cer559O17yF4y7r4DiH8N/j7++of/6yKz1Bmp2Evrbanf+vi9qcpuMUU3AJm + XYtWFQ3Mj9HSFk8r0ZT1NBy+aLe6m8wQMORGGFs0MKLS6Hkgf+z6XQCQVpdSNZLcj7Wx3FDC7Daq + NfSGv76+cXfTSpXggMB34y0sd9MKIqwGNxoLYTiFPPZT1ThgN9TPtatdCxQi++23fvt9DjZos27d + vO63X1/6feh03YrStBpTcvKJ8mshxDR1zWmNcb9lVTS1KmtR6WLzVLz+UBXvxtVvU59OYaznxaes + DMy5vzLY/P4eDbEG3c+m0RVNBFfPdxw1hAABFh4Ybl3aygjKqVoeHwiUwU8A10fShVH1wUVQpUdV + sJa2sFwS0oaHXgDl8FPz1wdpHDTELQFVHlTXAqKzthfm3kdfAOXwU/NXh6kLvNO6M0VnNQUfXPVf + LpzdXCgFXhyft3NGg1Wtbiv1/15OZ41lqRvj7vfQPfW7P8MyW52WWS2mhAhA8KuspFjyebjJlEVk + LflNJg8NLM1GiKLWFtIdrLVBL1/kllMDFQYCsG50WU2p7Gw9V21pKp/PSVqYTDIwtbVWpCnWvFtp + oaKtIYRIW2jphjFtWm0utKXgGaCWbY3b4u0vbSmosBISJGnLreqyutCGbnXZVpXBbfB23VrfGng6 + ktB4Cyt3oyRZ66UspWjMhbXe1a5BQG3t+VIPRlghRGypX7s6/F/P++EsQ93gXcOWVYtl9WSCG66b + 791+O8AjjYtbqRvHdL/v+qEfHnnQwYpmz4LOFZ0W/2uj82vRltba9rROLT9DuDrOs1wl7PSgWLW0 + IxWPV0TJyE8r/9WRHeMMoU44Q4qa1uZaKUs5BY/1wMnZp9avtyLGGTQhnCg/WQFR04oL4xmCKnBy + 9lOCutqsGGdQjXCi9ATrrTGQleKc3oeAydFxerpGHNBFw/D41eWXbjcJM+eeCm+2Pu7H43YTNltk + TV3PWQb655PYzXDs18tKBfcRbgOGW8DO6dO+hqjki6hzGTmTzvnOXnKOjAZ3DlMycupczs6kc5Qz + 4lyc00cj4uTs1LmcnUnnKGfEOcIpmHOIk7NT53J2Jp2jnBHn4uPpVEKYHJ04l5Nzca6BkRbLzup/ + 6NwzJGj0ALeGaNEtDBTOs/gRjAio7LlXvogImDM1LSDsAJNJz19wQUBEyciJgFlV0wISzpiAmJMn + PcTJ2YmAWVXTAhLOmIDR8QxRHDg5OxEwq2paQMIZEzDK6QUMmBwdC5g1dRFQKth/LwJ+7I6bL+7c + TWnb+FQ1dI/b6SxsVm3aLrX1Zf1O93HPk7Dpaax227G/zD4K2IpIa+kz821/+MM/bkvh/L7thj9i + D6e6Ukw/V0Q9zQid9lSYTKJ0F1zwFFEycuppzui0p4Qz5inmlNzTwMnZqac5o9OeEs6Yp9HxDDEc + ODk79TRndNpTwhnzNMrp9QuYHJ14mhN69lQZEVaFv7/shu2++1e/64/zSUENOtVuO3e36Ybodk41 + zbkIvogak1EraYxHvWQM6Qs3BlMycmpMzq2kMZQzYgzh5JkNcXJ2akzOraQxlDNiTJzTRxPi5OzU + mJxbSWMoZ8SY+Lw7ERAmRyfG5NRajNE1OizaHr+P+zm7gFy6Vl6W7eZl7zRSprSVCO/c0EEMPJBC + jcuIn179evf20w/cMFWdi+OLiGE5FdOGua5dNAz3PWIYomTkxLCsi2nDCGfMMMwZMSxwcnZiWNbF + tGGEM2ZYlDOEaeDk7MSwrItpwwhnzLDovHvDAiZHx4ZlVVwMq0zw+e2XbnjchmPmtqEWMVWkVecG + +CKqSsaptCqO8aIquBNcFUzJyKkqOanSqhDOmCqYkz++IU7OTlXJSZVWhXDGVImOpw8jxMnZqSo5 + qdKqEM6YKlFOZwDC5OhElZxTsyoSeuC3WaeUs6iiS91I92bpbnw4+hOQtavDW6R322/b3fg8bcVe + v9s+78Y//a6MuAXPg2fK+CLiVk7CpFuylek05C+44BaiZOTErayFSbcoZ8QtwhlxK3ByduJW1sKk + W5Qz4lZ8PEOABk7OTtzKWph0i3JG3IpzercCJkfHbmUlXNyavrXwr7k2m/Fl8J8voRdvZ4cYRBdZ + MQtcEdUl41VaF8d5URfckYguiJKRU11yYqV1IZwxXTCn4roETs5OdcmJldaFcMZ0iY5nCKXAydmp + Ljmx0roQzpguUU5vQcDk6ESXnFeLLpU+S0Xx3c/7b04Vehj48/j42A+Pf3WHe+go8Pb00tudPKxF + tXz7hDNYN3x23/uhzHezmz66iBxZCKPPjfNFVM2Mw0k1hbXpTOYviKuJKRk5VTMncVJNyhlRk3Dy + DRXi5OxUzZzESTUpZ0RNwimZmoiTs1M1cxIn1aScETXj4+mMQ5gcnaiZc3hWUzQmvA37MDyMe/RV + by3xS6+EuP4YfX0abU2/LkmkQTD5XCFfRFzLSZl2rZHpNOgvuOAaomTkxLWslWnXCGfMNcypuWuB + k7MT17JWpl0jnDHXouMZAjZwcnbiWtbKtGuEM+ZalNO7FjA5OnYtK+XimmyC2QmbPgyb/rOzhX5A + d7s9PI/DgX/CISbfzvxwRVSkjHFpkVwPLoqEuxgRCVEycipSTrm0SIQzJhLm5M+TiJOzU5FyyqVF + IpwxkaLjGYIscHJ2KlJOubRIhDMmUpTT+xEwOToRKWfcLJKtQ85683Lo/TeGWk0z4J4Np2PAfnhx + ksF90AeIH3fd4N78tta9K/706s3bj8shO6QwuJ2FdvIPk+/6Q3c4Ll8D09P+2+1m/LZdPjaeDkvD + kb5nwCZDv8/8dCXU44zwSY+NTedDVx+3GBGeQ1OHc7YnHSaMEYUxIzc4MDJs6m/O9KS/hDGib3Qc + fWQHRoZN3c1ZnnSXMEbUjTI6IQMioybe5gSfva1VWCTedcdu9k/h3NfPQgjy3eL9vhsOPX96VIad + 0ptIyksblf5OWKXzHe5R5KWXYfGPAa8VKv2FsEpnOkwYed1lWPRjwmt1Sn8brNI5LkoYTrYNi31M + eK1M6a+CVTq7RWfZH8cbFvoY8EqTfoM//wa+XS9cCmVuZHN0cmVhbQplbmRvYmoKNDUgMCBvYmoK + PDwKL1R5cGUvWE9iamVjdAovU3VidHlwZS9JbWFnZQovTGVuZ3RoIDEzNQovRmlsdGVyL0ZsYXRl + RGVjb2RlCi9XaWR0aCA2NAovSGVpZ2h0IDY0Ci9CaXRzUGVyQ29tcG9uZW50IDEKL0ltYWdlTWFz + ayB0cnVlCj4+CnN0cmVhbQp4nLXRvRGAIAwF4HAWlIzAKI6mozEKI1hScEaTR9TLnWdlmq8g/OUx + c5lYqhPN4kaUxEKkC3QWlrWhiZm5iknbtHEVA9plA1z2YYdzg9ncYKowOqfiXGF4k36ur/sL9O+O + 1Wn/9vOwOdnczGuuelG4564HxjsXy8lykw1h5BqfOSP3AwiAbxQKZW5kc3RyZWFtCmVuZG9iago0 + NiAwIG9iago8PAovVHlwZS9YT2JqZWN0Ci9TdWJ0eXBlL0ltYWdlCi9MZW5ndGggMzY3Ci9GaWx0 + ZXIvRmxhdGVEZWNvZGUKL1dpZHRoIDY0Ci9IZWlnaHQgNjQKL0JpdHNQZXJDb21wb25lbnQgOAov + Q29sb3JTcGFjZS9EZXZpY2VHcmF5Cj4+CnN0cmVhbQp4nNWX3WGDMAyENQIjaBRvUDYoG5QN8AZ4 + AzJB6QRhg7IB3gA2QCVAEv4MtvTU7zlnn2xHOsABJqasLQ3YutQxQgjKjMoltlCe4ijr6BD76eHC + qX7QZVcrfJ2oJw9naqzoEuu2cLX5XETqkOfkSXYoL8ib4kBeUwC1ZPcjBxkFkq9PnoJZ3gJ6Xdya + Dt96SwyqlzwhFs8KkLX9UEEU+O62aPbhLQ0wq38ZsHx9N8gVCVAAN4neiOwPzQiQRGAs0ydapjel + TP8T1Lb2TCOSj1D+/7FCufT+pO/HyPRa0L0efEj/v9L+AaIDKOT9E9jjg6h59H9BBxrDYMSfX1ME + YBuY5ifbQPNMIClP/47CFWt7WX5qF/mJU8E6RQe/Yr0JoIFjfJ+ggxrZHfYEODjK7/7vsM/hmNTr + GlvX94tXEu3vCCckFyucbD5bMCdFtDqCS9DhofdSj6jbZom+b3IFIWCs5+/35vc7T9D1uz8RwIYl + CmVuZHN0cmVhbQplbmRvYmoKNDcgMCBvYmoKPDwKL1R5cGUvWE9iamVjdAovU3VidHlwZS9JbWFn + ZQovTWFzayA0NSAwIFIKL1NNYXNrIDQ2IDAgUgovTGVuZ3RoIDgxNgovRmlsdGVyL0ZsYXRlRGVj + b2RlCi9XaWR0aCA2NAovSGVpZ2h0IDY0Ci9CaXRzUGVyQ29tcG9uZW50IDgKL0NvbG9yU3BhY2Uv + RGV2aWNlUkdCCi9JbnRlcnBvbGF0ZSB0cnVlCj4+CnN0cmVhbQp4nNVavW4TQRC+R8gj5BHyCDzC + Nb7dDpQ6EqnSEuoUpHJr+45IoEhJgylo7CYUuIhSIDdBJ1EhJEiBG2jMnC+xL3u7c/s/zmgKy7qf + b3a++bmdTTwJHyQ8T1hRafb2/kdT6z+zUZLl1cVbIoCkDVVfeUEDOx0kWeGEXHBNNI/4Rf7IiiK4 + FawIruCLEOLIc+O48OqImMg3jsg9gc+DQ1Wa4JydqJA31VqkZYjAC1YRTQ7bxQvZGT1gUbW9QA9V + oToZKXKeN9XOukCOsFOxxadL9fqqYhEhc/bf7xhdn8pYRFVnTybp4u/dzz9l/+q5rgtGssWnwH9w + uQvIlw9yfvPKzgUkzAfaNMHXUv6+BqNMXRAfPOh4/mYpEzBKJyI2i08Bfjh7uVTL60/POp+w/naO + Tx5gCAL+y/dLnYf0ChryCDErkmdRHlzsaj6KJO1//TFRgV/8u9MHz1ZZKItLHsiQCHNGs0Ojp/Xy + KhFFA9+/eoGAP785Nn1gzwoGEHh6O9Avl+u7oM6qwEPat1mT3Pgj8Wi8t4ahXy6lpcouZgX8RtdD + WhbWUNOE6e0QYY5OtndXIIz07Z1Bh8esBe0tFK84SCwA35AbIY4igK/wX2D4VRzoLFX773ZYALQK + Ghwj+CEujj7sCbeUv66V1xuWqjgmNFtfnPam6VelpvlzPD9FUAFbahO8lyq5WjUP029YMgQT2mm2 + KZalSoXfqn9AejBc7EuVlDwjy+Yf6iksowX+dow76Zl9/1y1BIvSCLz3UlVvx1nfDkzQN+Hj/NQv + ePawkcUcWmhNEwKVKi/f72ACkm2WwUpVc/btuHkFUYmYcDJJvYNnj3dB3UfSYIIUfKD2UhgqpT72 + D/ufxZoLZSIEeCYbBHg5FTCcHTZjNlCHxlv7t75cwFY9HiCvtjEDtZfq4zfZk5hfoIM8cnidi48L + 1SBAE7zOuY6tZVH2lEfA0pyDEWmbvMCtztJsD5GshdwL3PkUE8l0yX3lm1IRKbIjcs8H+SLXhUAH + KXloR+Shzk9uTBjcv8g7cq442BDICm++iItcNKRwMoTq/HZb+GqUWU8DpYVv/Sf3en7+P4ZKmsgK + ZW5kc3RyZWFtCmVuZG9iago0OCAwIG9iago8PAovVHlwZS9YT2JqZWN0Ci9TdWJ0eXBlL0ltYWdl + Ci9MZW5ndGggMTM1Ci9GaWx0ZXIvRmxhdGVEZWNvZGUKL1dpZHRoIDY0Ci9IZWlnaHQgNjQKL0Jp + dHNQZXJDb21wb25lbnQgMQovSW1hZ2VNYXNrIHRydWUKPj4Kc3RyZWFtCnictdG9EYAgDAXgcBaU + jMAojqajMQojWFJwRpNH1MudZ2WaryD85TFzmViqE83iRpTEQqQLdBaWtaGJmbmKSdu0cRUD2mUD + XPZhh3OD2dxgqjA6p+JcYXiTfq6v+wv0747Vaf/287A52dzMa656UbjnrgfGOxfLyXKTDWHkGp85 + I/cDCIBvFAplbmRzdHJlYW0KZW5kb2JqCjQ5IDAgb2JqCjw8Ci9UeXBlL1hPYmplY3QKL1N1YnR5 + cGUvSW1hZ2UKL0xlbmd0aCAzNjcKL0ZpbHRlci9GbGF0ZURlY29kZQovV2lkdGggNjQKL0hlaWdo + dCA2NAovQml0c1BlckNvbXBvbmVudCA4Ci9Db2xvclNwYWNlL0RldmljZUdyYXkKPj4Kc3RyZWFt + Cnic1ZfdYYMwDIQ1AiNoFG9QNigblA3wBngDMkHpBGGDsgHeADZAJUAS/gy29NTvOWefbEc6wAEm + pqwtDdi61DFCCMqMyiW2UJ7iKOvoEPvp4cKpftBlVyt8nagnD2dqrOgS67ZwtflcROqQ5+RJdigv + yJviQF5TALVk9yMHGQWSr0+eglneAnpd3JoO33pLDKqXPCEWzwqQtf1QQRT47rZo9uEtDTCrfxmw + fH03yBUJUAA3id6I7A/NCJBEYCzTJ1qmN6VM/xPUtvZMI5KPUP7/sUK59P6k78fI9FrQvR58SP+/ + 0v4BogMo5P0T2OODqHn0f0EHGsNgxJ9fUwRgG5jmJ9tA80wgKU//jsIVa3tZfmoX+YlTwTpFB79i + vQmggWN8n6CDGtkd9gQ4OMrv/u+wz+GY1OsaW9f3i1cS7e8IJyQXK5xsPlswJ0W0OoJL0OGh91KP + qNtmib5vcgUhYKzn7/fm9ztP0PW7PxHAhiUKZW5kc3RyZWFtCmVuZG9iago1MCAwIG9iago8PAov + VHlwZS9YT2JqZWN0Ci9TdWJ0eXBlL0ltYWdlCi9NYXNrIDQ4IDAgUgovU01hc2sgNDkgMCBSCi9M + ZW5ndGggNzgzCi9GaWx0ZXIvRmxhdGVEZWNvZGUKL1dpZHRoIDY0Ci9IZWlnaHQgNjQKL0JpdHNQ + ZXJDb21wb25lbnQgOAovQ29sb3JTcGFjZS9EZXZpY2VSR0IKL0ludGVycG9sYXRlIHRydWUKPj4K + c3RyZWFtCniczZpdbsMgDMd7lEgbJGoSaTfZw3aXTuphIgXYDXaF3Wd9W186Q9qszRcGTAjyyz77 + /2EwNnhHNJqiUKwWbK94pVileC151Rt8ab5ZCV598rrJit02higqo/lBLcYELwUr4c+TyG6yrJtM + GWwAInm5mkcIlT9S6NUVm0Ll9MrHvoihHLanZBGVDyhoHRF72qctp3GEZHV0qTMGOyJ05nky8de1 + xPy9IFmZVvzVC8zHC8lnPsQLKrXgCWM1VnyeWuqcISISxHlMqPz+OH69vlMJ+3p9+z4cMb9pPRfM + CWgXf7lcfn9OJAgg/nw6wT9EISzu5ZbtkeK7EY7Qi+8GCmFmFZmVY5n8e/HhCAPxeIQmexnrt56z + Y/EhCJPikQhidC5bt+2ceD+EBfFIhIELrCsfPvF38RPxCFbx8FP4HScXYMIOCQKJ+M7+xRcOfg9B + IBSvXfB8RWi5Q57mjUArXuu/nQWCu+WZHgjk4qUp07rI4/RXHggxxHcG6UT75JknIxHiiQeDsBlS + 2GIQ4omXZgsEFuZWhHjijZXhtyJ+CBTitX6SOtEVgUh85Ro5SRCoxJMbBmGz4iUizl/oqrYk4mMg + UO3fs8v+pUIQRPHz7B4/iRDK8PPr7Ht+USCUImD+MbkNVdU2s34qxfzzN0xuQ1h4jk3le+/8GZ+Y + xUPoruNcQ5BHShwDQdxeypy2gHc+T47QX6pDIRxbfAyEvn43JXB08bQI4vGZVawinhThQX+TvVju + Dw9L94euWaUVAXF/OHwIsLpgDsEvJV5A8Li/xbhgEiEkn59EQIiffZ1vnxGPL3cI4cXIAAH3irT0 + CoZJRzsEqkqqR8CIF7buDuz73eFIWAYi3+8ErsEGs4rSGLqjQ6zVKoM34djLIbfUPwBidu5DbsQL + zL+LZgNe8Jn5+5Gg8+pmgtF0V0JEWplCf1xO2ciHeZ0nMxarkdK8d0SkIJ/28dCOYFH6V83xmu1W + GUBB5YuVlQ8GFKGtvsRzBlFcN6vf17Bph/bIU91Nppzqn5dm1elmdUbZP/8Hr6eQFgplbmRzdHJl + YW0KZW5kb2JqCjUxIDAgb2JqCjw8Ci9UeXBlL1hPYmplY3QKL1N1YnR5cGUvSW1hZ2UKL0xlbmd0 + aCAxMzUKL0ZpbHRlci9GbGF0ZURlY29kZQovV2lkdGggNjQKL0hlaWdodCA2NAovQml0c1BlckNv + bXBvbmVudCAxCi9JbWFnZU1hc2sgdHJ1ZQo+PgpzdHJlYW0KeJy10b0RgCAMBeBwFpSMwCiOpqMx + CiNYUnBGk0fUy51nZZqvIPzlMXOZWKoTzeJGlMRCpAt0Fpa1oYmZuYpJ27RxFQPaZQNc9mGHc4PZ + 3GCqMDqn4lxheJN+rq/7C/TvjtVp//bzsDnZ3MxrrnpRuOeuB8Y7F8vJcpMNYeQanzkj9wMIgG8U + CmVuZHN0cmVhbQplbmRvYmoKNTIgMCBvYmoKPDwKL1R5cGUvWE9iamVjdAovU3VidHlwZS9JbWFn + ZQovTGVuZ3RoIDM2NwovRmlsdGVyL0ZsYXRlRGVjb2RlCi9XaWR0aCA2NAovSGVpZ2h0IDY0Ci9C + aXRzUGVyQ29tcG9uZW50IDgKL0NvbG9yU3BhY2UvRGV2aWNlR3JheQo+PgpzdHJlYW0KeJzVl91h + gzAMhDUCI2gUb1A2KBuUDfAGeAMyQekEYYOyAd4ANkAlEBL+DLb01O85Z59sRzrAASamrC0N2LrU + MUIIyozKJbZQnuIo6+gQ++nhwql+0GVXK3ydqCcPZ2qs6BLrtnC1+bOI1CHPyZPsUF6QN8WBvKYA + asnuRw4yCiRfnzwFs7wF9Lq4NR2+9ZYYVC95QizmCpC1/VBBFPjutmj24S0NMKt/GbB8fTfIFQlQ + ADeJ3ojsD80IkERgLNMnWqY3pUz/E9S29kwjko9Q/v+xQrn0/qTvx8j0WtC9HnxI/7/S/gGiAyjk + /RPY44OoefR/QQcaw2DEn19TBGAbmOYn20AzJ5CUp39H4Yq1vSw/tYv8xKlgnaKDX7HeBNDAMb5P + 0EGN7A57Ahwc5Xf/d9jncEzqdY2t6/vFK4n2d4QTkosVTjZ/WjAnRbQ6gkvQ4aH3Uo+o22aJvm9y + BSFgrOfv99/vPEHX7/4AEd6GJgplbmRzdHJlYW0KZW5kb2JqCjUzIDAgb2JqCjw8Ci9UeXBlL1hP + YmplY3QKL1N1YnR5cGUvSW1hZ2UKL01hc2sgNTEgMCBSCi9TTWFzayA1MiAwIFIKL0xlbmd0aCA0 + OTYKL0ZpbHRlci9GbGF0ZURlY29kZQovV2lkdGggNjQKL0hlaWdodCA2NAovQml0c1BlckNvbXBv + bmVudCA4Ci9Db2xvclNwYWNlL0RldmljZVJHQgovSW50ZXJwb2xhdGUgdHJ1ZQo+PgpzdHJlYW0K + eJztmuuugyAMgH10EwKluOQ88lnRMzMHXlbQ0hNJfyzZdB/0QqHtKg2APoD1zgZ09CF49ykQv0Kw + 6Az9uGtjDGAic0p7SIAeF8Hu+54ABib2pzzQXaaRuuSzTC88exaPANXJU12cQQ5A5DacDD9LXUVc + sOypYCVFDHg1+bsUwlOIE4QfxfLhQZb8JcCZQgMrz9eCNG1GBoSD8BRtxGmzciQijXFeHnVNdvcF + ccIdFWw6Qj7vbUzWrIgsR5ztoFAOmfLL7rPfqSDZERp3210VqLD8DRXwXvJbafD+/c14jEb++eyM + 3DxNlt87W7hnyfJPJlQS9sX5KZ1ANOzHxfkpbGJB5BTnJxfAgkOWPD8dsjTzh7KcR56/TG7+m//m + F+ZXHj/V719ecf4Qkx/N+c8wgPb8We/5BV9HYLYLyPIHD//j/B4v37Tx47I0hurur5a3uD99r+v+ + MC0EKFIB5ip6WlSA61UYdPJ4+/ybVbArmxx4i99tDlBev2vZio53dIT2rAi/7CLARpof/uA5jSiN + 9G9gQQuKuBZ4K7+cgpgvzBWW0ik4p7d/bBq0L+Bl5N6e1EgZ6x2qlj0d43n/FI8gR8s2Npw1i3q6 + uJI8mYihEMebCIUXEOrfTkd0cDQIU/98DhjidWVsVoea7vkEl4muIwplbmRzdHJlYW0KZW5kb2Jq + CjU0IDAgb2JqCjw8Ci9UeXBlL1hPYmplY3QKL1N1YnR5cGUvSW1hZ2UKL0xlbmd0aCAxMzUKL0Zp + bHRlci9GbGF0ZURlY29kZQovV2lkdGggNjQKL0hlaWdodCA2NAovQml0c1BlckNvbXBvbmVudCAx + Ci9JbWFnZU1hc2sgdHJ1ZQo+PgpzdHJlYW0KeJy10b0RgCAMBeBwFpSMwCiOpqMxCiNYUnBGk0fU + y51nZZqvIPzlMXOZWKoTzeJGlMRCpAt0Fpa1oYmZuYpJ27RxFQPaZQNc9mGHc4PZ3GCqMDqn4lxh + eJN+rq/7C/TvjtVp//bzsDnZ3MxrrnpRuOeuB8Y7F8vJcpMNYeQanzkj9wMIgG8UCmVuZHN0cmVh + bQplbmRvYmoKNTUgMCBvYmoKPDwKL1R5cGUvWE9iamVjdAovU3VidHlwZS9JbWFnZQovTGVuZ3Ro + IDM2NwovRmlsdGVyL0ZsYXRlRGVjb2RlCi9XaWR0aCA2NAovSGVpZ2h0IDY0Ci9CaXRzUGVyQ29t + cG9uZW50IDgKL0NvbG9yU3BhY2UvRGV2aWNlR3JheQo+PgpzdHJlYW0KeJzVl91hgzAMhDUCI2gU + b1A2KBuUDfAGeAMyQekEYYOyAd4ANkAlEBL+DLb01O85Z59sRzrAASamrC0N2LrUMUIIyozKJbZQ + nuIo6+gQ++nhwql+0GVXK3ydqCcPZ2qs6BLrtnC1+bOI1CHPyZPsUF6QN8WBvKYAasnuRw4yCiRf + nzwFs7wF9Lq4NR2+9ZYYVC95QizmCpC1/VBBFPjutmj24S0NMKt/GbB8fTfIFQlQADeJ3ojsD80I + kERgLNMnWqY3pUz/E9S29kwjko9Q/v+xQrn0/qTvx8j0WtC9HnxI/7/S/gGiAyjk/RPY44OoefR/ + QQcaw2DEn19TBGAbmOYn20AzJ5CUp39H4Yq1vSw/tYv8xKlgnaKDX7HeBNDAMb5P0EGN7A57Ahwc + 5Xf/d9jncEzqdY2t6/vFK4n2d4QTkosVTjZ/WjAnRbQ6gkvQ4aH3Uo+o22aJvm9yBSFgrOfv99/v + PEHX7/4AEd6GJgplbmRzdHJlYW0KZW5kb2JqCjU2IDAgb2JqCjw8Ci9UeXBlL1hPYmplY3QKL1N1 + YnR5cGUvSW1hZ2UKL01hc2sgNTQgMCBSCi9TTWFzayA1NSAwIFIKL0xlbmd0aCA4NzQKL0ZpbHRl + ci9GbGF0ZURlY29kZQovV2lkdGggNjQKL0hlaWdodCA2NAovQml0c1BlckNvbXBvbmVudCA4Ci9D + b2xvclNwYWNlL0RldmljZVJHQgovSW50ZXJwb2xhdGUgdHJ1ZQo+PgpzdHJlYW0KeJzVmsFO20AQ + htd+gz4Cb8Aj8Ag5RrFduZeec24vObRnuOaGxLlwbG+oPSOlJ2I7qKZCqCihIAS0Vaoq/W0HO7HX + ib076w2jERKgbL7ZmZ2d2V1GJe2QOYHZ8QzbN+zAcOKfqc5/9Vmi7pBtiNijiDlHW0WtwLQCfFwP + tjsw7VFt5hJDmHXWnEcIyZcVw6q2wlSAzfGFCnGHhmr4RStIHaF82nnKLI8G3hkZ6mm5akpnJ9PR + Q56Z4ATC8IhDvfBZLD3DmZfxgqIML2WCVdUELdmmilbKSE3meQET1u0L8mt2q/utezDZ+3RzdPJw + fPor0f3Pd/jj9pvvBCaskI7UyCAE6mylhJOp27+S4i+LIkSOxOQPzn/PKgvMhJskomjAWbZy+2w4 + +TurI3CEsAlRB0S9bOvyJ14gc4Fc5IvxQ3beXZC4QD7tpPy3D/+QbbBId95fQFu7lyuWRvdgLO6C + VCh224S/d3j94vVZ8b9Ip1x+WCrOb8/3AtPyhQdJ9fj0cXV6h1+o+T2q4IFyp31R97/c0fIbSVHX + VMFwdHJPG/+RC9pDZhMETxXlJiiZXSzid4Jm+F/1r4rwMvl/zm97hvpSf6sb3j5yFu/2W9lyDrWQ + angkJW7k9D5cU4zvGyr7RFSk3Jn/ev6H5itUwvcOf854Avi1yVa7Iua58Fizmw9vRNsxp5FBFaEd + rIpizSpbsAVVsASwq+bgw/H0ucBD9z7eNDT50eZLv38VSzW3/0MFf9TLKxi2OX50YQpCCG0X+q9F + lazTSvlfeihBVYzcjEb1M/qXTTpqrqHWUwuvnURs8tMTaZs+hFAkYBeLTiFET0jW89vZWS7tyLmy + M5xMW7uXxPzW8hEcXRfGbbVgDm3ZxnL8bkg1ctlplWSrnudvFy4CiFwwKxHCEoJzfkvngrKDUMlj + /0wROe2SWxiKdrhYfM7i+pNqC85H/rKQfAVMCMeZFyRvK/KTv1qIyglkm6QKIrnzyia/XeFdh/pD + FUH46i86dKNy4G2f1RGzqXNRFfCJaMd+ghd/gqLdC2IzvyT6TEhvWGRFR0aiej82F+wLVkOOYBXz + vIB0lFtBPO1Fia6cFE27z1oD1ozACjpfNEqeEzShsKK+IczxWcdb7GE1S3yVGeuIxXh5Wjt+bQ5m + Z0i4PP8DDTuaoAplbmRzdHJlYW0KZW5kb2JqCjU3IDAgb2JqCjw8Ci9UeXBlL1BhZ2UKL01lZGlh + Qm94WzAgMCA1OTUuMjc2IDg0MS44OV0KL1BhcmVudCAzIDAgUgovQ29udGVudHMgNTggMCBSCi9S + ZXNvdXJjZXMKPDwKL1Byb2NTZXQgWy9QREYvVGV4dC9JbWFnZUIvSW1hZ2VDL0ltYWdlSV0KL0V4 + dEdTdGF0ZQo8PAovR1MwIDYgMCBSCi9HUzEgOCAwIFIKPj4KL0ZvbnQKPDwKL0YwIDE4IDAgUgov + RjEgMTIgMCBSCj4+Ci9YT2JqZWN0Cjw8Ci9JMCA0NyAwIFIKL0kxIDUwIDAgUgovSTIgNTMgMCBS + Ci9JMyA1NiAwIFIKPj4KPj4KL0dyb3VwCjw8Ci9DUy9EZXZpY2VSR0IKL1MvVHJhbnNwYXJlbmN5 + Cj4+Cj4+CmVuZG9iago1OCAwIG9iago8PAovTGVuZ3RoIDI3MzgKL0ZpbHRlci9GbGF0ZURlY29k + ZQo+PgpzdHJlYW0KeJzFmm2P27gRx9/7Uwjomx5wVvgssigKbC6XNAXayyWLFkWvL7RaeVd3tuVI + ctLtp+9QIinSpKU0ybXIAxJKlv6cmd9wZtbvN+83z283KNO/uofNs1fvUPbQb569RJnMbncbymVO + iMwkETmVXGW399lvb06nb7Lbnze4yIuCMvioXv2uPZz2TXms6vEiK3IuhL14cx7aQzk07XG6KHIh + EDEXb9t2Pz1Q5RhxbpZ3bTetklxKUZjVPzdV1/btbhivUS2P2GtU8GkVgVgqzCoZ1569xBlGek9b + zlEOG2LZVpAcE8HH216UQzneSWiuEHbKByuCEGEf+bbup+XvwXg5zz6CCf8Ef37e/OOfKLuHNcVp + Bn8zNf7Ns7evtHGxNi6WNMcS46xgKhdUyeywwSLnSrJ5ab95590oRY4vbrRL+sb3WZErpYrRjeaf + GG7gEkxTCJYTrnhWHbJnr1H2ot38qJ2OVZFTgbwb9M6w3RaRYETOaKAyUq7fPt/pyYykX9NJ4M6C + Q2SFOrHTSRTLOaUq1ImsTlpAoJGC+zpj7frt852zzlj7NZ0U7lRE4QudxOmkCucFKvAVnaxgcBlJ + X2esXb99vnPWGWu/ppMVEiAi9EIndTqZlMATYld08gLnsmC+zFi6frm7cVYZK9c3ah+CPEpzjtQS + am/roT7qHPHtlCQkxCe4Zrr4vKx+2U4f4pBZsM0SZ5OLgieVx/txdYsxOIVInsG/cqbM65v+1Pbl + 3m55DlZ4yiVndikEcoXcZSAJ5M1FIO0NgWPmUPVURspDINfQXQYy0JkC0tfJYiBnnbH2EMg1dJeB + DHSmgEzacw7WWWesPQRyDd1lIAOdKSCTOh1ns8xYegDkGrkTkALM4/C/dvhVVd3305nKc4TgAeYU + Lo/lQ30AXCOIRCEu2XBLIUQrtC1C5NRfgyjYXgyRrzJSHkK0htsiRKHOBESBThJB5OmMtYcQreG2 + CFGoMwFR2p4uwDydsfYQojXcFiEKdSYgSuu0bHgyY+kBRGu0GYg4m5F90zUfyuopJoKhy0B3SwER + a+gsE2GlXCXC15ogwlMZKQ+IWGVnmYhAZ4oIX2eCiFlnrD0gYpWdZSICnSkikvacw2rWGWsPiFhl + Z5mIQGeKiKROR8QsM5buE7GKjiECy5m/Vy/evI1xQDSKcrsU4rDCzTIOVsdVHHyhCRw8lZHyEIc1 + cJZxCHSmcPB1JnCYdcbaQxzWwFnGIdCZwiFpzzlUZp2x9hCHNXCWcQh0pnBI6nRRPsuMpQc4rHEz + 4cAlnuH74+s3NzcRD1wUl2HulkIeVsBZ5MEJucZDoDTmwVcZKQ95WCNnkYdQZ4KHQGfMg6cz1h7y + sEbOIg+hzgQPaXu6WPF0xtpDHtbIWeQh1JngIa3ThrknM5Ye8LAGDrxTjxWx0DM4TQaFD0oytR/1 + UDb7qdHgIleYYdNotDs7GeRMKLM4PE4zRiJzxridEISTQTiZvGtuMohzzJAd41V1NzS7ppoHk4rD + zojtcqr2OHRmNsllLoSTVfY9NEa6/+lni/EcXCMyBgaVjCgdV2j+35wTmKI50/NJ/aQfTnU3vt/M + I+Aa5dgqfFdX564ZnuYR5mi+rb1rS1kudSIYu7WPZVcfbcMGQHFF7VZuu7I5NseHeWp5OaHsHkZt + SH8MsgHXu4HN6P/KrKs3u3BSrLWQ0ZUyY9C4wquEmQPPRmMkR7iwm/nNNFyE3CWk2+Gbrv3Q3JuZ + McsRcZOdWq/bcTLHkKXUZVSAFRi2W6z7obzbN/1jPQ1/BDzNjY9635DwHlEUdmpcBmYT+kXcjqYH + Y7Zv7dgaEW6b411Xvz+DwCcbtohS+zk7gCLaT26i3dVV291P79kyQcBo2oewjUJJOd5yaI/N0HbW + U1yBGmw34SbikLJpYWko92Z6zmHVdejNEe72Ru7wNqEcD/1TP9SHaVPYf9i5rzsjkCAwYAEpZEvU + LPCz/DU8lsPvfn/X/UH/ufnpmylAZY44s164tUzDMzG2q233UB6bf3vbkHmBiVV7msT0dl4Ib2T/ + g2iwse29bmgno3FaQMqTRejVL3YGJb7Gn+CB1f5876IEdqAK+7jDOJvp+ilmBQIfqXnjx8YEERU+ + m/W/wCRD86G2H4PAFZQuhvOYHssKwrU3LhUabXd99DhoNRfHZOA8e9MnQvlUdkMqCnbGuLBMCIqM + 2wyNyZ4UgZ1Use6vNErH+qMdMVPmzD26Qe/lh7dmR3ZLWGcgZ/i/PdaTeyEpexlOp4mmM2HICh/o + uyebEREqvpDc6rE8PtS9pey5kbhlcOZxTC+M9vf2bA3teeyx/GAoVL6jfQqnGbyA64W9fF/vmqPd + H4Gjn1rul1JkMod/Cn12h99ZJ0CeKgiz5k7v7L6tzm5c+Sm52iRiE3iI5wLK6MvAu28g/ZxN7HGN + TEG+zIufmZmAQpAy2EwYnLDXziIouUy4BiXH4q4WiPIPN0Z9ftoP9WRHIoL9HG3KhIPw8hz88pCz + YWJKJ2TKlS3GkIcKiaF2gspMKRZXLRxqaPfTaThHhto1bVTqYhlnpEA551R5vZhbMpUeBmFYQLFJ + FHQXunrVj/vL+XBnzKEPrMJVaJYH5v9ofAdlsdnmVqdkykIzVed+aA/mebzw/djV/ak99s1ds7fx + 9P3URhEqSLCBaFO2VlX6MIPEpLszBmX9ZKrgneAV5vaQeCeUv54obcyzVzJPvYOnJdbnegdXcKKM + gOmU1fNytlHgIX3AXXjILo1t9We50n+xKWeRn7yTWQ3H1vfERYLHbvqT/QQnnq5roK/RlTyG0wjK + c4owpDgFesE/0OQRrr/QMVbx7zcQ+kj/xpm5DU4k3f9Dgy2hZSh0rwi3/Qi/nIdmvfEe/DZw1ZWu + TSJI6Y4fT22S+5+xuNdoIM/v2kFMXrod7OL9bOpTmWhMtlQ6QhVzmWVuRXWIAnWjXCz0EQA71HL1 + 10fkvJQIUXMHkA8umJpcnFvAwUkW8Ovl9H0NR1APCVfXsdMNUhscuX5nud52OZ8pu/0nezQS/3y4 + cuj/nwpoyJO50F8C+roFtNc7Y6ym43/LjD3H6UG518LtVhUSdHbRUFfu1XqwIJmVPZ1Nyv8i1M1x + aLa2ah+bcxS9YaEDBz6Ynq39Nw240vDAEbjSf5Nftf8ea5A6UQCXziBjOLrT4uAZZDwLXeHet/vz + /GUx5vv6UNeDi6CgH+9PdaWnOYkKpIJYrbtm+hE3VWGfHHRSCGoJ7EpUU3psmZLAscBhUJbzT8cZ + 8jfcV+XRhXlouXQxdrdvq1/croIWoSpPZZCuthjSaSHAq1+nL0/niXTB9hX92Jj+j6xHT8pi9VFn + xXsXBi4zlXoI2NtjwVefHJO4USKc4pg7B5aHk3t6MFbwUg10BZpbfFmStQc4Y9xkUA8sULG4F+ij + d83D2baIuqRyPaVJiyFpmgHb7nptcnovu3a/bz96AY6Ie7rlIprN6J4KMWbz6OvdXOpYh+k0l+jV + /9p0ZzNDAD96ldFgu2MdVFLxC8Z0Iz6HlIfWlumRezQoW2DsMrSux0rSHVeg6JuHIxSvncFQz4OV + ctHbOdN7IXc+pfY2tFtbCCBdo5nj3nYZoXk+NsNj46YKSPfxpqbcWpcI0OEe8nTZ/0NVh7j7huyv + 6MjGfRVIF47/Ach/KHYKZW5kc3RyZWFtCmVuZG9iago1OSAwIG9iago8PAovVHlwZS9QYWdlCi9N + ZWRpYUJveFswIDAgNTk1LjI3NiA4NDEuODldCi9QYXJlbnQgMyAwIFIKL0NvbnRlbnRzIDYwIDAg + UgovUmVzb3VyY2VzCjw8Ci9Qcm9jU2V0IFsvUERGL1RleHQvSW1hZ2VCL0ltYWdlQy9JbWFnZUld + Ci9FeHRHU3RhdGUKPDwKL0dTMCA2IDAgUgovR1MxIDggMCBSCj4+Ci9Gb250Cjw8Ci9GMCAxOCAw + IFIKL0YxIDEyIDAgUgo+Pgo+PgovR3JvdXAKPDwKL0NTL0RldmljZVJHQgovUy9UcmFuc3BhcmVu + Y3kKPj4KPj4KZW5kb2JqCjYwIDAgb2JqCjw8Ci9MZW5ndGggMjczMwovRmlsdGVyL0ZsYXRlRGVj + b2RlCj4+CnN0cmVhbQp4nN1a227bSBJ991cIWGCRABHd90uwWCCTy8wsMJd1/LLY7AMttSwmFKmQ + Urz5+60mu5pNirKdzGQwWDgxkqbYXV11quqcbn28+Hjx3fUFWfif5vbi8vu3ZHHbXly+IQuzuN5c + cGkyxszCMJVxI+3ier148mK/f7q4fn9BdaY1F/CqH31Z7/ZlkVcr1z0UOpNK4cMXx0O9yw9FXfUP + VaYUYeHhdV2X/YQ2o0TKMLypm36UZcYoHUZ/KlZN3dabQ/eMe/MYPuNK9qMEjOUKR7uxyzd0QZnf + 01JKksGGxGIpaaYl6z6VBwtXeVl+7t7QPIMJ0cibsl59aPvpdcaFxkV3eXmXN2HTJlPa4hO0X2SE + cBsG89I1hzAPg0/HefJq3Y0yWFZGJ3w85k1eHYrK9e8olRGhcLK7ratwKsKofNCkop9lybXKqF97 + SXmmrTHd07U7uNXBrf920/zd//3lCv/18t3TEHIDMZcY1h83/SiBHaKjXlfrfV1UfXzA05rg4q+6 + 6REDEtzCLL9399fbxuUx0oRKjOmVa/d11bp3T16/ur569/RytCqFTQMwxey6S0l4pqil473PG/Br + U49shsgrzmeM+NUb8cPRNUULGBqsoARjdZO3rl+Cq3Tn7SqvqqK67RegsACY1j86tjg+ju+LHxFY + SlOc/wBYeI7wJyzmpQ/fuydFCCA3Keb2YG+9DvYKCTvX4mGzEESSmcwKy8aOvHGJ0cpKPqwFGb0L + PoC6Qpic2IhGClhOcIPL9UG1GY97ChZQxNytq1wDyRsWViRNkvy4DlMwm8a2rG/7aZhM8xlticb4 + 9LVfYMwHtw/LqRSyx/0Sq2ayuUPdDwLqBMXBdX5wOIMyFg1e1b4QHGOB8tvksUDNA3ibhz1CLAxF + W1pXbpYYRJZZKSfZULq8idGHak04xTiu8n1+U5TFoXAtlodXWB6YSBNvtjxAvl76fJlmS2dhLNp/ + SLaMU0MBDJRm5wOdtADoHCxjQkzc9qGq76pYrk4K8gTmZhTdOWStHUR8U4TaD8U0yaf5eJ9tU5W7 + mwH7+U7xKW+gmYdO1ZUG+lBsQpGkKoXaLod+jR9WOgL/xm3zT0V9bEJfg5DxGMoAWpiJEI1v3Lmy + DM6HADMJLXVcwede8osgKkzqvs0xzEZNalabb1wJqOy3TdKdpMAPlIIgpaC+yUujFktOM2OtCJSo + OjSB24ALrY1Z0B4wxV8D/crk4g5I2D/g7/uLf/+HLNYw1pnq62v3Wy6uvvf0jHp6RmErWoK3FLAs + Isxi53ctrRFxpLx465kdFSyjiqiFAuJgAK5+8Z+PuxvXDDGPm683MVMGdrbJizKEe6l4h86R21fH + FphTmM83yAEoTd8gi85rn3G7zIqMccVS66cbCuYzqzPFIZhKWnACTNy5dbSiTcvpzIqGpiZ5xx9b + NEVqiJYWiSUnxgVLBvrIyEJBEgm05uf6AIS4BOJ4U8aQDhuCOiHHEQojfuKvCWS6Nhnqq54GcdRR + 6KnzB8OmtvolHxskwC6gCn57VpRJJr2M4IT6bO5sBZwsmPRyonEXG9AbUDKJ/0MX4WNcUb1gBAqm + pdpC217t4GP/hJ8YnmjrifnehsdHcRA6PpwqhFNqnTGfm52+SCqiEpklCivGhAsCgxYmtrplKN6J + IAqoiC8YBnTQYETS2tDVgGm+g5XeNmiLHEyDCp8xrRaCe3j0vjzZUI9Ps5BeXwmuT4sQVFmqMRf+ + wmfqNezyE/SdSH2GJub8OMq7ceudxVy+38NcyPfgkY5NHOTbqO2YgZRh7R2mme1zOQTiUz8BF6n9 + +cTryisQ7PqrxBfcpnUBIrutaqCEgVrB9mKTvCsOW5QOKrMK8DSugHW1KW6PzbCoZikBXder4w46 + +fB8aQJDXQIljfN8lesP2yCQvH+EjfvZBgZJUg66qcuyvov0yeuEGJTgm7mGj6GCyRLxUFQoz5MW + si/zlXuOvPBFYDpWZZopnO5f9bGfTqSRh07tZlh6PkcqzkPrFD8Bm13sOPEtOo0dQvEywU3gERR8 + 4BNxAgJvdUJjPOt07RxBew9tCshbisWRIPKRi54aaCiwQk0ZYsf9FzbUIs6TMj+fFo/WIjNOPStF + JrR1KYApg1Cc6D6Xr7Zz8bsvH4/V2jW3NZ5tjGXb+cDnoZrZ9IAGHqwwEBP4zrqqLW6rGUZcbzZx + XS0jrEEn93yDAcPh9l75VoSAeQDFbrB2+7L+7MsAhvy7KJog4l5K4JlHSGhArIUybiZ86xsUuClq + +uL6LAqZATiu8ixn/Sz6/4HjKyyNmKo2SVUvDEK8xqcSOTJzOXL1bEVr890e6anvJJbGA4zP7cHt + ELEqY4azad3eAVl0KHKUSc6qZsUEFvKwXsL/Dehe6vvCV9D/yKsE4SAidMoC49CUBgrgBUYS86ci + 9OkGTjY1pfQCwmsl5d+I0ie2nNo3R+o5zCrQnjeDj9IIccCIHEcoDo34/JeEcrQw/XpGnxp3YvCI + 0z8YJ+LpI/BQ2rFRCimbsHpvryGPYvVCAhEyrDs9OmH1ib2ne0h5/YOhlNqTY6gJXPiDAes/SOJ/ + Trk/SaIORYxIaqdR92VvOPV7bErgyYD1ALVD6T/AxANCIek6a5k1gABwjTfX30iYYWgGof0nOCS+ + lrxX8jTD/IYYYX6fp5FrtwNTD0BUo1YFtkF8Gfm/pPhLwUEuGT05KHoU1x/TvC+n+IPCXEJsQNv6 + yxYRvN2FKT8EwtSxlYiWn/Iqv3V+sh5KOjPw9LzM7OaJJ98qvXL4K7ZRSuO55lXRfuh9CiROCtz3 + VV59wEnukaOM6MwCnr5IjrLuuO5BNSq+qRr1zb5xWwepGkDle3Z01T5Gw99aDKeyu3E0/J1gxMpp + 0EHik8GnRbUqj+tEbWkSKdaw3lJY8LBiE5CCSlvXd23PtKS3SQ9pDJvZFW0Ly+Ls1t8L3uuAY9Ue + 9/u6QfaiSWrrL28vMWWfIb4TMjWfoZ+Opb93SToz4E/ZWATw/DrJ1aUgQFx8rH4f6fs8lZmezQyP + hwTzyok+KqT7GirL5+Elfj+97TTH+hjKXHc7GJd/CB1rt4m3uj4TkrvQWf47G1QkxUsJla7jeCMQ + Rb0fdSaKOCgSqbptj8XQEyAAiUzdFVWxQ8U1ukPZp5XHX3ZCn49l1KP3sp1B76apd4OSQoB9cvBC + oLAkvRo8l5iNK13eOnRfgtXZa/f5Vc/cn6/qmLVL6PRQvCZ+TYGPPV/7WzIdbzBmj0w2RRN6n7/t + UjFh40XPegbm8XsQ3nKNG3rZFN2XFS5/KG63qF8SYTQP2J/cujj2jvC9aMB3A22hRQdZq3DxyU6z + DkPxJIBDzwdtZaZfI/j961O9Ty94x1SjE3ohkUY+OiP8Q52buY0bUJ9ytvFd3uwt17aeu12bv3Nr + 3erYYMGE6g992E6/ifG1ALsXSGdoVutPQuZfmBEjDfIHRlOctKs6GJSoYsjizFAmf5ssNl7SUppI + KRyZKilKDMBR/Kk0cWL9dENTRUxBOUklvtUl12DJiXGzl1w6I2jMGTksve4YRQZHRmL48QFM1/wN + Sjixa2rqSAc/EJt7VTCYKhh9jAjWQIpE1wBPJPBg6IntqQB+IHJR/kLpNpqxXv7ifx6Qv5AF4Rtw + f4z69dv/H+7o8xEKZW5kc3RyZWFtCmVuZG9iago2MSAwIG9iago8PAovVHlwZS9QYWdlCi9NZWRp + YUJveFswIDAgNTk1LjI3NiA4NDEuODldCi9QYXJlbnQgMyAwIFIKL0NvbnRlbnRzIDYyIDAgUgov + UmVzb3VyY2VzCjw8Ci9Qcm9jU2V0IFsvUERGL1RleHQvSW1hZ2VCL0ltYWdlQy9JbWFnZUldCi9F + eHRHU3RhdGUKPDwKL0dTMCA2IDAgUgovR1MxIDggMCBSCj4+Ci9Gb250Cjw8Ci9GMCAxOCAwIFIK + L0YxIDEyIDAgUgo+Pgo+PgovR3JvdXAKPDwKL0NTL0RldmljZVJHQgovUy9UcmFuc3BhcmVuY3kK + Pj4KPj4KZW5kb2JqCjYyIDAgb2JqCjw8Ci9MZW5ndGggMjM1OAovRmlsdGVyL0ZsYXRlRGVjb2Rl + Cj4+CnN0cmVhbQp4nN1aW2/bRhZ+168gsC8JUDJzH06xWMANmjbFpkljd/uw3gdKoiwWEqnwYq/3 + 1+8ZzoVDipYdx22MwomBzIxmzuU753znKJ8WnxbfXSxQpH/qq8WrH85RdNUsXr1BURpdbBaUpwkh + aZQSkdCUq+hiHb04OxxeRhe/L7BMpKQMPqpXX1f7w67IylXebzKZcCHc5lnXVvusLarSbIpECETs + 5kVV7cyFKsGIc7u8qWqzSpI0FdKuvitWddVUm7bfo1o84vao4GYVgbBU2FXWr30PaiY8ugFlf4K/ + vy/+/R8UrWFNcRrBb6b63zz6+IM2A9Zm4IImRHIRSRAYMUKi/YKgBIyRDku7xbm24as3OMJE28yf + kCgRYB4tA06MKizBkjq9P9TVdbG25mIJItipvs73Vdm0ddZmy505kMJzHKX2QK4/6EzNcUKFwnar + 2pinaEIZdudX4Jw63+ZlU1zb+1gikbLbh6xdbY3pSCJS5eTYZ2V2le/z0lhbwp3SGXtdrTq9M3g1 + JSAic/tFudp166K86vdiJmQiMKVRDJJJlaYnH74pynV103xj9NNbcrANKLMvmgaehdvNEaVAMnci + K9f9IgFxuYfTdbcr8zpbFruive33BaBQSerkBYO2xaZYDQr1mJniA8KEoEiAshjEhfsBIiJiNOEq + jep8sRlFFMSORCLhVFAbJWVbW7gzsBeWDqZ/M9jFIFSKxR8KkXabtd5CTLnHsp0NQ55Qqtw9TQZx + nRuLshQshl1QN7dNm+/NBtxPpQrQVpVgzsbYOQWoOVhktZEIokRID6Zl7oCicdCbfMCHfTxmCjxA + wegjCM17uyub7nCo6tZ+GGIxwOb780EGrE7CRqeaGye01j/1W5+vZlm1bhVhLnykuDwnJHVm7xpz + QUwBEVjDNCZq0PpuYNzj92+NABplPkP+fVn/Q/89u3xpNNG5gbtPnTlY6KSt1DOChZb5OytzzAC2 + nKdijI5fpziAmGPCSVQdICO07g2u0xsdadG4Whao8exw4tz32za3t2EEEivhE+IBKvPK5wkug2TZ + bgsjVswpTgRjk/BqtlW3W7tiG/jA5Pfc+xmSu9fXLgNgAwsts2ZuuTD1CtY8lWjy+jqvd3ljJAMO + gjB1tmnz1basdtWVTeI4qEmOMUBAIOr89SHLzmdKjFUbk8GQ629mzs3euaza7RBIw53lps4gKXer + trOu0DWTK3YSO/cZLOaEA5VI5dg1M5Z763Ql2mYnde1XNNEzrAWyK7xNwfsAg1QpdlyueKKUJ20N + FP7cVUkM0JAc8gyXIpFMaaIE6QIqIhuWLFHCUPawQCLiCk5oBqWv+7nbL/PaB8+Ab0dnWMgYN1nh + ck8MHE3rP7LMqmuAb9r7NNy5r6h13kAwNkXAA0ABolhCqCAjBY6UshoQBVSGyjTiqYKIIebN16M3 + wZjM6zDzZopDobQxu8YJwyV4QLJQlmP5ZmhnT0awk+fNYKORh8D8ZOIht6TvfJwrw4epTUEQL3Lq + xREppcfWD4Q7Elg/+nA/QT5lmrjhnrgB69ZsjCKc6CDW8jIoZYTrPqcnbZ8WOIqR/oMjewxSmoyI + TCGVIkF4tNrDqV/gxztoEPdYBS3Egz3JJTedBocqpjhifacx/MsafGjUfNzqU4TATZRO3Q52Qcjz + uIfGRJEbICocJq513sLFjU0aDnMxTjkkC7BoDImQuPD7E7udO6gsFLW2qqHmmdTFUUh3evbgij7T + 1Zj65skQAhDHh7FnBLMYPvvt3LWcQrjF718TXxyGol6Ajro9tldrEyh3t6MBMUuhoxVywmJuCijT + pvpTNiqGW08fAqKwL8pi3+1d84R83jyhuem4jBAYKIpCvRByEIJ8da+eJvVfhczFTA86lJyU5iej + /4SE7aAfiYx0OPufIxsAjuD0v4q67WwEUPgE84K8yzQM8qHiuEEHlOOEcREOOvySq35unVKT6PpU + /idio5oJQ2CpBrtAXgI95zva+aA54fPH96x9qhR9qgTCAHQHqlHMrKq9j46mEpB3BfI+PF9lZene + OTGPoCADwfeOIwK6kEaUQ13nWB0zvfFgQvj27yGDic8dTX3qMgjoenfrMnVw1yP59E2+NKs8BMN9 + A6AmNPVY8Cl/XmV1XbjmF4UJuepaS9mRAhfwaV64ynQZ8FYeKsChW0KPNkTxPdOsogSblZn3V9B/ + v/3QvPr14z9tfsJgUQls9anGB9NZAdSrIAf/MnbmKHk9qTNtS+tHdQIF48wv9zQ0wyJRgqWTvuKU + 35OZiuWs5cwRjFUuX7z14aB8bvrxdlkXtg/VXfXQRLwvY5+1hkb0UNtRiyYgQdc017Tq5vBbnyV1 + r2fWL9wIAPhKcLzM87VZB1sESJ1NwMt8JkncHybjFHx3dMyn7CBmgDjhBCg1GTtsU1XtoS7s/Fp/ + 7aB8r3zpI8WNvUio/iPizneqw1CxzsorW2e1BQh3p99/9LjQ9WDo1R0qUMDbPgye067wKjwbz9ko + HF+S/zewVT+9JVy3CqMZhk4Ko5wg5KNzQtPkTeO/rRhfVJW728uXiQvIyxfvOos0jPVMME29h++a + a82DcNM5kjGaWzQr4KPGBzwUfbYGzt+cl9dFXZVaIYvQcFzDdB/J2JfNawgAR+o0NzT5fmna5BOm + 6YI0fnsu85pQgSOlpvMaQlUieGpN9eTzmkCWY/nm5jUE8QQ7eX6u2rPxnDZ0FFbA78aO8kujsc1n + eTR8Hw1p5/TYJj1yQijckcCjsc297kLAkaFCJpxqlssJD8c2Wl4OTOUBYxtB0n7IfTSzCWQ9lj+c + 2dzrzbuoOIanGYjwgK8GsaYE/F4CLp+KgN/RVwOHyNdFQKagalBOToFgvrMKiZebI0l9mfT8yn7L + arPBhHzNdcJ320XMIHa+VRt/jZiyma8RZ9/eQZPs2vCgBupxjFlm4ekTwxhHGEbc4GHTGEZDrrbO + NyDT2lkj+MisArdVVzuCENqjgjxjEltMkdDZgDy0QYDkCPTZVDYVJsUv6xw+TjAoUUiWvzIGVwEG + x0qfwmDMMfTyZO6/PDgPjuUqPd7GBP2vhLeAwlBglqnQ/yXki75ygjIhIJqDrynsyrTcAaSonuM/ + J/4SSD9VaMpe4GEmwPx/DHkZBDmSTQuiS+j/ASOnWCUKZW5kc3RyZWFtCmVuZG9iago2MyAwIG9i + ago8PAovVHlwZS9QYWdlCi9NZWRpYUJveFswIDAgNTk1LjI3NiA4NDEuODldCi9QYXJlbnQgMyAw + IFIKL0NvbnRlbnRzIDY0IDAgUgovUmVzb3VyY2VzCjw8Ci9Qcm9jU2V0IFsvUERGL1RleHQvSW1h + Z2VCL0ltYWdlQy9JbWFnZUldCi9FeHRHU3RhdGUKPDwKL0dTMCA2IDAgUgovR1MxIDggMCBSCj4+ + Ci9Gb250Cjw8Ci9GMCAxOCAwIFIKL0YxIDEyIDAgUgo+Pgo+PgovR3JvdXAKPDwKL0NTL0Rldmlj + ZVJHQgovUy9UcmFuc3BhcmVuY3kKPj4KPj4KZW5kb2JqCjY0IDAgb2JqCjw8Ci9MZW5ndGggMjMx + MgovRmlsdGVyL0ZsYXRlRGVjb2RlCj4+CnN0cmVhbQp4nM1ZWW8byRF+568YIC9ewBz3fRhBAK13 + vUmAKIeEvMR5GJJDcXbJGXoOKcqvTzX7mG5ySEq2dxHIEqzuZncdX1V9Vfo8+zz7/n6GMvPVPsze + /XSHsodu9u4jylR2v55RrnJCVKaIyKniOrtfZW9u9vvvsvufZ1jmUlIGHzWrH5rdflsV9bI8bDKZ + cyH85s3QN7uir5rabopcCETc5n3TbO2FOseIc7e8blq7SnKlhHSrf6mWbdM16/6wR414xO9Rwe0q + AmGpcKt27d1HnGFidJpzjnJQiGVzgXPFCT8c+1hU23J1OPsjmCTn2RMY5s/w/fPsX/9G2QrWNKcZ + /GT68JNn//jJmAwbk2EQRXKNM8lxLqhW2W6GRc61YuPSdnYXHVQix0cH/ZI5CI7BjORYIJFJwXJO + wdZGUmzNgnKEpHJKNmu7SHPKsF/EXhuiWU6oIIlwJwKbR8eTkXQnEpuTKBfMWAMfrIElNQCiCOeI + 6oO8SmeEGxy15WwNQMPZHJl/OHOnqMAyEzpb7mD37/DFJfhDsljKU8nN2+HgKOSp4PYgz4nkYEDC + jWXMQRR+cVYe4Q+wtxgxhyjY3lk8wgbYAiHtLbwcOgB2aYHKZU459rBry27f1F21qLZVX5Xd4YjG + cET7qFiVPVzceS9xQa2wQuGcMEoP0hqoqnHJyTzC2Z+QiOcK3reezy0cmHGMj7N/FttqVfRlCEGt + /Va/KWxAEQMg7XV4HLZ12RaJClKA7yQOWu7KVTVGtjC7nByHMFiGSu2TwX+H1gpBWQ6KRRZrhnbp + 3uFwE8E+GRTuE6CtkNIH/L7olxvnGJbIVdXbqnaPGJtTf9FT1W/sTfC2pCoYINyPMPcS7aq62hU2 + Oc2ZILnGWmdziDKplRpFqOoHKwMECqI4PFWvmqcx+4hD9gEnH87MjcAc2Vtuy/6paX+xJqQ5Jl7c + u3I5tFX/bHcIYICQkHDrvm0cfCDeEAm5+NOb27sPn74bk9lx4gKwA8S5ht+0zDg3USIyRk0asvGa + xkUAGyARQ/BQHYtgdSdgOekt9ztlHS9iB/+tbR6rlcMfi91bmnVfOiDSqdD4UmYD9ay7FBQSrYPT + u77YbiM0ohiNbjGVadrxVT0Pr0LAutVu2ewdpsAGPFSqRTPUq6K1TuLwEUiGDrb1KoTVeH4/LLbV + cowAGVC+BPR3Dm4c4MYwS+HWly2AMtKQQBjz8Fw/Yat92Va7svdJisVuqiPczU2eR5zJbE70+OLv + F+0fYscJg3F53W8mpby3yhuDh3Js7jPfNw6fgFxIXf5TcSAAhaAsRKiJhKrtK2tlpmEv5IEkFCAI + Iw3jUKCGdhD/1HRKcRjySQVEEJi+HkAJJOZMAxuShKa+nET2t8BjWT9WbVPvyrp/a3M2ifPSNCgv + Kb4Ar5RlPZHjpsV9KeQYjyvmObngnjokYTC+xuDDxJLuzs5jyxEklMuRHN7c/jCVMqwPAE0hef7x + edFWK2s4hmMI/tV5wShrWI5TFmrgWx/MESX7U1Hc+RcR1iHGt11jl3kM4X2cG01QY/b1Mfb9ZIyB + l62BDok8pIkxKc2ZAl4NFDq1cpSdGEpCwCUlX7l17L/JnPR1sBl52hwrmbMDHqDMK63ZaV3iUONC + rwEYdwQI6mIgtkzxnHOsIyoelo6pOEfGb8wWwNtht3DiQlxEfMLHNosbnfVIIw0NMJBLDPxSNvl8 + wutjBU6UchoQSEKCAjyZVjlj3LY9H5I3dQz3iTcVjoUyxhxG+upIeSTLqXwT9DVjYAvt5blteugv + AYnFYjvhKMA/OnKUX0qaq9d4NHkfvbS5IuTUC5F0JxIn3dVVf0H/CQ0KMk2f+Ul43F0xiGcKqHpB + ewXJIudKKg16nvRZkbynOsR91lWXnmOYFMKTIHaVYQKvZBiDzgJfI5b6VyWWkIb3LhgMGxovWjb1 + unoY2pF6QVFFTPgqMF282vJh2BbtmDPluPNYlU8TLeU0371Ii0KDwBKrxEaElC4mupd22LqkPVcp + 7bvSLL4/pnHKccdLJeZrtPgW3M770OVgk+0CU++bCbOvAA32niQZ922xXnsCD7VaYo+Cuukn6lr5 + H5PQqn7r6CBH0MhRxFNfrMo1tKwrj/mkkeyhxQwUA1MZPDFVRo1TAxZHGy+KrjwmBtpQJCF+c/+c + EdEGRRfieIyKMw4t2rbyJkOxZZphyhGOi8w5NdNJdVR+t2XR9YEjjhqWj6Uj8gdnh9fFRKnYgTU2 + 3TFLkSbxSPJ1JIVok3BlPC8MS8cljZrAC8OF/xOSEitwotQxSaEISAqHDuTXISmRLKfyTZEUIoEk + eHnSWfGojDC1M/WQX0rYyWtcmTz84tEvoafmj6Q7kThhJ1cddXH2S6RhJyrDV8kJ54acEEh0dCQn + 08wHp3cT+P/U5fjK5cH9oy1O7RMzn6s4CRNmAqkZLGUnzP6XixNmAt3lgUEdQeq3GDFjyPzCNPjj + iDksnR0xAxvKCacXRsznidiqhNTYQeXsA7FXbgD6ojZ3rBZhOv3cDHaVxNn6zKS4bNeN6VLtoFag + uMNeV2355CmLoWmSqy8uVFPt7pdVljkDX56OjZISE8bKYOhkovxhU9QPpVeW6eOxsUfEOeZupicM + Ln3VbBgTA3t5jcJjNEGVvx2HXzXLwcy+XDhBB0QV8gxtOdolJVlt+Xkou975VMdBdOZvBtVuXyzd + hO2gIfb+WxTLX9yoKClW06wEeo5luQJa2r11fgcluYZPHY1+ux7wO743zvunm49ib4ZKZesIvjSD + aaVTmv9FVn9BA3BTP3uLRXaxxg9UMbJ+ZcCyGpYvpub7w/HQjCUfiOaf7m9WPBb/zOB3t9+WEWyg + Y4J8b8Ii9cKmbYaHTTAYDbnv28NuUy03E6wf2hhI6vV7zxypoF5z45BPbyrPudWRggDXiY1XzKGt + Gu4V/4yCJgITr2lccdIW2r0z59gUcXQE7y+NGWtsGjvYy+cFTDO0i6NgCBVGs5NAW1g7pAOHi42H + e/7RD1+Tgny2778Uw276beAhwp+zFs9esIgMFkO/adqqCyDmkLcFOWo1oRp2TV2XWx/EYWgOFcHw + pP8B13IxZgplbmRzdHJlYW0KZW5kb2JqCjY1IDAgb2JqCjw8Ci9UeXBlL1BhZ2UKL01lZGlhQm94 + WzAgMCA1OTUuMjc2IDg0MS44OV0KL1BhcmVudCAzIDAgUgovQ29udGVudHMgNjYgMCBSCi9SZXNv + dXJjZXMKPDwKL1Byb2NTZXQgWy9QREYvVGV4dC9JbWFnZUIvSW1hZ2VDL0ltYWdlSV0KL0V4dEdT + dGF0ZQo8PAovR1MwIDYgMCBSCi9HUzEgOCAwIFIKPj4KL0ZvbnQKPDwKL0YwIDE4IDAgUgovRjEg + MTIgMCBSCj4+Cj4+Ci9Hcm91cAo8PAovQ1MvRGV2aWNlUkdCCi9TL1RyYW5zcGFyZW5jeQo+Pgo+ + PgplbmRvYmoKNjYgMCBvYmoKPDwKL0xlbmd0aCAyMTkzCi9GaWx0ZXIvRmxhdGVEZWNvZGUKPj4K + c3RyZWFtCniczVlZb9vKFX7XryDQlwS4pGdfiqKAm+UCBW7ubW0gD3UfaJF2mCuRCkk5zb/vGc7C + IUXJSuIscOxAQ4rznXO+s3zDD6sPq39cr1Biftr71cWvVyi571YXr1Gikuu7FeUqI0QlioiMKq6T + 6yJ5drnbPU+u36+wzKSkDL5qVl80292myut1OVxkMuNC+IuX+77Z5n3V1PaiyIRAxF28bpqNfaDO + MOLcLd81rV0lmVJCutXfqnXbdM1dP1yjBh7x16jgdhUBWCrcqhjWjEmYGJtSzlEGBrEkFThTnHCH + v+5bB4TxTOuAr+vz3hr1CnyV8eQjeOyf8Pt+9Z//oqSANc1pAn+ZHv7y5N+/Gl9i40sMGCXXOJEc + Z4JqlWxXWGRcKzYubVZXJhCYkQwLJBIpccYoON7s/2a/vS2tL5jKhKTKAWvurINY7M27vNqUxXAh + FTSjEKAU00xqZZ+23ncQC/c8LjPKsfdUW3a7pu6q22pT9Z+8xUSzjFBBJgYcGOUsIFrCZ6kSKVjG + zeaDbyd76oyyYMPCngrHoIz3950Hw8ExSrIYyyE+h+XiNXYhJyiRQArk8bwefQTPHI0BRuNZhPyS + eeaXhTLeGNuAwQqS8yhCrBj2i/jQ+xG4A8Bm0/PjhDLBDF/xwFcsqcl9ijDg1ANe+I9wUwLacnUH + NQInKTL/cOLuogLLBCMKybDewg3/gp8QmhHoIXiz/dkx5JJnRHKRCA0Zy7C5EYUPztFj8QoZPtxk + eHgQbXAHQto7+dxUqErLP22IqX1NK8oeHjwyE5LNgoXqJhmlA1pTaNS4tMBMdwf4hML+NviZz2uI + jc/rP9rmoSpccWUZIpgHIFuA2rd5n99u7A1KZIgjb2dpvugLMziYCmCEvdS/y20lJYZ+2puf1zYV + CcmECk5Zv8vre+cLqEQSUf+YytTOYr92bjYpDqxyWzQL/N4Nt4eGMPlCWT9UbVNvy7q3ewENIsh5 + aw1JmaIQYyiSk/pWQRsqzXcdFkmAsJwEe9tmf/8ueJEG/xbNeh99TQAihfTEcvstEhvelh/2ZdcH + Fhy2AmAm8JEr6GLgXs4NpUXCqCkbNr9iEoM1AknIBbnQlcASLH0w/oJxCBwPTfM4S06QYLECdeUu + b33j4yh21WMBqosFZPl6XXaOO2jCKmti5ztvlIVlDUPAuqrvLQggo9Zkim+RQc6glEN6aaFmDCn2 + IaMpn0BcBF5AXtllmFqU5iOD+3JkcKppxhCCZkv0uNUXhcPk5F//dtv+3fxe3jy3GQ2VizM/6VxN + gmMYLvF5wSn/V3Uu41XchTqXpSJenCC5eVZ5LFDNMPG5UZQP5abZmQ1DwjGhZz5NOYRAwKg2CUUP + uXMBHf7exximBon4ubYM9HDepXFtPoMcU7Yf5cRd22ytu+QwS3nH2F2BXwhzMVLinKLmnOm9mUK7 + gylWiKlrns6EqnNz9NRtxUJmP1SW6ngyZz6aut6iiCCIBLRdCY20rx7GUjKmwSmXHUm8uTl10y/E + oqq9eIgM2XflQlv7WPXv3O3AUgVVG89m5uVwnya+Vy+Q9WasQl/E90i1YIlAboHjUgrjk9bsc1RL + mAOZlBnjUKbGyTUszSdXBjMUMVPLzyRCYgMOjJqLEAajImgN/Y1ESITlEN+SCGHQ/ZXHc0SEMHC/ + nkXIL01EyGeFMt6YnCtCyKH3I3AHgCci5NE4nRQhjIuMnKNBKDwSagPjMJEdKJEI7aEFsRJ5NJBB + iTBwteCQhYMUCZ9OahEG8wRjjH8vMTJSLsUK4q7BoSnUUOKz78fri/NmhukcZmpnqN6Sq2M18wln + hJQjGCAlkl81QJ7qf0d63DeYOg50KmVGrADTR50alnwh9euCZ5xZ48kPJ89PNBnN/WtUYySExrkp + ZQLqjlF10z4Ya58hb4XNW7iPOTfZeX+9d7IXKjlmyPviqrnrP3pFLGTGzSGtvfRyzLGLl+Vu03yK + aXBMqELNheH+UZ0atTWVAJ0AKtaPKlbyjRVrcBLVk+4dO8lML2oUdycLkT8TGMkGMj6SYUcEo32m + L+XCNKtA6Tavaj/8pUxzGFTUrLy4rUxvGYfUo8atm8I/DxqKGKLqwNX7fLOx40yKEckkUfz76NOX + h45jsWMHFeoyksVzyLJH53m6BSdCv6v9WQ2ZuPgc0drtd7umdRCYjvuCr7IpB2haiPnpwemp/6mI + ecQR9XqzL/wRHPQGgWm4VMAE0X7yUmA6vdZF3hbdSMhQ1+DKhZMqVMZuuA3tVky7TQ69Zu0g8MmU + HN7YmKYl9aH1qRmqYBJU8ypoKPxLKBlEB+m4X9uzOqLiZMi733dlHSwV1N//trz1t0ekutztNtV6 + 5OKUL0Nt9WM/myQdpMf7ct0vKN+bZ7+/vbz6w3GLG+Xld7tu7OsxAsTG2GcERgtJvagRrz51l8W2 + qq0/BIpZcbkvqv6XkDc4DAxvyv5j0/7py4rKlGIzLy8z6oT1N8+uLt9cORPZBOOyjYQv2Pii2W59 + pzbtgMoQq/zP2vdH08RHUK9qqB5RizeH46HF3zx78fbVzfPZKYo0nAtnub4Cdwvx3tdF2d43npAC + hJGcVeC23JQPuUtw04cJZ4dsPrsOLw+FT92sJq2FmbNSzAIE2wqMz9yoEc4VKDR8Yg60v+pcAcOX + mRCRFvUrcymKoWYQ9yb5ZzlUiNDPDZofKWBIBKiS7nT+yY8URiQH4JYOFDDSmfJojhwoaGG6WBQZ + tzA5TPiM+MVbfsX7zBHWDOjkGOGRyJw8RMCAi4C/zzhGkJCchn5ELRwjBKRz7PERwiOBCwcIEiAL + aUVX+HDy+MCcQwiE5yH+Hq8yofVzqGSRQvQrR19kQnZjM5QMQf/xUtGOeYvq/6nr7zEx4JWX6+fm + velcPwznDETDo5ZGzcfbmJkEo+P2H9BZPHVM3vwfItvlJAplbmRzdHJlYW0KZW5kb2JqCjY3IDAg + b2JqCjw8Ci9UeXBlL1BhZ2UKL01lZGlhQm94WzAgMCA1OTUuMjc2IDg0MS44OV0KL1BhcmVudCAz + IDAgUgovQ29udGVudHMgNjggMCBSCi9SZXNvdXJjZXMKPDwKL1Byb2NTZXQgWy9QREYvVGV4dC9J + bWFnZUIvSW1hZ2VDL0ltYWdlSV0KL0V4dEdTdGF0ZQo8PAovR1MwIDYgMCBSCi9HUzEgOCAwIFIK + Pj4KL0ZvbnQKPDwKL0YwIDE4IDAgUgovRjEgMTIgMCBSCj4+Cj4+Ci9Hcm91cAo8PAovQ1MvRGV2 + aWNlUkdCCi9TL1RyYW5zcGFyZW5jeQo+Pgo+PgplbmRvYmoKNjggMCBvYmoKPDwKL0xlbmd0aCAy + MzI2Ci9GaWx0ZXIvRmxhdGVEZWNvZGUKPj4Kc3RyZWFtCnic3Vpbj9u4FX73rxDQlwSIFd4pFosC + s9tmgQVStN3Zp84+aGTa1sKWHEmeYP59DyWSomT6ktmdNC2SCTAkRZ77+T4ynxafFt/fL1Bi/jSb + xfsff0bJpl28/4CSLLlfLyjPUkKyJCMipRlXyf0qeXN3OLxN7n9bYJlKSRl8akZ/qPeHXZlXhe4n + mUy5EG7y7tjV+7wr62qYFKkQiNjJ+7reDRuqFCPO7fC6boZRkmaZkHb0Y1k0dVuvu36OGvGIm6OC + D6MIhKXCjsp+7G+gZqo4TeBfpvp/uVGZoEQSkhJFEs55SqRIGE25ypJGL9ZT63zACSbGLGARaXQA + 5QfVq66xOjCSIizd2X/CtB8lNKXca/aPpn4qV9ZOLEUEuxltxp0JOU6pUNhO1evBGrATw5kdbHVx + bIbVVMER2B1c1HZ/osKTG32o27Krm+fhBBEe/rnstsM3LBWSZte2eir153eDEiAp8x/kRaHbdphA + qcgCoXo7tfajDOb8dh8/3A2HwKhgTum8WvWjSw5RQMCpyRIMIFWWBTLolTcXly7iDk29OhY+4jjI + LqmdW+nDrn7e62oIoiXGWSop4skSVPSbv8hL3Tbv/vzdY/MX83P38LZfkmUp4kz6RLGbUhJu6l1T + 6sF2gsPG2MmcWzcTsKiUcuL/lUsqRLjTv62HcIFBJLOYdA9vSiefSCUmyp20s9kI51N1JQqKbV5t + rMBLphiklZw56VitdLOpXVUY3ZAPx6BQwsGjLrcR8ue7SJhmUn4APz/lNvVAMsHJGABjGPIwNx6f + I6aJCQPWre2xJq2JohMpdePjWCrpjy1t3SIytF9XR9L3UZfVxsWC6KtTP74HgzmvshtSdJ+XlXWB + hDwx1WvigscG6vLWOt15XYJ9qTdXb0kQPu8GNws4l3lPXcvoiJXjAWvlhGwOxD/s8kI76bx4xiJj + rESD8qxcZWuPcRlbQTcpXKEAJ1NKfE409XGz9cYeZ/bHXVcuXWiLlLCZWdd50VlnU+NX7rTMj90W + qktZjC3PWJtnTr4HU+8e3rpU/N7qrGAR8TrfOZ1Nt1TKx95O561NORN7CjMfBq6y0NATZWWDD/pc + YCMQ0TkIYS7GtDlbN3X1VDZ1ZQrnw5vWFQ8aK1NgMOiiUpCbC/alBHcf0ECYL0o00LW0i0UYjrNO + YHDP0OGXWPGUMcjIJcVpplSk0/NUKQ9i2s5lTo80ePIZgMNP8PPb4t+/omQVQR//+tEALmwAF4Zi + Jzl0EYEo5F2W7I3XIY+ZH9ktfjZoBEMlwgKJRIA3M2iU5vC/H/ePYTXymeVAAwvx1jovd9aiSwFm + AhQzcVJxbAGt2f24DEOp0e2hrtrysdyV3bNTl0DdJxR8HUg/V8iKT5QE2AQVVkAmKwYb92adnKhC + MBE5McOhSMbwx9aJwiV4S7JAkhPhrCQBmkMJhz2Zk+bDaB/Y0WvCRZbyiWvciNnxBR6cHIoj/ScK + +diJ1QPB5rKaI2/1DjKnQGgKqga8SxGGcqh6OSE4IOISi4o/LXCyROYvTuwqqAEyIRzapMJSCZUU + e1j2T/gDO5pGkuI+8DEksNkbAu+GvYdVl/bmvcycmhM46SE9I3yyN4bhyOZ22fnNXSyN9j0xubHb + jSHHpWEXUGc5+J8w4Bv7PvLcbzY6AraBgvgEbIMYIfP4nGKkWxPXIUxlEkkxXws72HjMJLB9Ly+D + roQ5QBAjbwpMMBuHIrk0rOBQnSQDr/SxnboqBN53Veg8vF7pPYjaNXmXP+60Q6iII6fnFfzt2wg0 + 7dvRKxROiSi+2I0u9N4XoNwr3GkJ3ScVBONZdf5yyNXjq3fO0gHOfF385ChdHx2i76oEUB1AVJks + mfVoD3SKoj7aFiwMfvWG+phX+Ub7/nyBxDMkUwUU7otIPKMm+SS5yuLZq7L4VdmaSF+9i3zQQDI8 + +amJAO5+BM5GVE1CeuUJUQB11jkAWn9XIKiLggIYpEGruQ0qgUMeFc+Ebd7ANw5FMAHo2HhkEqmt + bp5Kdx00j3Lj8HbUl46wrqdtjlJihCAt5ddh5i82UTTvNHA1PbKDMU2/irtzc01mjciRSCkC8jFx + Txz/t/n+4LrLtMK1z22n996bVHoZ6j30FjBPO+czmMLeMvNFNVIKz9P0eQ06Tx0dgw4CIcoCzt6W + Pdh4tmLP9L4tjIfbDyRmtx/x9DnTprqtVRq650022uZ+fVC9H7UebGXMP95arOvdrnbkK6Q6kL1S + cvYiquOhJAW4S7gKcK8bmeNeSk3tx+qboi6B+HON5tSFQi3CBmu+DnUZJTkRLkZdzCLhpDlDXYhB + whPfuJEJdbndhZNDb6Yu5MTqgWBzWSfU5Yp3zlIXAiweAPI5ChByFw4bZxnKDCC+zF0YEbdsbped + 39w5fDTCiV1CfnElLjy/IICAmEB44Bf+t4v8gvSwi+L/Br8AhAsdkIT8wg+d5ReEQkni7FvhF//n + nQ3qGpeM/G90tgskAZtXSXydJAA1wCbruBBXqQF/VWpwbHXs3jIPGJOx24hU954xDRhSmrcd5KDa + IW/bz3VjeRwLg+FQ78riefiIQm6z8bAzXHhz3OXNSB4ljwi3ZDJLFVV8GjsDBC6rzfsVUGp/26wg + DYGER4IDiAAb5r4KE/ilKj8dx8QY77cv+yNGaM6Q8rY9BjX2SnrHXz+MLCeQW5l3m8wt+cWLm4Vv + COYWw/rHPKyevtkdmvIJmsBGu6qBCB1fVsuqKIEktC6Kgsm4tufeuSZ5a25NRkObly5bFymcgKn0 + 3ovRluBpwlnkB09CcMpARLtyuJPAEwYDzaB2AorwVdrly/tB1Sx8YTVzI/Inps1Pbbht8la7/Ag/ + 7DMtolqU4dUji0ShaO2xHPvX9FpnDy140z89WbaKwkR/ycOc+flrEGFjpsTM+UqdL16HLsRQ7mIc + wIIgsxAfc8Dkxthi9JO2/zvCxOpooG7baB3xA2CJbtu61hBMRDP56qWAT7jxaTYaFn3d1P5xOry6 + PF+LqrqL5A7UEWvYyeXohQy8aomAXTIQgSsAAr+LXZquCxEeUBM3cvIuBqcIy0y+FXIZSD9XaE4u + oZwqYYH4H88tR0FOZDOCGFbyH9qoPPoKZW5kc3RyZWFtCmVuZG9iago2OSAwIG9iago8PAovVHlw + ZS9QYWdlCi9NZWRpYUJveFswIDAgNTk1LjI3NiA4NDEuODldCi9QYXJlbnQgMyAwIFIKL0NvbnRl + bnRzIDcwIDAgUgovUmVzb3VyY2VzCjw8Ci9Qcm9jU2V0IFsvUERGL1RleHQvSW1hZ2VCL0ltYWdl + Qy9JbWFnZUldCi9FeHRHU3RhdGUKPDwKL0dTMCA2IDAgUgovR1MxIDggMCBSCj4+Ci9Gb250Cjw8 + Ci9GMCAxOCAwIFIKL0YxIDEyIDAgUgo+Pgo+PgovR3JvdXAKPDwKL0NTL0RldmljZVJHQgovUy9U + cmFuc3BhcmVuY3kKPj4KPj4KZW5kb2JqCjcwIDAgb2JqCjw8Ci9MZW5ndGggMjQ2NgovRmlsdGVy + L0ZsYXRlRGVjb2RlCj4+CnN0cmVhbQp4nM1aW2/cxhV+319BoC8x4KXmPpygKKA4lpGiDtLY7Uvd + B2qXkphyyQ3Jlap/33M4Fw6XXK3k2E0gS7CGw5lz/75zVr+ufl1993FFEvxqb1cX7z6Q5LZbXVyR + JEs+3qy4zFLGsiRjKuWZNMnHbfLN5X7/Kvn4y4rqVGsu4FVcfdPs9lWZ15tieCh0KpXyDy8PfbPL + +7Kp7UOVKkWYe/ixaSp7oEkpkdIt3zStXWVplintVt+Xm7bpmpt+eMZRPOafcSXtKgFhuXKr2bB2 + cUUTylCntZQkBYVEslY0zSSTw7arvKyK7bD3LZgklckDGOav8P3L6l//JskW1ozkCfwUZvgpk5/f + ockomoyCKFoammhJU8VNluxWVKXSZGJcqlYfoo2ZSunRRr+EG8ExVLCUKqISrUQqOdgaJaXWLCQl + RGdOyebGLvKUC+oXmdeGGZEyrthEuJnAeOm4M5JuJjHuJHgT2AFetcHDCU0J/IKyZgaMLSGG2mJ1 + A0FGkzXBfzRxu7iiOlEm2ezg6d/hCw4SaFw6GJdqjkcKCLvzR7pdsyOlBvdqESs9NwSqEjaOOs/t + YDfKlGkJ/mByUB82kvCLc9qYTZBFNuRwEwdXOgdGoQamJcR4h20OHeRJYeNe6pRL6qO4Lbp9U3fl + dVmVfVl0wxZDYYvxSbYteji4806XilthVUZTJjgfpMXIz8YlJ/OYHX6HJjLN4H4bcamNLoGO8Wn7 + U9vcl1uX7SIljPrMLXDdFwIwNFcQPE/E6aFzKoMjldY+nfPNpjnUNtEFmFiBvPbJLq/z22JX1P3r + 4alWqabEuKf7trwHA9860cDCLFQpeFZvyn3lDChF/DBv7Stgg0iM66Ksb62zWKqGEuDqU1U1D8XW + igA1JXq2z7vuoWmtj9cCPCGNUcka9NYmy+yepio3j/ZtDr4Wo+K1fZGBlWSoh21xe6hyaygBt2Va + njXUtuzy6wrkv9gWVRHqr4GE0SQI2zabouvG0ndc5iCWIYIhvVIOSoBEEFcqEaiUS8c47AEulKCp + 5lo6YKj71lV4qGeEah/Tf6JqQc8vF1fvry7t+RnAjfBbN019U94e2hGONEgllAl+bT28ca79al45 + jAL78pCwbbFr+mJ0SUhXcIk36dGDRd/m211Zl12PQt0XLmoA+BhlZho1Zd0X7U2+cQG8zpI1M+Pj + f+ZVuc29SJBOxvh87e/yPlwtjHrSSGXnsPfIaK5sSZNyzf8vBoOb62KDvrJPFdxyJlOWr66bem03 + izgI4fyuqUK4RUm86BQgRIYyesoprhiALU0oK1BxqsPWFxEoFJoEu55Uu28WAjqvH60GbGohly0Q + CJN6sW+6sm9ajxYKSwPlT5ruTdUcHDKJuMSMFddmDI+ccBSSI+zZEIZylKw5IKwxYl4QZGpMYIJd + 70MX6lCgHZKbVIqYJ/mVY5okMS6FxawfD7trBysAAUrzY6okYg56M0LyGqo1Uq2Jh5+LzI8zyhVJ + f6yQE58ZDVwEqJyULBUCDh6sNLkR9eLZ6RszGouEdjyMRMDRm1GSmXALNCCRkM/GSzNlx6MmwBLI + 1DVuZUJ1X+DB+NJnE10xt/oo2LGsE5p7xjuLrNQTXUmh+4DyAsecIbocKhEcrc2U8cqBQEtE6xTb + EDwbgi8+m2Z68XC77fThwefBDjPTxMz3TGgE3is0GEkApAzEN/z2JPMVGcgnGPs9qK/AKiaBQIzU + NyydpL4Csm0gx59BfbeAb/UAGcC77AZoIIgkXs8nOMwJgD4Dma+DFFSqLwh1WsdoEWq8AzgWA1wA + oLXIIGyhCk+LJyKRFWfi12W63RWbQDOAwBAm/TUPZX/ntYrq+e5Q9eU6ACAfS/qmd8yEo0FlIA2H + /g6ArNxEDBBiUWZesE9Iij69GucGakAzpkUqFKTEWjiX4uYPKK8vwwrwDkPdnvP2vohY+Ritf2tu + b4EOvPaoDH2WZ00/Q3wUD54raLSmHtHfJQ6FekS8sJdV0fb+hSfo+zDKISLQ94E1mjl9j/IhgzqD + Ga7ZWSKvvyqRhw5lX7TVY2C1IzHpit7PjuKO0k2oVJwvXewpjP8x6IrgKezxMuNPr6yngspchuha + JL2nOtlFrtU9dn2xs2fTCXUGunvvBV1DgU0Ng7MmRP+zjHuiwnxRwxx3DuAg543pCTnO8TqPBNGV + kJy+LEQlray7DQTBQu0q6vuyberATZWZqLzEo0H6MWimunZRIdOGTwvZw13hahZXcfzn+z308qHi + I3yNAXrY3IUGKyre3bd/vm7/gt++1GTQGWC/Zzf8A0LpItiHED5Gx0tahpNBtml2gKpBY0x08nS8 + LjvG6Y6lFJX5zimzFsC6GSdyasFL35rhBNjEAe/7O5QyujP/T1EvRM/1oz8m4ob5Al+8K2/v1iEl + x6lwGBK5hhZDKnS0mMaozBunjBIxDv1Q32OXHVwzph7EFZjCaogjHcnlOaflPbhn33d43fc+EFTc + Iv40lRTAB4eh4siwp2dAm7aYTN4jTS6sduCKAKbNtryJ3PnWiUSJiFnMiGwcGUZcFhYSq893UL6h + XOCJV+5EqGpjwH3v51QL7GIREZ4oWX3TOCY4zbhP3xT/BUGq4luf4jqVGpjuxI5nCt6nV6jDO+8o + EQ+OLuvAQyYE5X1ePXiuM7SiRk8PXaiiR8JKFYfZYY8jHs/8cBRDfbnbnbwLKLIdozgGJ+PXuk1e + L5gMu2IgY53VetbdawL05Lf19gz+YxShUWsYlo57QybxJf7Hau9jBWZKHTf4TOIHTlx/pQY/kmUu + 31KLz+hQpKw8Pzb95RTHJo4iSH6njvJLk17/RR6N7yfP7fZZNvdCJN1M4knDf9Zfy225a/lRYA0v + SHL2sy1QHntyZKqzrjwSd65C3Jef9egptk8RZcDPzxjWU8ATIwU/y/Gzr8rxOVkHQj1mwjZfmniW + u12xLX09wWlr9GHIPeR6HmXOdBi7TG3MCy5voZDWAVAlxOvYc74Uq0a0WUvC0H9HjBMQYnnQ/yX5 + /xJvwnnA7rDzeEwIe9p5C/0WmG8Jhx+a1vXxiLCjLT7fds9tTQA185EKhheOO5YQXZXvwDB78I8Z + pozLBlrlRyIivurErMK8wE5f0B7ueBmTslMfa7Y4SqsdWEZozzRLMybYb8N7BaxPTSbBfuUYGzKW + Spx9/JHAPpL+WKFjqNcyVTITXwnpR0Fmsi3hPPRU1AtzBuahaZv6x69MQP75boyvfjbC0znAj3Id + izqB9zMeehLcQVScCz8D3DU0L3wR2IOYM8ljWD/jPjzxf/F3/lQKZW5kc3RyZWFtCmVuZG9iago3 + MSAwIG9iago8PAovVHlwZS9QYWdlCi9NZWRpYUJveFswIDAgNTk1LjI3NiA4NDEuODldCi9QYXJl + bnQgMyAwIFIKL0NvbnRlbnRzIDcyIDAgUgovUmVzb3VyY2VzCjw8Ci9Qcm9jU2V0IFsvUERGL1Rl + eHQvSW1hZ2VCL0ltYWdlQy9JbWFnZUldCi9FeHRHU3RhdGUKPDwKL0dTMCA2IDAgUgovR1MxIDgg + MCBSCj4+Ci9Gb250Cjw8Ci9GMCAxOCAwIFIKL0YxIDEyIDAgUgo+Pgo+PgovR3JvdXAKPDwKL0NT + L0RldmljZVJHQgovUy9UcmFuc3BhcmVuY3kKPj4KPj4KZW5kb2JqCjcyIDAgb2JqCjw8Ci9MZW5n + dGggMTk3NQovRmlsdGVyL0ZsYXRlRGVjb2RlCj4+CnN0cmVhbQp4nNVY247bNhB991cI6EsK1Fze + L0VRYHvZNEVbpMkCfWj7oLVlR6lsOZK8i/5NPrVDiaQoS77k1iTYC2BKJmfOzJw5w1ezV7Pvbmc4 + sT/Venb1+DlO1vXs6gYnOrldzZjQiFKdaCoR08Ikt8vk0fVu92Vy+3JGFFKKcfiqXf2+3OyKPN0u + svYhV0hI6R9e75tykzZ5ue0eSiQlpu7hbVkW3YYGESyEW16VVbdKkdZSudVf80VV1uWqaZ8xax71 + z5gU3SoGY5l0q6Zd+xHcREawBP5z0/4X1mWKE0UpooYmQghElUw4Q8LopMpmqyE6NyQh1MICiCjr + Azjfub5tKucDpwgT5c/+gnSnU4aYCJ49rcr7fOlw4ghT4p9kdt1DKAhi0hD3qFx1aMBOnGi3uMuq + vFzmi24rAYcoD3lRrj2ojCsPUQUnZA8eO4yN3yndLicszbf3Wd3k6z50CiPM2SmbrAdNvsqz5YQX + dbbYV3nzb/tozhlHhhqVzGELZbR2IMAG9VW6hZQp8qzu3tXJnJr+pVMYLvMjGDYv0ubrb+6qb+3f + 6+u/vmzfMfCO1h6hX8p1dyKcFiGRVt2GFCOpApx3Wb7tYGYUyTa9IpgjBPq4+JClRdGhIAE9ydjJ + OKTb7l3IVKmJz65d2VioU5d5GinMjgCtNDISoDsPtJFIUawuCeYSTvDuQzUYwgPOASxMhOxByfKp + 3NtV5SKr6z6Jg4fTqLusTNeNM0sqxMLTIwgulxWc4b5gCa4r5TkzBphK82TOCNLGTJS0QMYEtqqb + tMl6ShHJAzDEz/D3cvbn3zhZTtDMs8eWWYllVgKeKwEISkhazuHhZkak5RveLxWz55Z4CHAJkVgm + wKOIMiXa83/bb+6yykdcKqYPipHH3LpK88L5PLeJBow1SIHFvgZmdvsJFWMPcO3KbZ3f5YXPI/CY + GmuLpAMHRk45D6C0gSSVTqTdmmnSYTs409JT8GHiTE1ioyz6+9obIxSETPHYlrF9zpaIvXEioZC0 + t+emxwj27J3BBqI3jJBfsnu+XSjjg0kXMCgSrPQpSiVj9CPjRgbbQy+PE5SWJXRE2nwlitlexzBB + mBmwlyFiREKFVQRtS3w1I8kc21+SuNeYJCqh4IilQEJFstjAa7/DT4hQb+/YB2vFxaEUynZpIBWh + GVgulH0T958c4lHXxn3chcEIsk0exn3IR5cWRaBMm6LGk98ya2DjPkeh7Dp7GRAN1625CASVDisT + GepegMInzHSlSpCvb4iRr+/jbXCZbcDQpkqb9K7oXtASYYG9lye0hu2TgUO58c4XoTWKWFN8+q1x + DtmDKBgxJL9Bj4Q3IuvftTV+qMZ1QsZyKAx1VsSCdBXYajhKz2lXij+odl2U21W+3lceP2gEKoS6 + yCqXgTIGsNoXWa/O+r4RZgXbZpQZq1eXigP1ejb8nhqkNr0gXhT7pd9uziVGlB/Iql2V3wOzrL1j + sLPpPVssyj3s/dXEM0i1B0gc98gGg53OjWmN36QbW0neRgoDFCGEXa6fT/JC0M9ePmvgTsH94dd9 + 5HTc145FbrpQTuVGXXY+y3j7I4zV5lEdWEid4aymytfrLJyKY946m2JuQJpzUCzCsIOkmP76tFBe + lUVRPvgAghmYBu9fD7MWMCbkbNY+vMicv6DToxJPdzCyL2x/CFHNXVQJ4KssSeCLczro956yF1XW + InPloIFqBiXNhtBsgPNXYIZ9sW5tCEZgy4/ajIy4+ilfv+iyjyJFsH+jyut/OkAJaHYZ2HjRwDdD + v+aDcvGBgSKwisctQgV1Br3uLPImwbTA+tsIV7G9GjfDWLTfvXdfVYA9UyR+IWRmHytf03MB65Th + g54VittufR9NsMGfJz88fd7tS2K6vfrj+qZbhgqhmpzLmb8e5T1rg84bVaY7OxqlKIZ0tJc+bzNK + BXHKgKSpECSS02HpUE4zYwldf1KDUWz/yKfDwYiBbCXcCdL3PxhFtoztmxqMmIXO2/M029pWd72D + Af3eSalBpBgojoNI+aXBhPRGIY0twJdOSGIchsi4kcGDCelswLA9CbSWbOkhmo6g04BlIjk/HHHN + kdZcSSD5MBxhUP92X2H5EgnaKjmI6WBviqc3F2c2DynQ4zDGJp68LsmV4V2o9EkDgpIb1QnKJ1to + ddFdL9gG9nmJ/zzuXhIIrm8xzzx3g3GiFxS/ptt0nW08WZ4QwBTYRUAreKN7XJgKkLZD0TkxTN6X + GD4mVSZS3bagMGAwE9d7C3Lhe3rEdvkB/nIwfZ3QvEd652aIf3dfZrXKUPOWICT+vYpv8hTYK4WP + bt4tEv95WS72dlM/CNm2Gtr4tNoFoQVSJa9feN4mBjgDAyTvR9l+vkFRLOr/l4YChKq0tHEgVN9D + YCJJABFSoAffTREQGJOlhAmmbx9h6bB9EK0QFzDjfUqSIHZg5NShJCAaW/4zH0gSRLaM7ZuSBITb + ayNnz5G7UgKikhxEyC8NlMAbhTI++B3uSmPjRgYPlMDZOJ28K7X2ckIuuSuVNkuVbnl01LEje8c+ + xB37bCjDXSnBUOqSiu6uNHw6eVdKAFcJiXgY9//jrhT4UcnBXalfOXpXqu3ZspONH/+q9DNpHDCR + QxqbQ6b7GN0cwm+L4D9YiusGCmVuZHN0cmVhbQplbmRvYmoKNzMgMCBvYmoKPDwKL1R5cGUvUGFn + ZQovTWVkaWFCb3hbMCAwIDU5NS4yNzYgODQxLjg5XQovUGFyZW50IDMgMCBSCi9Db250ZW50cyA3 + NCAwIFIKL1Jlc291cmNlcwo8PAovUHJvY1NldCBbL1BERi9UZXh0L0ltYWdlQi9JbWFnZUMvSW1h + Z2VJXQovRXh0R1N0YXRlCjw8Ci9HUzAgNiAwIFIKL0dTMSA4IDAgUgo+PgovRm9udAo8PAovRjAg + MTggMCBSCi9GMSAxMiAwIFIKPj4KPj4KL0dyb3VwCjw8Ci9DUy9EZXZpY2VSR0IKL1MvVHJhbnNw + YXJlbmN5Cj4+Cj4+CmVuZG9iago3NCAwIG9iago8PAovTGVuZ3RoIDIzOTYKL0ZpbHRlci9GbGF0 + ZURlY29kZQo+PgpzdHJlYW0KeJztWduO28gRfddXEMjLLmDRfb8EQYBZJ14kQG72IECQzQOHoka9 + S5EyL+PM3/hTU012N5sSJU1mnNgJFmMP7CbZrMupqnOaH1YfVt/drlBif5r71evv36Pkvl29fosS + ldxuV5TTVEolE0VEShXXye0m+ebmcPg2uf1xhSVcpAyetatv6v2hNFmVF8NFJlMuhL9403f1PutM + XY0XRSoEIu7ibV2X44Y6xYhzt7ytm3GVpEoJ6Vb/YPKmbuttN1yjKiWE+GtU8HEVgbFUuFWMhsXf + gqOp5jSB30wPv7l1mqBEEpISTRLOeUqkSBhNuVZJU6y28/i8xQkmNjBEJdI6Ad6Pvldd45xgJEVY + +pf/gpBhldCU8uDan5v6wWxcoFiKCPZXCrvuY8hxSoXG7lK9HcMBOzGs3GI2rqEUIammwO2z0RgK + NkrqL+SQoqx6XI+bk1Qo6d/70ZtDFJhPfURNNWwWEifgoSGGw9W2yPvGdI/eDyGlf7Ax7U/jfjjV + WngfsrYt2nZfVGP6hISoaA8S0w6La6Yhq1ioZA2+Sq3UaHzWNKbYjO9CsZF1P+5G7Cr3kc+6hXCV + RdZ23k+hcLi5qvqsLJ0nEALKPTo9CiFNiOoLYe+y5r7ovIXgmZDkSjSqrHxsndsWTlM+3CL2O2zq + vLdhc9sLDQhHwZpqswCyQ9HY5Lkn1gy5OloTPUX1V3fNr2M0CpVKJK+Dsdtl3S/tw/bvzQ/fDrco + CBxn/umb0QN4jEr9fwJNTqE1SEK/ADRTH+1Pf3oX/vnWo1MT6MXae38bQ3FIHPWX3gXvbQ/2L7lx + SAwp/fSdyynGApI63biQ1Bnw1xyhlHAYFbMQfdkKCG798I3xfoEhVCl5KSVLVb43ldn3e49TFKZY + 8VA0I9woieGGxwGARZzUPQyMXevnhVCnQ0/GEZ72XjOpU86OAGiqtpsmL5QJCVD4uCuawhdcNJgW + O1iTbYwtKFeiMA5hpJJQotOQoxB9HrxZbJGm2vRt58xmPL7/rvBIF3FZHJos74z3YvbEMRiqeqmu + TOUJQ9RZDmWWF59c8n32JY09uxwjCDkducws5puiNffV667Id1Vd1vcmd1HD8H6IqYd4afamm9oU + R5DuwE3ypsi6YgkIS/k5U0SLxMDYZG363FT3vj1CbvCF3R/6siqa7M6Uvm8KwKyWdNqxHt9OYih3 + u2IhFUX1YJq6sgX7+tB3frJDaRDKjiLZt0XTLlTOclFvsi4LDUzpEK+lArYBexVy75NvWwfV/p7+ + 4DIDrDGqm7ZvDyYPWbN4wfQS3qE8tmY2kFQ8kBaTZKdeU+9NO4bQ8u6RX64hSKmitotSnCqtF3gm + BwyE7gP13xUTz+XJR6Ctv4e/P67+/g+UbBa477vvLeHHlvBj4NGSAzq40ilhQIX3tmEBCWbTUrl6 + b9kwBpxigUQikE4RI2R4/x/7/V3R+P4TlZ/3m8WMf5uZ0s8LARGhR4jIoXPUe7cfl3EnaIoWEtaa + CKbgMdEMgCXIzIETp5wHREtg7oB7MCgFd8Z3vpm9EyDCgg8L71Q4NspGv2+9MVxCyiSLbTm1z9kS + SQqUcCAdwtvzdooR7Dk5w1kqjzLkl+yez0rl7MV4oTcsohefRj8y7sRg+9Kn5wnaJLN4xQNeMXQh + EGAUYdvFBnu11gnhVqgOOu3DCidrZP/gxN0GFSsTIjjUDxKEJ/ke7voL/IQETeaeumCNeHImubTK + EbofB/LGOGL2TjT9zwU8UpIoSjuFhxkwtKO0Q1wQCn3qqTVh3DjROCawm6KDjSeIQtUN9jLF4DZQ + 0NbeFGS+mpYWIDrewZGCDgItZEBB6gsckuQL/LzA3RTAfYAXQBe/K8cblGWYyPt5RXSEicD0JSrz + vyM01kzgBUZ3RHh+Vr8vUr8XDn8YBI4jfvXwB7ojs0OZCX06i4/OfOiCQc868zmD+P+u9q3yst94 + kipjItQUZfGQuacghYhw/1T72HbF3hNo6JlE8aMhD5VYV/DO9tXIySGIzFsEzjXmn6+C2AjHjMvZ + PuNXZ+l1cIvbqIeNQBeMwVsTbAfQ/Fzkr1lpNp5SWXBqTS7nZJkHf5FMnRzMDJJkOo19P+WGnfDR + ISXe1uksyDUCkPcs1UiRI3lftHXfeAijGN3ZdlvkULnWHn+ooGBne8DnTit2Nk1tqIyoiy0mOxYq + MO0cegAkEuO5tfO2VXzozUNWBjhAo2M+E9a6N846huLm+DuYF3kXgMj4ZXlSmp+K0uzqejMJh9AJ + B1TnhT9MgjFKpDzq/FdMt4b+xhmqQSMDtQlhdAC0IcTeykFhRufuUYk++UD5DBab4t4AkJoJSAG9 + r0cAAedXn6FCY10E4FIYyNxzdFFgmhTmn+JKRNw4LB1zY2r1DMf8q5I5sQMnTh3LHMgu3EHwf0jm + RLac2rckcyiSKfH2nJE5dic6z1BYmsmcfyuV8YtfIHNi404Mnsmcq3m6KHOsvaCynyJzOBEpGQrj + ROVE1p56EKucq4kMKgdEAFB2PaqG6X8XVQ4BEqCsrPgCKodAj9YCEj+pnLB0VuUQqHDOqf5KVM5X + xC8WmKCf8l7SAGq04MskwU1s23ymudnFJMC6OJ3sPZcEmGFyv5oYOr48ul8yoi4IDGg9KcbsKQID + g/RmXJCrAoN9LoGx2PHOBGIPiu2+CJGwZ+gBToemhsS2DhuWWk08I2sCciMAnj+sd6yfx84tZyw+ + rKYsVsXuqProTByi0Jmt/5IiRKoJPvpQle+y6t5D3H4MpfgqaMa7iZyhZrmK87ovXd8jcYpMxDJV + HKZHKJlxHxEvR/KKzT7GnfsYUDT+q479zqAxCwYNKHOUlMJbMLffN2Mx9GzpeuUL8d/q3jPW6MvH + LntweNFPqM7ngvI8/Bayc+7gaWiWfnu6hNc1hzeA9D3SS6PV7kESq8tzeIJ31bnJwhEIiqH50XS7 + EMnJnYei2tRNOGCJS3IRy3d9ayrwyKu4aJIcsqaDftvOVByLBPtyLnPXHuefjGZ1aOF7tc6HQLuy + BfFIBPTCn8sWytbm40QjYeWK+CUaCUY4E2DfxKv9yjGthqImlqZ+TQIpsv7YoWN5ZDWOcPru86uj + yZAT25a0EZSp8sackUbUEtdZYvzKTBg9PX/xO1+giiK7jk2daaIrqbmoiIB0EjDhCYJIKlt42J4p + nyiiydIT42M9dCV1dsd/AfBSE3cKZW5kc3RyZWFtCmVuZG9iago3NSAwIG9iago8PAovVHlwZS9Q + YWdlCi9NZWRpYUJveFswIDAgNTk1LjI3NiA4NDEuODldCi9QYXJlbnQgMyAwIFIKL0NvbnRlbnRz + IDc2IDAgUgovUmVzb3VyY2VzCjw8Ci9Qcm9jU2V0IFsvUERGL1RleHQvSW1hZ2VCL0ltYWdlQy9J + bWFnZUldCi9FeHRHU3RhdGUKPDwKL0dTMCA2IDAgUgovR1MxIDggMCBSCj4+Ci9Gb250Cjw8Ci9G + MCAxOCAwIFIKL0YxIDEyIDAgUgo+Pgo+PgovR3JvdXAKPDwKL0NTL0RldmljZVJHQgovUy9UcmFu + c3BhcmVuY3kKPj4KPj4KZW5kb2JqCjc2IDAgb2JqCjw8Ci9MZW5ndGggMjMwNAovRmlsdGVyL0Zs + YXRlRGVjb2RlCj4+CnN0cmVhbQp4nN1aW2/bRhZ+168gsC8NUDFzvxSLBdJ2G3SBXWQTv236QFNj + i41EKrw49f6a/al7hnPhUKJkJ03SNHBsxDPkzDnfuX3nyG9Xb1ffX61QZr/a29XT569Qdtutnv6E + MpVd3awop7mUSmaKiJwqrrOrTfbNs8PhSXb16wpL2KQM3rWrPzT7w64q6tKMm0zmXIiw+Wzom33R + V03tNkUuBCJ+86ppdu5AnWPEuV++aVq3SnKlhPSr/6zKtumam37coyonhIQ9KrhbRSAsFX4V43Hx + 76BozrN3oO4/4PvX1X9+QdkG1jSnGfxkevzJs5fPLRDYAsElz4nkIpNc54rhbL8iKP6yW72y8Fm0 + MLFw2T0BqgEm9uKfimpnNkFOhLTyEpVDB3AYpx6XOeU4CNua7tDUXXVd7aq+Mt34iMbwiA5YbkwP + B3dBKS6olxHzXDJKRyFzsJialqKoOIrqn2CAFdzvkMod4CzHkgbrvGibu2rjjcpyRDCPguxB1L4t + +uJ65x5QIkccBT2NfTE4BAclhMZ+q98WzoKE5pTpqH7VvXHLONdahKf3RV3cmr2p3TsS3pHB6Ie2 + KU3Xeag4AE14gKpo3d2grZDxjaoOfiUkDbIedkVpvnXG4gB3dMOi3kRBk9XRQPfueUAF03B634yL + a6ZYTgTYZY0hiLRS7m4ApK9u3IsMp0eW26K+9WowlUtE8UURLFbuaSJTsM5AWzbDzjsjSa1Y7Q9F + GaMpgem+GZyHQuwny91915t9lJ9K7TeaGwervRWriHVv2rpw8c0AcY1ZFKju28Y78uiZwnrmmkqW + cyRVtmbem+zTr0w5tAFxQXLCSPDQn+tyhNVtoRyQD3e8dOFkpgxwHO2Q9iBsBeE50zIDdCGYRMZo + ziFcW7O6mWfIKYBUJhjkAap99huVCWoiLAPufyF8wXjno+pC0CwiXLg1BAlGhjUIyeqmCrlHpwmm + SsGCm8UISJp7/M3WVppM0VE/HSNtM/iYUiCFRuHY19/8/PLF6yfuQusWKAj9ruq3DgCWxpu1fvA7 + MDTKCQco57FSQwlwVcMFJuRWRDSNJ+z3Q12VU1mBiEOUpzK794h+OKBbUzZ3pvWBCS+wyeN7c3Be + uiYgKCY0W8ORUc7ztjwTQhfM06Vubs2Tpq3PbLlm6HdVXdW3ISUl4G6bd04xniJ1Rt+mvS3q6r+T + ocDgIteI0bnBnRqbbkENn1WPk4tDpHNm5ix1jw5EjLJDjRWYXpS9csCCNSKlqTpfKGIZgnQG32bj + /REOkPSiW51JxkuX1eVu2Jjuu//99br9m/1+5q2CoYozhMKDPyb1H6p3UnoW80O/dVZfcwQFSWF6 + HGQf4lW9KfaBaiGM5UyHgDpHUMQieGnA2wxJEs1jnFu1v/dqa0BHoVBdnvmireb3XaguD2eH4Kop + p4Ho8+JTkZ43wQgvaEH0o2FcdgzzWyq6SFnLQ6IvxkJrduauCALMzjsUbaSSR9lmKH1uhsqv4nLh + /V6kNeWNcUmJkHS164s3ZtvsNqb1UQjVW6JIzor7yNpsUp1Y7HVbhEi3TpxwNg8XAC1zgaH4zYAu + yrdD1cbb+Mx6rbkddkXf+DTORWqH62YTUVDpxuvYahCcBKT5rYCOxoTkl/iCJAGfBLQt5D5/Ok0x + jm2MTMnS8x9fvHz9xOnAeHJrNxxMe1d1QQcBvqRkrF1Dv23asTP4NjAhRCNX3wAyJajvN8e6qgQ9 + CvnQfnQ22n4I0Tarra9iyRvJreYXlYGwru6mduWoer6Hj12IonJXdB1UzTLhA3L+RDMmZ+tvfhuw + YbGFAPluk3fnjcKs+q+ZBths6pl73hne0A9tnaS8RKLFQK1trtstZO/roYPS0nULBzXgE6PsflMn + dWdjDqaecq5Oa7tPH3NHDZmM2Nt5XL0/mJgPp+UzpD4x09T+AnMnucYacAMiobRmp9SYQ6cSG39I + Hn2k5hiCEjprnDEJjsLBNHsrONBwNi35PhZDrscC1GRa5Qz4/njcv4b9tW+qbbxOXDMowdKpw83U + na+hhbYRuBglDtbzTfp9UIBoqK9UkJkCJ0p5DYiG5EbB8Rk095z5JmJ2pY0iqs5fqfAslQOWwzQU + kGAAyVJRTsVbGApkDDRFXpxkfjGzDwQmPrJPWLJHfpghk3vxQkez6If4FPpEthN57Z2PNxIEILOt + Ih5bRQzxBv0fkGPIt3oUlyGeEW4nZWOb+HYFlQrZfzjzjwHnlBmVwnakFHJ4uYen/g1f0TyTuKcq + WCEebcc4qWKQmhUXwo2q4m8e76SRTYZWzLZmlpweWf1zTK0gkVnwk6FVWDk7s6IQ9DTMBT50ZhUm + VmAd24c82HufIfJfRfetUK4pFl96931hfkORhsqDH5zfEPAeYDSEU3xam47GNmJBzo84ttn5mbcl + fzHG9saWMF/laVoALvZ281L+UVu6bXFnFswIBjPVnffxOTsu6nrwBAdcC6qb1keuBeGXzBXIvM1a + DDNT24DtIl1O49IsiX2mRxrnC6FFevR4welCoPNRiMnHDn8eSCbfHbf5CrItZ0GBZ8E/7EclWn+t + /qFJTuD+R/vHu23l24n51P0LcJCECBM7Thagze8iwsQO6gUVCX+KS8f8iYCDjYX+SyLCqQInSh0T + YQKeqLkkn4gJJ7KcyrfEhAkUdRbkOUOFsbafcs4sFJdmVPi9TJle/Du4cCrcicAzLvygnS5yYSuv + ggB9BBcWkNWRhP9hfUqGE3lPdUjJ8IOmjGQYLoL0wpQjw/G3i2QYS5uHpfojyDAmEnwATD+x4bh0 + lg5jCH3pP5r/o9nwV0Rq1gxk5fZvHo6mQLF6WWqfQPJnJDWXPhKF18hjCLWCBG4/XHmIT8tPyqdb + eMHED3zGj4Lo8Uh5fvdw2EDzEgymkz8p+JgeOP59hLm9D/ZJhqlx0s0EZLHjQfemKQc7y0waLJIS + xOuiC5lp1pi9x8wPnK8LM8U5+jtTtHVgb4CaiH3dTds41yRyNis3bVl1cVieGD5MjOF8Wy0WsFxD + rsi5NddnYdZXAQt29NHVp7Hu3Om64XBo2j4d106T3AcsXsWYtWXz/4sFRvIKZW5kc3RyZWFtCmVu + ZG9iago3NyAwIG9iago8PAovVHlwZS9QYWdlCi9NZWRpYUJveFswIDAgNTk1LjI3NiA4NDEuODld + Ci9QYXJlbnQgMyAwIFIKL0NvbnRlbnRzIDc4IDAgUgovUmVzb3VyY2VzCjw8Ci9Qcm9jU2V0IFsv + UERGL1RleHQvSW1hZ2VCL0ltYWdlQy9JbWFnZUldCi9FeHRHU3RhdGUKPDwKL0dTMCA2IDAgUgov + R1MxIDggMCBSCj4+Ci9Gb250Cjw8Ci9GMCAxOCAwIFIKL0YxIDEyIDAgUgo+Pgo+PgovR3JvdXAK + PDwKL0NTL0RldmljZVJHQgovUy9UcmFuc3BhcmVuY3kKPj4KPj4KZW5kb2JqCjc4IDAgb2JqCjw8 + Ci9MZW5ndGggMjU2MQovRmlsdGVyL0ZsYXRlRGVjb2RlCj4+CnN0cmVhbQp4nO1ay47byBXd91cQ + yMYDWHS9H0EQwJ6JBwgwgTPjXZyFWqK66UikzEd7nK/Jp+YWq26xSFFque3MeBHYbrSLpar7OPfc + B/Xh5sPNq7c3JHN/mrubFz/+QrK79ubFa5KZ7O3uhkuea210ZpjKuZE2e7vNnr08Hr/L3r6/oRoe + cgGfdavf14fjvlxXm2J4KHQulcKHL/uuPqy7sq78Q5UrRVh4+Lau9/5Am1MiZVje1Y1fZbkxSofV + n8pNU7f1rhuecZMzxvAZV9KvEhCWq7BK2bD44jXNKHNarSTcz7Vm2UrSXEs2bGuKh7L4WGyHzbDO + pUbp15VfZRxWo3z9cbvuwn44UFNiw5PbdRvWucoJszysB+0paG8oileU3X3R/PFPt82f3b93z8p3 + 3w3brDtTmLBtX7RtXbX+NgGnUhmfrJsK5QAJlUTD7pr64AXXOY+OWnshSE6IxtO79e3e+43ZVMeu + 9q5msJvKKPKvRbMp2yLIiwKvBAhmhQW7UsCNNeYrS94U7bGutmV1NzxTDAzEbBTV6wXnCGqi5xYs + XlabcltUHYqP8hsJqKAUndXcravy3wNo1x6f2uRERrRt7tfVXdEGcBEEF9cE8ApYWHGaG2tFiI6q + awLMhcytjehvO0DRsP4XCMVcZh8hIP8K/97f/OOfJNvCmpWAIGfZ4afMfv7RhSp1oUohArS0NNOg + IxGMZQenrbRGjEv7m19cnFPBcqqIyjSXueGSDvf/rT/cFj7ShMmV5mi7eudtJ9JY3a3LffDYSvHB + NxNnb/oWIj2cJ8F5Mprde68tb8t92X1CjZkVOeOKTRQ4USpowKzOFQfUamZyCxHqbTu5E/Arog4L + dxqaCuWs37cojNTgMi1SWU7lC7KMfMJIpmCXQHlejzaCM6MygMBcTj0Ul9yZT3Ll5GK6ENnoxUlY + 0BPrp8KdCOwuvd5PJFfC4ZUOeKWau9TCCc0Jt4O8GhiCSZdimuJmBzmIZivi/tIsbOOK6oxymxOr + lVQ82xxg29/hD3ookfdUByfF1a6UWuZMA7cpCb8Izt1OMv4vWHxMkjHU3S7gIMJBwJnfwTCEWDT3 + tUFRBjaxDqIWWW9bdHDwiFEIOy8vpWBjcL2TN4cMbcalBYyGHRD6mmvpYZBjhIOXMMLfNPUD0OMC + XW+LA4jaNTFXaGdGTG6F+xRmf5c/laWXqLm9rz96W8FeoZFVIRkuZBykbJRKDZSYWjDcy+CRHam1 + AW69+4QpmlArY2JYSultfzzWTYcJZiUIyy0xs4S2rTf9AYQZ6xkDKJACVSjbULdECX+fymLZlF8v + HWMZgLmDUI2XYOkG57uoX3DiAE01ZEyhLaQ14ImV85Ek3sqv+rasQFaf6oHVlUZxXDItqx4ZHQJY + 2kj5b/Yh6YOFhDK4/O7Zq+/fhEQvzMz83IUNQeF/KNt124VwhWijDC30c7GpH4omXAtOZ9EY8doh + i88zNvAGsIUET9hMOmYBS4GJgds9B04JJgatyaRwNEQXigiW2vsPzCzg6HwoXwjWxYRxWJeA9xLR + MbBe/MTEU9JZRYplT0mVRu4RTcbUhGZCeGEUOjsLhSA6Fg3Atyr2z7HmhBDlUOxPy5Dh3jtQ0V+s + tCv4Yzx+6MumcHe0z5HIEtpoUi8Lm7LTsak3xbYHzvEfVBCdhNPsUjS3nwBMPnwEWJprG++BtNCM + LLLiHFodRiAQoAqPujzJi939uos9xUsscE1KUz+c0phILV38WrZoIK6nVfWSnnPaGzETbOXKa/T9 + x/tyc++PhkspR6Hqvts7MC0Q/TKdTcC3kgRSvNF0ioanoPCMjtVm32+LNpoWewdKAAnMjKlyzNmu + FhjPXQyvptgXD2tMbyqNoIh3FD0JPC8NxokkgMVofbBW2aBeSo/gr/fBumxSKaO+wMYQUJLOct68 + TvnPoHzUHjp3biKt3k4IgaTW3vXVxuGtHTHLIyagE/aSibQPWUO+2pQxISqShtzVge7jfJLVRpWH + YQWw/ETl+vZ9AbI+FK3XNfblcIh+NLiX8QN5fR2dYmI1crve/Ks/Rl4f8/plvgHld+Vd7ynkOeZC + bshlIdrNPZxZQJzdvWiKzlFtXQ06PmAnzy3LGVNqDoILxFjWDQYYFO6c28ts0ZWHYtesD0UMyRGj + 3bq5K7rB7CiRFim4l0YYF5FwLtUMYYoB5EoYPqLD4/R5ZKLRXeDyIxIj2FtYdRpEAgpHxqf2G72J + pcVjRfJtsVDX7er9vsZ6EqAL3RK/dAj4uG8qJNvkoA14rNyE4YajeOg6IrXs6iaZ2CmWRrFHfTCB + C3BNY4X6tNg/g9SieSg3mA10yldB0xUwFTR1ZmbpGmhzFF7yJPOUoVRmKccs55biAatVSMyJ/xc5 + fHHU1FfFr0dgEeQumdLkmeK/8vGJrST0sdySsRGCwrTpjxiyD2MCAl6k6qI0UG9A71a29yiOSPq3 + AZyYR4UlPronVnVFRZR4RP1ACjHXpXF83qp9QB3EXEJou34fJsGTSdTVFRTkhoQ8l+17NhoWY2dZ + BaC6uxKngmLSB4zjvHQmCJUVI5I+aSYYpywc1GMQoeNYCFfmUyFIAVDpUT+u/1YGfIn4c43m4z2I + 1pxK5qcUX3+8N0pyItzScI87VKM0Z4Z7nEn3S+qbsDIZ7X2GC9NLv2Cwlwg2l3Uy1nvEOxeHetxN + 6qDouGKoJ+A+Y4hx462Tod4o64n46UjvEffFgR6zNheKUD/Qi/+7ONDjUMczyenc17/FQI9JSA+u + DB0HenHp7ECPueGJFH4C+dSB3vj6x4QJzFUN5kIuiLMxpGQNYGIEM8K32lNC4wgAsrO+8UIts5m1 + lGJStV8xC6KACQmeeGwaxMDFVOZGQjF+kjRmMyC7YMGvNwNC12LxYNNOYzIzm1Zqk6GZM9Qo8pmy + /EwjeKkVHtra57FWG2uQsnLlRt18wnmRS8XO0lNPP60BO1dhnG+TUOEVNda9uJH/n/VcP+uZgOzM + rOfz0XZ50rPQZAXim5X/Cyn6UFbloT8svNunVKaTiEvIvjjIWUL8PAP5PdOX22OjCoU+cy+wJkYs + WugKk/5Jp3ALjcLs5b/hqYli1PnPT2bCi+Ry7rXPFV1o9NDYF/T4lmT+bYaFm8M7H38KT/P0hfZ4 + khlWAqpSyefZ4+nt7skXE0z66uo3Gzl5k0+GFMtXTOZQQfiHiHSe9q9LYTLhSwhrqMD0vO14+gAn + GmqUd1mL320643rYQPnka45nFgLjsyASRyzcFTH26gmLQ8C8Aw4bvqj/lSYXbtA0Nk+4cvIFF5Mz + Jcw31f4m0s8VOvl2i+MKKf5H3e8oyIlsi92vyg0Kc6b5BTTZqWNwZdL8Xu+/9M4v6H0TueaiTnrf + R1xzuffV7huI17S+2rpvPcJPgNJJ6zuKeiJ92vo+4jt34n8BVHBTGgplbmRzdHJlYW0KZW5kb2Jq + Cjc5IDAgb2JqCjw8Ci9UeXBlL1BhZ2UKL01lZGlhQm94WzAgMCA1OTUuMjc2IDg0MS44OV0KL1Bh + cmVudCAzIDAgUgovQ29udGVudHMgODAgMCBSCi9SZXNvdXJjZXMKPDwKL1Byb2NTZXQgWy9QREYv + VGV4dC9JbWFnZUIvSW1hZ2VDL0ltYWdlSV0KL0V4dEdTdGF0ZQo8PAovR1MwIDYgMCBSCi9HUzEg + OCAwIFIKPj4KL0ZvbnQKPDwKL0YwIDE4IDAgUgovRjEgMTIgMCBSCj4+Cj4+Ci9Hcm91cAo8PAov + Q1MvRGV2aWNlUkdCCi9TL1RyYW5zcGFyZW5jeQo+Pgo+PgplbmRvYmoKODAgMCBvYmoKPDwKL0xl + bmd0aCAyNTQzCi9GaWx0ZXIvRmxhdGVEZWNvZGUKPj4Kc3RyZWFtCnic7VrbjtvIEX3XVxAIEMSA + RbOv7A6CALbXu9kgu3BmBnmJ88CRqFGvJVImKc1Oviafmir2hU2J0ozH3twQ+AIML911OXW6TnE+ + zT7N3tzMsgT/NHezV99dZ8ldO3v1bZao5GY1Y4Klea7yRFGZMiV0crNMfvN6t3uR3Pw0IzncZBze + xatv6+1uY4pqUfY3eZ4KKf3N1/uu3hadqSt7U6ZSZtTdvKnrjV1QpyQTwl1e1Y29SlOlZO6u/mAW + Td3Wq66/x1RKKfX3mBT2agbGMumuEtZffAeOpiK5B3f/CP9+mv31b1myhGtasAT+57r/XyRX32Eg + CAZC5CKluZBJLnSqOEm2M5qFHzazawwfRotQDBfek+AaxAQ3/rYwm3Lp7cwyrZxFi30L4SiteyJP + mSDe2KZsd3XVmluzMZ0p2/4RTeAR7WO5LDtYuPVOCcmcjUSkOWesNzKFjKnhUjCVBFPdExxiBfvb + SKU24DwlOfPZed/UB7N0SeVpRokIhmzB1K4puuJ2Yx9QMs1E5v0s8UUPCAFOSE3crW5d2AxSljKu + vfvLerHfllU3QEVRWJH7DJc/m7ZrX9qYQuA48XsV1TKsJwKGTOsg5H7eFgYWN1W5tGtIkbKcuZv3 + a7NY26XBT8L8pvW+28ArrQ+B7BHj3LDOzUXGUklFMidQMVop641pi7ZzeeZinOdFfSibB3tLgye5 + 3263KaoBscfohDIFmEmIpoKogaeQfJlwlgqAV1POVqOKpiqRuUwpy4Ur0qprXLVxiCzJvUG/YtlE + /M4n/0Ju65UNOhvnp9oXdmOm46cbWKm8t+ngsA5n/pVd2bR1VZX2LQHQYgN+Gsiiqe5eej7JqOAB + JGWzMK2zWsVedmXbDW9BAGjgLw+gOYfVNAUrxrl8BJmTTr95+94GFcs/vwzVb67ss3MieJpjNudU + D/s/KxNYZb/93W3ze/z3+sMLa7eK7b5xCKYIeeKvvtm3iHgLeUHj6CKETLU33YNPS1QPAbtUxiZO + e+yLB7goI8Kn6JtR0eQxIK7iohE8Tuz7sPGITovG1yeQGlVAaqOk3pYABotJGrthMem4G0Mq8gCT + biLPmxJM9pmWKmxfBmtx/TyUOKF2ERk/DGTarVuPTKmGONUTW5ZVu3fOAYVH+TnDrMZehNILiG9K + pMM2VNDAeIdiY5YBucP16TyWq1W56MxhKLihqpb7JoQYkUJCHJcQG1ejcw7nBoX4j7PTmm7fl5sj + fDwpJWMXbTkm/P1uWXQukeBjTjLt7twWrT+cEavar1tXoWKMqxhg0IyrpzBZae4nzvtJbphGPxZQ + v7XfW8JtJrw7xcZ1SnCYsLB+U27KQ1F1E1w45lAINBxTnB8FGg6j0hx8nsZ490QbcDmk0PHgGMXg + lmk8BUSQh1PHnaBUxzU9ncZRGxT6IIWnNfHhLtrW3FVRkQ6ZMJXvHGXOLgd80dPZHRCoLVQJIBsd + xa1NR8iHSvMswOt8El+1nngENISAulHEPS/Be1GMztERnloxVtlQ6029v1uHQ4GFru12ROBZvNri + iMD5CP2NbwEzOG2/iJL9Mdz+o4/gwQVQYwOlaeSajQTmSgyIbvebrvW1FMVoYPRMpyKnbPqYduGS + gDUVSt5Ui81+GXCexZkEdEKhhB4vOryA3BsPM+izQGT4d1ZNvQ2HTpSUKUyUPy+irmQcqcmg181d + UZm/9wTo6CbHkzuoncW6ANxaiwcNMucZtPaaymTOsEfU/LTxE6nWQX210NKUvt8kEGzoPUgiiEoV + 7rXF+oZuhA+XnJggwAZEZtCEYoa4yPvlftxvbz1SVFx+ngR5LP1Wg0Sag47BII7S+VSl9OAdoAAv + yiQdOXDilPOA6hxqE/oyAaHKuWQ2VKM9R2Q1sacisVEYzP0gzXLIQM5jW07tm5BmCQfDqLcnkpFx + hrjisPMoQ+ESrvmsVI42JjZhWdy7Th5l5CT6sXEnBuOmT88TcBdHCUR6CQTCFHUNywiqgd5embGE + CpxY9PLn04wk8wz/ksQ9xiQ0tgyokypsAHiy2MJjf4Y/PkORvac+oBVPTmUYGXCB1Qo29jOD8JOL + +DBziacHXPJUcamP8/6vGB8gbxA894fxQbh0dnwApZEKbmv13z89mGbe5x6FX0HLfOEAYM41ThXY + l/QOl6TMpCfnO+b/S58+J9ABan58UI01UM/9jgdwhkqFowH/Qzw6lK74GRa/Bqv7lgvKwksMQn04 + rssF6KkudKoCR7L21q9dWEPdmUPhWtq+bPtd5gTarD6jc4abKX60mQL2p752Tejv+yfdvKCBlthF + 9MKAClzH6D06oIooRSVUQ45wNHHSsYxHVWQCQu8RiFOg2MUMNNIvFwhmICdfVbmOdMEZoD3U+ynp + c/Ona3tVxCgG7lmZu30zDJRy8BLJf1rJwiokpSEcgwiY7B7X5m7teAdEHx6S4kj0TVd/MaXpTHWA + lrr2Xf5oHDStbZt9UCyYDaL9+h/LhzZU12MjMeiYO7MyC+Cj1ovhiByOI/Sx3HWBsAcSnl57mATb + IDF4SWGn9+VTt/DhAlVBHthzUrp/xmhgVW829X2kXjI6Hl2fTPo09FMkzC3+gswWQinoSIZ9BUC/ + PQU0h/3pEaBBEVMkDTKG47PhPR4r3Ztu7XhrPMSfjum0J5D1lXE9Sf+VIXj+mI9X5ae9gcMFyqWf + G7xxmSBgfk4zv8z1ur5vPb1HTcGZNDy3KOeCZcC++qiB+K+qToziscSl4A1nOC78EolLFIp5ySNd + FC4d6yKaMeiE3Ub/KRI3duDEqWOJS7TEzkP/QhI3suXUvimJSyRBi609P9bd691uA1jyUmCUKIiy + OkqUvzRSup+T0dH+2VOVLuOnWYisO7F4JHUfzVcGWgoOkVTgkDsVVMRSl0iwHLLwBKkrISn4ZR6/ + +p1I3cjeUx9iqftoSs/1fgpbP/2Ub5PQicJy2aPfJqc0w7OO5kf6unOd2nYHZdEGysclCTvDc6j5 + bn3F48eQYXo/3Rjs9reAfH9kSZV7P+7L28GaYGNbNgez8F+jR8NYp5b6j12akuOZ86F2yobROFxv + r77/4d3LIFHZZXk4HaI/XN/Yy0zErh3Hpqyi0OBHFXYxMkRlc7vZaFy6LIZTKgIEqJLSPQ69DTQ3 + oSVwKIEeD8dIUPz/sz3eucbi6wC7aD8L2D4ac0GRAqCdGeHxLO5XxSLMMkSMvQvQXwNaN+EzFX6j + 0RerqIFGrWzdFwYcvwwDssmZww4/7vkvbCx+/O1xEHmctCvsFK0rJN7/+2pVR9gOH95BxX6cMPeH + wgGUsTit74r2wWs8kQqlj35p4YMt7g8v4l5UjXr5Z6iCX4YCzjSZruH2Aywd/b7OZKI+jzMK/GWy + yc9Mk5WMFBNaHzxU/wl2UY91CmVuZHN0cmVhbQplbmRvYmoKODEgMCBvYmoKPDwKL1R5cGUvUGFn + ZQovTWVkaWFCb3hbMCAwIDU5NS4yNzYgODQxLjg5XQovUGFyZW50IDMgMCBSCi9Db250ZW50cyA4 + MiAwIFIKL1Jlc291cmNlcwo8PAovUHJvY1NldCBbL1BERi9UZXh0L0ltYWdlQi9JbWFnZUMvSW1h + Z2VJXQovRXh0R1N0YXRlCjw8Ci9HUzAgNiAwIFIKL0dTMSA4IDAgUgo+PgovRm9udAo8PAovRjAg + MTggMCBSCi9GMSAxMiAwIFIKPj4KPj4KL0dyb3VwCjw8Ci9DUy9EZXZpY2VSR0IKL1MvVHJhbnNw + YXJlbmN5Cj4+Cj4+CmVuZG9iago4MiAwIG9iago8PAovTGVuZ3RoIDIwNzQKL0ZpbHRlci9GbGF0 + ZURlY29kZQo+PgpzdHJlYW0KeJztWUmP28oRvutXEMglBkbt3pdDAtix/YLgJXjxDHKJc+BI1Azf + k0SZpGw4vyY/NdXshc1Fi8dLfAjGC6ab7K76quqrhe8X7xcv7xY4sz/1w+L5T7c4e2gWz9/gTGd3 + mwUTDCmlVaapREwLk92ts9+/OByeZXe/LoiCTcbhXbv6p2p32Jb5flV0m1whIWXYfHFsq13eltXe + bUokJaZ+866qtu5AgwgWwi9vqtqtUqS1VH71r+Wqrppq03Z7TCNKadhjUrhVDMIy6VcJ7xatUoRa + rZYC7mdK0WwpCdKCCq/Avq29JFwgY6KATZu3TqvXgBYS2UfA7C/w99fFP/+FszWsGcEy+Jeb7l+R + vf3JokksmgSEVMKQTAmCJDM62y2IRMJo3i9tF7fWFIRTRCSWmVIEcUZ1d//fjrv7woHBNZKKaS9Y + tXEI8RTOTV5ui3W3sZQMMbDQkoAdjXanrY4NGMOfJxRiggSo6qI5VPumvC+3ZfspaEwNR5RJOlBg + opTXgBoFvyudKcmRsJd32A7uNIjxqMPMnZqkQln0j00QRgAwWvFUlql8Xpbnb4g3OcWZAq/AQZ43 + PUZwZq8MuDQZWSgs2TOfZsr0YuoMBitYja0ItuIkLNIp+olwE4HtpdfbCSPJrb+Szl+JYjb6GSYg + p+nkhf+osCRQF4sNsATJltj+IZl/ikmiMoIZBMNqBw/8HX6iaXpBp8Lb66+2oVACUSVkJg1GmhP7 + II6/eKB7+ooR3j1k/XBibYADYxNAvjYUysL5n7GOaQKprYsWDm48uwRXWxItkDaA4BJIk4aoIyiE + KsAdQvWXuvpQrj1hcoQpEfHsHdze1vn91m0ribC1Wbdb2LcC0wJgTIKF3Vb7mDtqpNadTFDn7udb + typSJ1sBZ4OiTeBlZY8i4Zay8fwbZCobK846EBFmImzllpSbgLBUKlByvvXUDveyiPvheL8tV0v3 + vEjl3OSrcv8QN0TMBk1RfyhX3g5LDnBQDj4wYLYTuj/m+7VHkZkUq4/FfQ9KFLku3h+Lpu0ZB0jU + OSHVwO1A7tYLEaRE3S8F9gvrcJFiyiUWOmf6f+Tbch3Sis2HxtCnmPDPt3e3ES6mzAnbFfvEdKkr + ATbxrh7tVbXflA/H2r9hGVuFN9pqhq7++IdQEiQSEziQYozdGRIpyuXTHKYp2yIJNNkFGqcKGQZ5 + fmk1Etg5wau8zWNtwGkA4EUbSgwhaVDzLdi5z+vjHA6UAkQiKEcmA03ACWRmSQL062hxyD0x1ejM + egzmkJAnZQVFmKiAwe+YEwmMryPvnKaEzw/6dYCC2itMOMg/OzRgHaCwR5zzo1X96dAGv5A2s4W9 + ch/qtaRE2ZZ7JzG1urNg5o9l++iWefp0++gfhgRJhBxeGlhK6DRaDnW1KX14Lzl4ggGdBrRgA7qs + i12xb5ubQKbJCccmUg4dAH7u2nz7UNWgxK6Jm1pFsjquvHY6tW3eBIMn2f/F69ubULVKZQJAL7fV + x03ZPN5Ec/e56e7V67mYnw/ls1r8VnyKxulFasp/+2jrZBqXm0sBj0N1zIYwE6qXwaSJl9+X7U0I + vcTf5oWlQp44w91soJphFApaavqL/x8yXxAyTKZAXx8qS4GBJcF0Qyf4TjGz/mAbzYiowgGk18P7 + JYBCTchcty14XV771wBcpoI7vLNx+O7ZTZ+RSLDn2Uisy0MAkqUJK2ahoTYj8ZZcQ3Nrc80AxLNy + 2uB/98w5u70Sk7MR9fXDfxgE3yHqk84d2igooqBYWDJoIYzh0xR7unOPvRAHW1HBSNK9xaVx98aF + zeWSdMf9KI14qsBEqXEjbnMi4VI5qL56I57IMpVvrhHnBDq8IM8vedPMNOLMEv3QQnFp0Ih/linT + i11RekUjTsgE/lS6icSDTvyiobC9CupNaBhcIRm6cE5sTLIMCtgLXTinpBuQEXCr2ItjJLpzBbM1 + rR1x2bMh7IZnq9nD3WOnDw+mT3CYYpM2+tf4yLCUlt5ZGAQOt4X5mdL+bdFCvgKG8xkLIknTYL6X + +eo3Ry4cejPrHz6THQLzJScFegJyIRwHv39VQmA0+fZSp8DgMAZvhV6hq1HMhV4BagGkuWeEM70C + /1q9wqyTr6vV0Sb9Yu0xpEgRHln7ABXDh5BuWdILniiX6mAR9wZOS55DUZeVZ0WgJwf/lfUciOHF + t5lJxwRyopjL9zOgfStlmC2USHCvcRG4qeodtLafQo5KSgWoIqE3hwLDyyT5xfa8N9c4QXI7cwLa + /7IESaFMoEIlpBpWxpxKwYJY/FDJMRF+rM84NVLgJyJAjW+TGntJJsLNJUZqXShIc2JCTcER1NAy + fmWQFj/DgOml5OqkOEW9F2ws6yAjXrDO2ck0ZcpKds1oWhgJeYtqQmcG1L2sE/HTrHXBfHE4TcCd + uNDUTafjb2fH0xTDiYKQsa2/1Xw6nWMSy3oSp3PMuDTjl/4JSKtGUJeI/8fD7M/k9as4VELAa2y+ + dyroOkDgvNEsZZwTzlQd9iMMg8MvVR1QaxC4QguuLtUa4mvVGvETrkoHJE8A184+/KyE8XQosnJa + hPABDJiMXyWeZK7ZgcPBxyDF6ax6lUBovyz00cnDjAToAtD43uOqscvVlgn2/fg/GQFUe++Jw48g + 85abnzWti409/D9DuA2UkFC9PwnuddkA9TX9gEd2vu90mxuZXbJE+vEfhDcaBPuiCgkuoZKaQX/q + VsYJFioJLMSP9SE/kX6s0LhEEqCGkN/qK34vyEQ2K4hN2v8FtqU6agplbmRzdHJlYW0KZW5kb2Jq + CjgzIDAgb2JqCjw8Ci9UeXBlL1BhZ2UKL01lZGlhQm94WzAgMCA1OTUuMjc2IDg0MS44OV0KL1Bh + cmVudCAzIDAgUgovQ29udGVudHMgODQgMCBSCi9SZXNvdXJjZXMKPDwKL1Byb2NTZXQgWy9QREYv + VGV4dC9JbWFnZUIvSW1hZ2VDL0ltYWdlSV0KL0V4dEdTdGF0ZQo8PAovR1MwIDYgMCBSCi9HUzEg + OCAwIFIKPj4KL0ZvbnQKPDwKL0YwIDE4IDAgUgovRjEgMTIgMCBSCj4+Cj4+Ci9Hcm91cAo8PAov + Q1MvRGV2aWNlUkdCCi9TL1RyYW5zcGFyZW5jeQo+Pgo+PgplbmRvYmoKODQgMCBvYmoKPDwKL0xl + bmd0aCAyMTY2Ci9GaWx0ZXIvRmxhdGVEZWNvZGUKPj4Kc3RyZWFtCnic5Vptb+S2Ef6+v0JAgSIB + TjTfKRZFAd+1F6BAirbxt6Yf5F2trcuutJG0Fzi/vkPxRdTb7vqS5g4tfDbOJCUOZ5555uGsf9z8 + uHn7sMGJ+WqeNnfffIeTp3Zz9x4nWfKw3zDBkFKZSjIqEcuETh52yVf3p9PXycOHDVEwyTg8a0bf + 1cfTocyrbdFPcoWElH7y/tzVx7wr68pOSiQlpm7yoa4P9oUaESyEG97XjR2lKMukcqPfltumbut9 + 18+xDFFK/RyTwo5iMJZJN0rs4N17khBqTpUK2J8pRZNUEpQJKvp17/PyUOz6tX8BpyCR/ASu+St8 + f9j869842cGYFiyBn1z3P0Xyz2+M04hxGgFblNAkUYIgyXSWHDdEIqEzPgwdNt9FCzOJyGShHzIL + ITSEU0QklomSHAkGzu5PZP2CEcYqc6es93aQIcaJHyT+NFRzRJmkI+NmBptNh5WRdTOLzUqMJDfe + IL03iGIGQgwThJnu7c10QoVBUlNs9gA1kqTY/COJW8UkUYnUyfYIs/+AL6EgHorHVs4tN3uHhYOR + c8PtQoGoEuBAKoxnzEIcfnFeHhIAgG8xYhYx8L3zeIQN8AXG2nt4e24B2YVFqlCICeJx1xTtqa7a + 8rE8lF1ZtP0STWCJ9mmxKzp4ceujJCSzxkotEOaU9tYiSL5sGHI2D3D2KxQWKIP9beSRhQM3gfGJ + 9vem/ljuXH5yhCkRwZAjmNo1+ePBTisJuzE3W5infGJDGJgELNip7jm3mUgN8PRwdjhY5Txmsl1r + b8Qu73L7BAxn2lsA7LB9dk7iGcyIwbb98CqKFGZk2KWoAqkIyAcWznoqmrKOsnmauRBtiLEEN2jN + EiEMTGRCNVJaW8DGwKAQAFgimGSO7KqucawFNmGi/Ml/J63jzeECFNYdf8G1ixndFttzY1czHaNt + xa274lAMtCvi95+aelu0rfO5AFhT4YGZ7zuHaQqY5kK9zuMpABVRLiHje49m2ae7YQVhF613HoLM + kEp528vKlxOpmPfn6ZC7XSHbI4O6etX5hxcP0ijsvZ/diyB1qGaX47Lm4LKzByIQqlBab/T6wF4p + B4doqlWSMiBKrfkctQKAH0pw2+XOekiWQPciM7kCyTIUqDA0LVASY6SYsqX0b+fjozueyeXB3R7T + PK7/+4FcU2BAc+4UHB9gcyvHvsyqXXyA2aHcCcBLUFegjgrNgD8zy5/vRntCpvFwhoU9MxIbZZx5 + HkjdlarIlrl9C6QOnATbenvG4mQ4DHArn0TID420xmtCOdqY3qo16Nz7kXEzg0da42qcLmoNYy+U + x1vEBlVQEKEUENB8M9UR2Ts/Q6w6roYyqA5Bjc2Q3b3sCL9d1B0CmEKzTP5WwiMSxiQDCaHBpSnY + QH3+fWYt8T/O9CmXAF9z7RmR3u3aJqhGwCniAvNINYYhT3Z+HPbs1WSfuZ83vt1ziCEmIlKQ6+ev + D+XWxoaBaYSpS8T0Up+bEJcBJPc/ByHFY60G2QMPbD3cZHz0Y1F0/oaJCVGXdwiASDlcSagA/hyF + +II260an58DHipDF6K8pWwZ8JPGgbDkzrL+obDnmlrquKFv1X1W2uW0ROLKT4GDu1z/m2x/Op2DS + kHLtS9sVxzd+d6mIvvZIV7RdWT29GaaCzMqrXYCnCNePfGvYxy7H8dG31lNtCN/AwL51kQoM4oII + Og78qnEDYgzgzfivo5//8MfH5k/m+/77r61gAUoTPKSC48ssBvWnx8NOgBFM+XCUTtX6DH4VQy/H + Bdy/L58gh3dBo6kQ5CVOh7yBuBxdRvaqD+ulwIRLaHQyx1yTKgE31t3Z12dTmQINduWxaL3X3zqv + g8A0CtmueBs5kcW1uayMmUOzTFKjbtiKJw2evUCQMZoXXXyAm7T1JY1586eye7bDPF69zMzr0bfu + gOzyrJcB9UzVfF/Od557jXIZsLocaWDkrvZx5iqeslxYbvODq9Xm/iDZRRz0wHE44PT6eUEHlHkk + 9sVodtnksuqKp8Y/MSaHRfZb3trwgQfROweilBONhEnekVvvT+DYU1P6e5wUUT58CoctHww26Yrt + UJdlXJePxfY5r8r2aN+nzFYB799/VaLhjEa3O1cdj+cqaAlpEBXsdvnoTi7oDdLveDoUR6idDi4K + nmGCjvGQCgrInLJyUbUelRzHO62zwp21GS6zgRLWGLCt8lP7XHeDioWSfvEoVoOGFlp89Ke8BAW2 + kILgyXP3XDflz8P5FcXqGg6Wg72YPqtu8hAGbqUgSgSZ3OJN2u2MqslNKtkCrAxrq2nSvPGujrqA + K8X5I1xjRskJD+nAga9Ites1OWqvULgncVBTv6i7Qs1HJEKr6EoehqZXcioN7VHVv+5L6a7EB5gd + atpdoaAguGCuffqrd1ciW+b2LXVXKBVGOVt7VrorFPyEJxHyQ6PuyqtCGW98c3dFzr0fGTczeNRd + uRqni90Vaj76I0nGrn6QA1pXZOYgZOitYCSMbDSfXZmftL+esIzHryZSLr7brlp/d4j94Im5d+K+ + zVWQhL4NgQubkiAP+75N+O1i34aAvBOC6Smi/l/7NvlUkfDodV+CIvFlFwoWXIDZtANzk5S4sTZe + uFh8htofN40IgQyW8J+haRSGJk0jwgSSQtlq95mbRl/67XTVCLjdNfGfQqQcjKeKTMH3G17zbr3Q + 9YQjLeFAMnMCLk8NOgW2Rv/ZSyXzZxmmu+jaCwPyTHYOmuvbvMqf+hTzsFzrZvUQvNrLigp8lgB3 + EEmuflybWff98qbWClDLalfCQ+fcUZpRO1LRyxFZZcdF1jEK9e6H4sVtAG/S6jK99NT80fctWHRT + /L19/yg9Jp2WlJtPwjOdTXsnbQzQACKH87GHP9SPPuSmkv8HIubRWwplbmRzdHJlYW0KZW5kb2Jq + Cjg1IDAgb2JqCjw8Ci9UeXBlL1BhZ2UKL01lZGlhQm94WzAgMCA1OTUuMjc2IDg0MS44OV0KL1Bh + cmVudCAzIDAgUgovQ29udGVudHMgODYgMCBSCi9SZXNvdXJjZXMKPDwKL1Byb2NTZXQgWy9QREYv + VGV4dC9JbWFnZUIvSW1hZ2VDL0ltYWdlSV0KL0V4dEdTdGF0ZQo8PAovR1MwIDYgMCBSCi9HUzEg + OCAwIFIKPj4KL0ZvbnQKPDwKL0YwIDE4IDAgUgovRjEgMTIgMCBSCj4+Cj4+Ci9Hcm91cAo8PAov + Q1MvRGV2aWNlUkdCCi9TL1RyYW5zcGFyZW5jeQo+Pgo+PgplbmRvYmoKODYgMCBvYmoKPDwKL0xl + bmd0aCAyMzIwCi9GaWx0ZXIvRmxhdGVEZWNvZGUKPj4Kc3RyZWFtCnic3Vldj9u4FX33rxDQly4Q + K/wmVRQFsptmNwVSpN3pU7cPGlueUWpbjiQnmP76HoqkRFmyx5nMLtIimSBzKYn33nO/Dvlx8XHx + /c2CJPZPfbd4+ePPJLlrFi/fkMQkN5sFlzzV2ujEMJVyI7PkZp38/tXh8F1y82FBNRa5wLtW+kO1 + O2zLfL8qukWhU6lUWHx1bKtd3pbV3i2qVCnC/OJNVW3dB7OUEim9eFPVTspSY5T20nflqq6aatN2 + a9ykjLGwxpV0UgJlufJSqjrhyzc0ocxatZTYn2vNkqXMUi1Z99j7uvpUrr3yIiWMBkUKKw92SZpy + lVG/1N7n7R/+eFv/yf68+uW77hFjUiJFUOqVMwKvcZ152bZsnP7UeEm1cb/zlIteeGyKunEWsVRp + HT75uWzvOzETEPPweL5aFY17XpBUGRo80FYzH1/nbe4+AjBMFozN9+uX3vFcp1xmAUJ4oH449BBK + k6osCxD+u3hwGzPYTnTYo3TCpYBLmET4LKGDzozpVnd5uW/xU6y7pxRLCe89W+5X2+O63N+53Uiq + CWW91x0WjKSEymDl7bHBt7wD8ILKJPdLH45NW27K1RCB2Cxa70NNxygV+cq7OYMj+rg8AJRqbwH/ + 3gOuVaopCa/d3Huz4VgCi54J87yZgRyK7/Lt9iG4WaRMmLGX88MBke19jHzmOlh9mzdezKEpy4Lc + u4iqOIbOBtehLj+V2+Ku8I63qdMXhbr4eCxrvwtKAlf0ss8BbVn3YTmY/6G6DSWCi166Oe5XFlIL + xg8h+1gMxj8Gd8JxiNhgTt2HULTLqtpvyrtjUBjVYfDWmaQLsbiUnKeKIn5H3r/onerYbvvwFzIu + LOU+1L6ZvcZx7wDOt77KkVDlKAKIGBQ5TlOTIY9dld63tS+32DHL+irctHnrPv9ntIRUJp/RGP6C + nw+Lf/6LJGvIuoRJM5F1/8rk7z/alkFty6CoxFpCfWVIKgQWdzaAZGbEINoufrb9hgqWUkVUoglJ + Gdey2/+vx91t4aAXJrY6pImIe8Ymh1ed45YKQQ2fjvy+QsZXO/89aQtZH7B10RyqfVPeltuyfQgW + swy5wxUbGTAxylvAMp0qjjKnMru3oc63oz1toPY2zOxpaKyU9f6xCcpIDci0iHWZ6ud1GfoaI4lC + WTZBnzeDj/DNwRiL+wlCQWS/+SQoRxszBxiJW8FssWNT70fKTRS2m16PEzJb2HilXbxSJDJGHE6o + 7TLQF7MGmh6TdtSpi8UGsxByl9i/NPGPoVzphGrR9QrKZLLa4bG/4U+P0KDv1AarxdVQSi1TppHV + KCLQXGr7JBl+8x4fhrU+0+1TqJaINnWKO7ftOAvuvjYpSl+tMhoPAOsCzXrbnA5T1EiUF7h0CR1Y + yD+ahqSF40PSnh+x8pmIubJhov05Keon700t92sU3vUx9wrbdFSaXa7lzzJAhbYm4ub/6PD0wsFF + 4w2+cgRaChjBmFLjyjidhWzBQQ3tgk8KjjJPRBd8KcZ+M4hC8QtyZVIpmJue2ZfhvS52iLa2hgtv + t+4BgxlEkmD7IzO3s93CkamLHvlfi4OZIfpz4WeVpcgAqIYTR4COZkAxyoLzsx/G/N6Hw2h7YSA5 + 46p1tTruCozxcTRNJwXUK1QpgXpHCU+wIexQCQILXcVV37i0MQQXEa40ToYWDDVUB0B+l82Mqk9i + crO1JTCUkINKIAflEIhlvV46p+jY7Ye89k2e22CkYbycVrR5GO7zT2FHbmKecibUmvu8Di8IS2xo + qNn5XV0UFh8XWApEhfAJpEtJZKoYH8cVEmrnlsEoQIH6hW+QKc83gYsAhSbHs7gPnikuZxzviV5f + lS0QIXuAPJPicvacvj8w4jTml6jkCj1WnCT+614pE4f/E6NhnhHN8pDDNvcYW4oxwH+unD4XOKBn + zXHXJ6ONL8kihKzPTlkQx/wl7aT3FBrUD5aCMHuAQaNRuBedjsJoiSkR5psiNbH+E5tOSY0AUFT4 + YfL5SU2ky1S/OVLDjR3lp8NtDBCaOv4zAqgXjUjNlyA52pheS2roxPuxchOFR6TmUZwukhrwL2h3 + FakR0p6qCq0wKU1ITaTv1IaY1DwKZU9q4J9USCx3pKb/7SKp4UgZJjL2W5GaeA62ycAloB/m4F40 + E6PuCc6om5SfwIB+hYn42UlVV7L7Njg0iW+/nfo2io43PR+dHcGed9L6P+itvq8i5FXXVwXRKCCY + 1OFVF6YuvstP+arvP+eIAMPLFDA9RgSiFEP+cVs0UP0eoQSUzOD5fJygaGyGls19uLbA10QY0N+/ + fdeDpMIbzUPT+lFajIbbM5hui3xd1M19eQgkMSIdq2q3K1sbaO7IQLOYYcAlHl02atUhyLubGGOM + HufAbKE09j5Gh33XxWZIJPDQbmlEC15XIbBofEb/UB3nDvSr+i7fl/+JbmRgJmXBNaBARW/HAONc + SYtjToxy6e2+48bDFgBS8YDVu3yf33Up6xxp6XHQ7heLpJ++7T3MMKOdBTOKixfe1zTD6MlPfF3u + DttuV+9MCyDvU22+Gl28KbuCWf1Ubdf9LQixKn1RpAV8IvhuHwLxjk8q8oeZcJ5vMDNAHqpt6XEc + qzl7lFKBn9aevlKTZmjP03ORoQSKS9qMTjFewvDDsS3qMlyPUYwVgvFH83n+Suu++uzUkFekxSEO + ZhqncHkazKMbzN2FYC42eNP3JW53y8JK6EtLCc5iMiW/4IJ23tizvumu1lBo2zLv2YJWUemcj3wo + UNzVeCHmw+PK9LoAVjt77hnqsTI6vN8VxBd9Hg+OvqLkRUUTHFKyk/jKj+19VQ8vjw/z5nvHpRvl + mTnnsfOnuRNPh8CL0OmUplnvy/Pnye/fvvVjoWUQ4Q10TXsSWvkrVFs/h4lhHjDfmLfh2jWi4sJe + EDDzlVTcYO5Qhkf8LUhO6RvFlKHshfO3xMQj9U8tOuXhlAAiRbNfiYcPmkyUm71aBHhBmTMk3J4w + j6EJkhEFvx7BeM+v4N+RXqeqjtj3I9hcvlBEYYUKV1BvDSbNNBVGiCn1HlSdaB8T70ew62k3Wh9B + l3CsO/xymXRzfIbJ35BzW/P/C5/EWb4KZW5kc3RyZWFtCmVuZG9iago4NyAwIG9iago8PAovVHlw + ZS9QYWdlCi9NZWRpYUJveFswIDAgNTk1LjI3NiA4NDEuODldCi9QYXJlbnQgMyAwIFIKL0NvbnRl + bnRzIDg4IDAgUgovUmVzb3VyY2VzCjw8Ci9Qcm9jU2V0IFsvUERGL1RleHQvSW1hZ2VCL0ltYWdl + Qy9JbWFnZUldCi9FeHRHU3RhdGUKPDwKL0dTMCA2IDAgUgovR1MxIDggMCBSCj4+Ci9Gb250Cjw8 + Ci9GMCAxOCAwIFIKL0YxIDEyIDAgUgo+Pgo+PgovR3JvdXAKPDwKL0NTL0RldmljZVJHQgovUy9U + cmFuc3BhcmVuY3kKPj4KPj4KZW5kb2JqCjg4IDAgb2JqCjw8Ci9MZW5ndGggMjU3NQovRmlsdGVy + L0ZsYXRlRGVjb2RlCj4+CnN0cmVhbQp4nO1aW2/bOBZ+968QsMBOC9QK7xQHiwUyzbboAjPotsG+ + bPZBseVYrSy5kpxM5tfvoXgRZdNO0tsMBos2AULa4uH5zuX7KH6afZr9dDlDif7X3szOXr9HyU03 + O3uFkiy5XM0op6mUmUwyIlKacZVcLpNn59vt8+TywwxLmKQMvqtHXzabbVXm9aIYJplMuRBu8nzX + N5u8L5vaTIpUCETs5GXTVOaBKsWIczu8alozStIsE9KO/lwu2qZrVv0wR7OUEOLmqOBmFIGxVNhR + LIfBf8BGU57cwXb/CT8fZv/5L0qWMKY4TeA3U8Nvnrx7rR2BtSO4oCmRXCQSLEaMkGQzIygFb2Tj + UDV7r7149gonmGiv+U9IlArwz2BEavbCUiyp2/jbtrktl9ZfLEUEu70Xety5kuOUCoXt1LLYNHXX + t+DN+maYlyql0vmgX+fGNYSmlCnnhPtmZ7wJQArpP920N3ld/jYiI7JUYqLs9Dq/NSYQWIJ7ZHKz + F5QiJDO/l/I2X9ybvRBYg7qZNzUgGYAPPqWCUodnXuc3xaaojdVzBpAqlJFkjiH2VJYNn7p69vbN + z1fPDbokDJ7uvuuLjVkW/ESls73o+vy6Krt1sXxh1pWBm0oI1mFVNyt56OS8Xnonjvve5GXdw0+x + HCNqP3ogjQhKREZSrHgC34UAEgmjKVdZ0haz1STjCEQJEikHh9gkqvvWZgN4EWHpAPwLxhGLPiuC + fGLJ0F+rpqqaOxdTHMAl0oH09s0b840MIOfuG12x2LVlf+9WD+Jq2zaLouuK7kfjelifK1cMNmVd + bsrfCuN4zsJnLgttdl+u7u0srEils3wRuGfOBEsJZtk0UiAx6m5Tdp0LN52EmXRu+avZxyRS2mLR + tAZSCi5hYy7pZ60K4605JjqAaDKHZPDLfRYAzcpYoTMUZ/su8/sm3HmsbyJf6NbNnTEaT4yGAvDj + 367bv+uf0uYMhKPEIjsJp4VlTFTwHNJBbDOms9XYrZN/dMFCeRiT2ypfFN4AZ4FCqSRI7lkw51As + iYAKOwFxWcx9hDJfSGxklIupiYyeTNplURVj45lk+f6Wrgu/I6gxQ2abRzR14RoLIsqv10dQ6de2 + YmrncZe9RdS0aBzEH2Cjw9mnE0pwZ/e2aMtmObrc+xzwhSbsG/SQPGbPLAuLS94WDo4MbOFyCkdZ + u0YclPUBZuesIO7j1SUecg8ka1kvqt0yKEkSeazy2tQdAkZl2G0ECsTKhEleQWXyLrm1HsHQXZAU + 7iHvxsyfVts4MmE50Mk+whP9fHzPq7Yx7UqXE8+eXISZhNC0YoLAotkBePdnbXHjXTXp+rECkdcN + BNNoLvXEo/i17HoTCJSFXfyu7NfGOBZiXfy6bXVtWrraJJQio8s7172H9PKtPWrU0g6KELbODGre + aSjUnEKR5br4zKG6ZUqxw/bIU6VGGtDnfeG6skZZckhzLkUqmdK0DRaEDszGIUvbMACPBRIJV/AJ + 7Xj9uF92m2vnuSz0hAOahRxklZeV9c1csxtAdYrergP6a5/HAXbudw5u3YIDy+uycp0UNkAUtDYK + YRpu4GBTdgdESaCZACHPVCoYMWu+nKypwjoaWTPDoVHambvOGcMlICBZaMuhfRESPJAf7Ox5Nfpo + ghC4n+wh5Ib0Mz8PynBhHCGr0XTFh94PjDswWC/6eJygruk+BWZpoggaQLM/ijBkpRrsZUolhGvd + NZDETzOczJH+jxP7MSqwTIiEAq2QIDxZbOBT/4J/HqDR3MMtaCMejSSX3OgejiHLOGKD7hn/sg4f + haNPXP0pKMmSUboPuy69SDlvPzYnSkuI1IRCLgvg4dUYok6nMb1DDoJw1Gl+6KhOA5WUMgbc/Y8g + 1L4DN3sRmYgv+2U8bM4kBBcTeJ/cfRVCZncxEZNxBriYEB8ehtqT5IBjSRA3gdT5fuRoiFxh2iPX + ohF00VyfQnBkPPv64u27h5QpVVBr0KhMBzGjDpVpkCaQIQgSn2WRJrynUcnX0qjRCv3+/F2MtOSm + kb2IQObEpOeQcpKheW+OMvShSOazKR5FbdHrZ1kstD4e+ZQh4GZ9eJTC7CTe1/ni427bjTJWUeC8 + X64rvfSLzOnhq2dOGdAsDOEL74dswsp21x+KheWJTE5OgKKpkF9XhfNnYHGUB7Z52Y1nS2Nx0Rhb + W52xchJkl75uSiNVzPB9s4vogatRTmm+jt2n37z/t334cB6G1d6+gIbTlGeA2KR0PWWDLvSM9/DE + e5U974RaRH1HrBpTUDsXYEHBi6bDkfB1sP1gVtacUPDTX7lbF3WkWplG7AWYIOHZYFxyRMjWkaxt + i0+7outTBzag7aHFuiJnyC8FKsbjoskf3Tv02e8bMTO+Uf5qIT0eCdyty8XabxZTOSLe3HV+Aanc + xKIqwaouUrqsf3zlUsPhk5vbNLe5LcEiXOgpgXJb5q7tBK0L4PrBW0q0h0/gfW1hYdBVMn02FqIy + WOk0IwoDK++cCAwBaqoqZC0jJzrub3h+7Fg7hv9RjOO17LjxV8+qclUs7he2FujZkddGAWiqJUAZ + oV16Z5HKu9tGRLLjTd1ZW9y1Zd/bnJ0zCBzO2d6hjXaNrXEjPUdfpqeBMIDCwjQQYX5oX4QRpcUC + o38oPR1u4GBT+3qagJ5GnKlvpKcDWw7ti+lpwpnGWZ3S0wQ6jdhDyA1N9PSToAwXJo/V0+TQ+4Fx + BwZP9PSDOJ3U09pehfFj9DQHPa1kxvVR3oGgDuw93EMoqB+E0gtqonu+Vu+DoPZ/nRTUBDgNBv9/ + L0E9Bt0cZ1DXFbh0Tmwz+AyN7IWwY09SBGrxAT4bkcgP8J7vTldjkiQqIb4yR2UZxC7D7P8c9Rtz + VF+53TETpmCxkOF1AD/kuogb128p7cUJ8vvmzUijqX7N4qH+c7DnOZP6VSKW+yT0d6PRsYg6xaKn + dO9Pw55PHEZBV8zIYy5JYIRMMz1grXsHUDRSdr/eAVTUM+HFFxz2hrrpS3cKOGH9x96ydZ15cxkp + ruV4icbeZhEhkqfelOpn6q7/wjkgiF0f0qDggPUivPcivr/fui9Og+rIu/aT1T7SZdryZu3yF0Om + PP4Y7Nhr8qeDcaTodOtmV3miFUChj5Nze+qrwy+4EBDtmXFLdV0qW5simq3o6LaAmZtJtseS8CJI + NPXNzZ3OX/o4t7RhzhCQNsL2MD3v+7a83vXupol2K43xQM0vQ9n7S76xp+7TC17ny6V+O/zCh+1D + R6nja+lpI4Ii0zW1K8gqvOLg3jn4Xih0jKvD7Lh6rl3wk3vfj2jwyuUi2BxDD9b7OHA6JYx79VkU + keCgqe6OXu45vrMjOXPs1Ye7JjRc93jpLnpoYiDUg9t0N4YID0+aqsauNGWMT7f5rqz8RU6lTna3 + j8W292uOzgUYhwPBC7sxfQ1qfM11MX3rp6Xa/wBT8mkICmVuZHN0cmVhbQplbmRvYmoKODkgMCBv + YmoKPDwKL1R5cGUvUGFnZQovTWVkaWFCb3hbMCAwIDU5NS4yNzYgODQxLjg5XQovUGFyZW50IDMg + MCBSCi9Db250ZW50cyA5MCAwIFIKL1Jlc291cmNlcwo8PAovUHJvY1NldCBbL1BERi9UZXh0L0lt + YWdlQi9JbWFnZUMvSW1hZ2VJXQovRXh0R1N0YXRlCjw8Ci9HUzAgNiAwIFIKL0dTMSA4IDAgUgo+ + PgovRm9udAo8PAovRjAgMTggMCBSCi9GMSAxMiAwIFIKPj4KPj4KL0dyb3VwCjw8Ci9DUy9EZXZp + Y2VSR0IKL1MvVHJhbnNwYXJlbmN5Cj4+Cj4+CmVuZG9iago5MCAwIG9iago8PAovTGVuZ3RoIDIz + OTcKL0ZpbHRlci9GbGF0ZURlY29kZQo+PgpzdHJlYW0KeJzNWVtv3MYVft9fQaAPtQEvPfeLERRQ + EjtJgRZuopcg7gPF5Uq0d8kNyZWq/PqeIedGLvdiWWkNWwI0M5w59/N9M78vfl98e71AifnX3C5e + //ALSm7bxet3KFHJ9XpBOU2lVDJRRKRUcZ1cr5IXV7vdy+T64wJLmKQMvjWj39Xb3abMqrzoJ5lM + uRBu8mrf1dusK+tqmBSpEIjYyeu63gwb6hQjzu3wum6GUZIqJaQd/UeZN3Vbr7t+jqqUEOLmqODD + KAJhqbCjWPWDr9/hBBOj1ZLD+VRKkiw5TiUn/bJ6PZxGU8qwst92d4M2BKUIc7fjJntY7zdV0bb9 + JNcpFZjaydl9dk2dw/Kyuu0nBYYvuNN/VzRtXWWDDZiOp1ZZl6Xf3DR/e/vh5fClSCXSdvb7osvK + zSAEMxJS6YV4M0gBhpbcSWE2GtRRsFg7Qy/7MZlSirDbGc51K4XCTvF2f/OxyLu/tk5UwYTbpSlv + 77rWH8FhP0Hp8SN+Nuv7YfCCgmBBPFmC1aRWarB9PWPIm8LrFcQqK4iVbbHyh0sGVpKXnE3BE0zK + U77L8tx5GowcHXvz6GRBSJ6OmJW3pxHcW97a08sN3kUMf77cs6YqmqzdN0XYXD3NKLObN0XbNWXu + M3rJtEo1BduMfHgmGbxsChTnSD2TcEesvaubLrspN2X3GCJFm0rwTOfWE2+iC7w5BBaV8eZl5Qqf + kDRYfBMVUJjSmJ0SJhtKbrGy/lEk1QR2G/lnVeRlC5sO0jEoC8QX9G32ydUrOA5hGdIt3+xXbo4j + CCtMgm/XYGE7ZxqJrbkYckcyAjUXDKm0ZrZpVF1jqz/jqda+KbQdyN6Pv4UOlfLkAfrU3+Hn4+K3 + f6NkBWOaQ3lJNdP9b578/IPpYNh0MAyNQXKNE6FUyhhMbk2ecq1YGNosfjHtD4N2WCCRSATdhEre + n//P/famaJxZIj+4kGZxC1tDHXaWFuAGMOLIzvm+BW/Y/Uxp5L6KQCbt6qoth8B0GhPNQBZBRgoc + KGU1IFqmgkIJAkfA2QoPth2dCXHOolg6OFPhWChj/X3rhOESXCZZLMuhfFaW0GYJSgQUNOXkeRds + BHsGZQBj6ImH3JDZ80muHB2MB4ehuEzPFiZ8aP1IuAOBzaGX+wlaBzPxivt4xZIaxAXFIEVUg7wy + NQ2ZcIO8mmKxBmiGkyUy/3FilwHKkAkG1QSEPiY8ybew7F/wz3soyHuog5HiYldyyVMioYEJAsHF + uDQrUfjLWjxgR5/qZhVlKUSbmPodDIOQdua+NCnKYohEbUJUu/K0isCPiVFIu15ermjKmerFTQG3 + Kj8yE6HDAgGJj6keUhWnLr/BRy6/3zf1fbmyyJZBlcTci7EFQbsmu9kM09L0cId7CvOVg8TcoD7t + qn93lw2NhZgY1E7zbCZYd015n+VDnjIcJ3JVd6XdnXKwjgfPD2V3N+zO4uIFbbeoutJiTSjdoi+i + EYrqe8wrj0aIphdU/dgXxsfBPDbPAOLhVGAAyaOyeAb5zvTw7nFXtK+8wpHdqpW3ZjDDadzlDRo+ + aKKebNqv78lZ43FdNLob4mIVGIboux2BNMOmPSyZRTZm9Y8/vb+6Cj1t2r8giyB3mAYN4EuQCQJa + JIyaWjfUhHHC+TCGEMcmLQH+HzTVUef+C2YzRjoe3CfCd7aABgWp6Tfcm6nelDZ+oTJEPKX4T9l2 + 5oRXM6SheP/jT47PIYzdN3ldrY1YJoyhe706xHFl1RW3jZ8z/Vt5bbN7CNUs6nzgIoBGAHzGsZm1 + gJ4zLxqsQdTXg/loa4t837htGZsESldEcNn0CGT48ZLocOaTPGEKyRsDOs3PleWJUMoRZ+70wSfY + gAOpL/JJ6ydCGfKEXMb7HPP5vImOrb6D5R42MhWRXFPJLCAey/lY7xvnQJZqTPCEezS3WVX+EUCz + IUCY6JPaAPBZrwePkxFkyk1SZXlXN21UHT1Yvi+qlZ8ylSw0qqLLewr/rXXN+LrgV6fFmGmfEb6o + DLWzpNQIwtmp7FgyClWEqwk7O50ns/47yB4OH2lvhtmqcCSPjzTAchjUPYi2OjUFkAFnXBHfXTRF + XpT3bo6PQOw2AwXhx02q2E7O+ybCqTMreLhqt+VwjfGdSyUdG+DXKOp4yomknxV1xx03qRBcjOrN + rdGj8yU9tOWsGvxASBw+YDDTWG82j6F4+YKRQXDk5c5zQ3MbFYjtnTF2dKekTwfEXfZH1qzmFJpl + pfPXI6PCueSAdgXgualhZxzmI9g4zAafMrSb6WnwRVwUAC9isO1TqKgH91TCLlyqiI74oSkdAeie + KocCvhZmGStwoNSUWQKYB7wCVevPYZaRLIfyzTFLyknKnDxHmCWFFsMnHnJDI2b5Wa6MD/4CZhkL + dyDwiFme9dNJZmnkVRB5FzBLBp5CiiAK2h0wy0jeQx1iZnnWlZ5Zwjkp4Xoglu6Pk7ySmrLBsf5/ + 8EoiNEQAmCYQSz90lFlCnQaHUfw1MMuvE5wDNGFQhNnk8v8MzvhTwfmk9Z4nfifYHEHAUjE7y+aA + wxEAnILzmW404XD8uTjckUABYD0DKayRZoBBfz1hO6QJLT55mDl6pTCAIb9jgA49Cne8Pcrsdb3Z + 1A9zD14nvNvsNw4fArQwt+BQQMbBNhswN1n+ab+bgVz+UmEp4QPF1DORuHlXvPF2CHhpyvaEee/i + +GwsPBFjPh1N7ltbY6fsxrmDQu8iE1qyKtt8UwecbGAPlycpRrvP72bOieLPSR5deB27gZtN+Kru + ZoDrrmiALjjV+Th+Ln8ePH7BZ4I3Jo/mTSk45m2UQKNrrHz8GA/x0Xf1wKit/cFcxPTl8cPreYx+ + mGHBkF72WQOUlltgHhG8h7r5BJ7Ki5h36ZGzjgf1kbfqo+k7n+3fl20G3c7icjnGtHl9XzSPntuH + l7rdJqt8fgaR9tXK7mQ6aqhrGBxBkXLBD5AaoQme//Ai+/DywwtpfpWl+e2THKdaidNaxAcAG5PY + X6Mc7utCKn6ko2Ap4LRfxoy0TpVQNELTbmQKpjGGlicsmP5aeFEk/lSjKSvCmKRSWDz6/KwoSHIg + 3BwnkpDM4hAcjx/boOmMXONGRoTocg/GZ37RO5uXayrqiAud8c1JJgSiCnwREZI9WMNMMTb3xOZE + PZA+pkFnfBdIkE4RlDlLguwfJ0kQpKAShP8POZBR/7/pTjtPCmVuZHN0cmVhbQplbmRvYmoKOTEg + MCBvYmoKPDwKL1R5cGUvUGFnZQovTWVkaWFCb3hbMCAwIDU5NS4yNzYgODQxLjg5XQovUGFyZW50 + IDMgMCBSCi9Db250ZW50cyA5MiAwIFIKL1Jlc291cmNlcwo8PAovUHJvY1NldCBbL1BERi9UZXh0 + L0ltYWdlQi9JbWFnZUMvSW1hZ2VJXQovRXh0R1N0YXRlCjw8Ci9HUzAgNiAwIFIKL0dTMSA4IDAg + Ugo+PgovRm9udAo8PAovRjAgMTggMCBSCi9GMSAxMiAwIFIKPj4KPj4KL0dyb3VwCjw8Ci9DUy9E + ZXZpY2VSR0IKL1MvVHJhbnNwYXJlbmN5Cj4+Cj4+CmVuZG9iago5MiAwIG9iago8PAovTGVuZ3Ro + IDQ4MwovRmlsdGVyL0ZsYXRlRGVjb2RlCj4+CnN0cmVhbQp4nHVSTW/cIBS88ys4tlLD8v1xTKsm + UqVKbeNb1QOxvalTr3EAb5R/H2wMu5fKMocZ3mNm3nsBL+BzAzBcP/8EDvcPGD4FcLjDUMPmCJhg + SCmtoKYSMS0MbDr44XaeP8LmGRCVSMZT7Yp+cad5HOzU9hvJFRJSFvJ2ie5k4+CmTEokJaY72Tg3 + 5oYGESzEDh+dzyhFWku1o9+H1rvgjnHjmEaU0sIxKTKKk1gmd5SYDfyajCIBX5Pdb+l/Br//YNgl + zAgG08nNdgr4634NgqxBCMkQVUJClRRjTik8AYpRSkNfoBE8rCke7ggkdE2t3lAYyZTPJgJlLxwR + xYrxH96dh27PiyNMSfHe9Sc3hejt45hptT7GdrZfq0rQgiAmDdmp+NfmZChDjJuSwZtbMkqR1KSg + s3exb/N9jhEmRlRmONuYH2AGMVFrhinNJY/y00bLpIyaKm0Ki+9rRyrKBoRoj8esIRVgo+uUx9G9 + hosGVqYZ+nbxQ3zbqBsuNTKEE3hD0k4arbc7fhn7kHWwZE2pUmynrsYg6kp1NtqiQerq9tG2/5a8 + 05xeu/lPlyHYEPu8nVxcp+P71p17nzXzFByviubRTtX/ZdJ2TystzZX8YSqrLxXTlw77zNMu/0zf + O2FW6j4KZW5kc3RyZWFtCmVuZG9iago5MyAwIG9iago8PAovTGVuZ3RoMSA0ODE5MgovRmlsdGVy + L0ZsYXRlRGVjb2RlCi9MZW5ndGggMTg5MTIKPj4Kc3RyZWFtCnic7b13fFTF1z9+5s5te7cmpBLS + CKGtECDSVSI1gmJERUBK6MVCEBBQEBBjgNgAqRZQERARlyIEBEFFQQXFXlBEQYqCICKiJLu/98ze + DSGIn8/zep7fH9/XK3vz3jN37tQzZ845M3MXiBGRRVOIU9rAu/oX3Huq5FvErCKKeWPgvWPSxn06 + 8WGi2DuJlCeGFAy9i49JHUQUX0pkzBh654QhdV7f/gxR6nSiqPXDBvcfdPyL/OeIGl+FMpoNQ4Rn + eqyF+zG4rzXsrjHjBzxx4ibcLyC69oE7Rw7sz5If+5FodALuH7qr//iC2Pe1Q0Trn0b6tIJ7BhdE + Gyd34n4L6nsQcQztFC12kRqzFre1cGNQLXqABdhfSk/lFT6OT+Yz+SP8Of4RP6u61RvVfurDWpbW + XeunFWkztce1ndrP2hm9hh4yJhvTzPXmVjPk+N36zfmXp5Xndt87vp2+Pb5Q/L7kEcl3JL+d/H5y + KGVyyuKU31JjU5NTO6TekHpbas/U21P7pE5KXZ+6I/XT1H2pJ1PPpAbTBqWNSnss7em0bWkH006l + a+nV0uPTa6bXTm+Ynp3eNb1v+rT04vS56StqKjX1mt6a0TVja1avmVqzXk1/zdya/WsOzlAyfBnp + mZSpZLoyn8t8OfP9zN2ZH2Uerj3yiskNMhvUadCgQahh/LLFy9OXFy1/ZfnG5aGX+708+Lx+Pv58 + s/NXnb/m/LXn259/83yodGDpmbI2ZafLzpSVBTOCY4KlwVCoLBQSHKUlbA37W+mlrOb38YfApcf4 + C3wv/1P1qHlqvlqkNdZ6av21Gdqj2ixtr3ZKJz3FyAOXlpgbzM8cpyWXmKeNb4nk0l5wicClO5N3 + JAdTKGVKypKU06kJqWmpual5Npf6pU5J3ZD6buoXqd+lnk49m0ZpQ9LGpD2RtqScS3HlXLohPS+9 + X/pD6U+UcykKXEqsmWJzKb/mIMmltHIurazApfwGJLl0AFzKWR6/vOby6csDy/98udHL+efpfLXz + yedbgEs559ud73j+09K+pafLrpJc+juYFiwI3gsulYZCoYNEWhEwgOQnGC++1Ryisq+I+JdEDq/D + 7XA5nCK+9OHSqeF02nNhyusoflbrj+eRPlhWVnau7OwfOcdPEp1YcOJnoiPZRIeqEx3eefidw28f + fvPw9sPbDr9xeOvh1w9vPrzp8MbDGw6vP7yOyj+/zP5FPdDigJ/o+xHfTzgw7Jdffh5B9Gsq0fEl + xx/bP2//8/uLifYvE2mPe/eP2t8Pd41+af5L/V+Sjl197Kpj2fue3Tfvm18Pnt03el+f79COH87+ + 8McPp354/7sbh88kGhIlcg7eMeBJQasVYjJ1M27CiN8Yrt8LXeB60jOEyPmCZyDC++QcJFYTPQVP + eKn2mIa5rD2v7SLICpALDIq031hlBAQ1E8w8KxqK5m5rnrU08tQ6TRU+zhT5Xd1Gd/rXj/MBV0dX + b9cTrhWRGNf+C09dXwCnKtyfEXCdte8uqrfyx/VVxTs3tJe7hnuIDBe478P3Q+XPVnuWeqAJvark + lS6/TSIfego99QI9RIW0hebRYXqYHqNieoZeoqXko5lg4TSaQ6foN3qU5tN0xuhbOknP0kr6nU7T + GXoeGngXvUuv0AAaSE/QIHqfBtNOeo8+pA9oN+2hIzSEPqaPaC+tpqH0K82iz+gT+pSG0TH6hWbQ + CBpOd9BddCfdTUtoJI2iArqHRtNYGkP30jg6SuPpPppA99Mkmkgb6TmaTA/ADkyln+k4bWLtWQem + MM5UptF5KmUdWSeWy66jMgoynRnMpBDrzLqw69kNrCu7kTmYxZzMxfLYTXSW/mTd2M3sFnYr685u + Yz1YT9aL3c56sz6sL+vH8ll/OkefsxasJRvABrJBbDAbwtzMw4ayYczLfCyKRdMB+oFVYzFsOBvB + Ylkca8XuYHeyu9jdbCQrYPEsgV6lAEtk1dkodg9LYjVYMktho9kY+ov+ph/pIEtlaSyd1WRj2b1s + HBvPJrD72P1sIsuA3chktdkk9gCbzKawqexB2szqsLqsHqtPh+gnNs1wGx7Da/iMKCPaqGbEGLFG + nBFvJBiJRnUjSW1u1DCSaZmRYqQaaUa6UdPIMGoZmUZto45R16hn1FdeUJYafuMKo4HR0MgyGhmN + jSZGtnGl0dRoZjRXXlSWsYdYIXuYFbHpbIYx1XjQmGY8ZBQaDxtFxnRjhjHTKDYeMR41HjMeN54w + ZhmzjTnGk8ZcY54x31ig5CjXqglqorHQWGQ8ZTxtPOP4wHjWWGwsMZ4znjdegB5vYiw1XjSWGcuN + FcZLxkrjZczFVxy7HXscHzp2Wc9Yz1qLrSXWc9bz1gvWUutFa5lzlnO2c47zSedc5zznfOcC50Ln + IudTzqedzzifNdYZ643XjA3GRqPE2GRsNl5XWzg+cuw1fzB/NA+ah8yfzMPmEfOoecz82fzFPG6e + MH81T5qnzN/M0+bv5hnzD/MsfUHfm3/SV+Y58y/zb/O8WWqWmUHYXnIwh+LgDtWh0df0De2j/fQl + fefQHYbDdDgclsMJfet2eKB5fY4oR7SjmiPGEeuIc3zs+MTxqeMzx+eOLxxfOr5yfO34xrHP8a3j + O8d+x/eOA44flJeUlfpa/YS+Tl+vv6Zv0Dcqy/USfZO+WX9d36Jv1d/Qt+nb9Tf1t/S39R36O/q7 + +k59l/6e/r7+gb5b36N/qH+k71VW6B/rn+if6p/pn+tf6F/qX+lf69/o+/Rv9e/0/fr3+gH9B/1H + /aB+SP9JP6wf0Y/qx/Sf9V/047L+E/qv+kn9lP6bflr/XT+j/6Gf1f/Uz+l/OV5w/Og46Djk+Mlx + 2HHEcdRxzFpurbBeslZaLzt+dvziOK7/rZ/XS82PzU/MT83PzM/NL8wvza/Mr81vzH3mt+Z3sMWK + h3tUc7/5vUfz6OYB52LnEudzlOJ2smfYs2wxm8mWsOfY82wpe5EtY8vZCuZnL7GV7GW2il3BXmGr + 2avwndawtWwdW89eYxvYRlbCGrBNbDN7nW1hW9kbbBvbzt5kb7GG7G22g2WxRuwd9i7byXax99j7 + 7AO2m+1hHyqt2EdsL2vMmrCPWTb7hH3KPmOfsy/Yl+wr9rXHcJxw/Go9ac2FBVhlvWKttl5Vq7Nv + 2D72LfuO7VdT2QE1jf3IDrJD7Ce1hpqk1FXqKfUVv3KFmq40VGsqjZTGShMlW01WrlSaOn81+5r9 + zHyzvznAHGgOMgcrzZTmaoZayxxiDlUz1drmMHO4Wketq9ZT65sjzDvMO827VL96hXm3OdIsMEeZ + 95ijzTHmWPNec5zaQG2oZqmN1MZqE3O8OcG8z7xfzVavVJuqzcyJ5iTzAXOyOcWcaj5oTjMfMgvN + h80ic7o5w5xpFpuPmI+ajzmfNx83nzBnmbPNOeaT5lxzntpcbWHONxeYC81F5lPm0+Yz5rPmYnhS + z5nPmy+YS9WWaivzRXOZudxcYb5krjRfNleZr5irzVfNgBWw1phrzLXOF5xLnS86lzmXO1eY6+Cr + vgY/bKNZYm4yN5uvm1vgu75hbjO3m2+abzlfcq50vuxc5TE9Do/lcXpcHrfzpPOU8zfnaY/H4/X4 + PFGeaE81T4wn1hPniXe73G63x+11+9xR7mh3Nc88z3x3pmOp40XHMsdyxwrHS46VjpcdqxyvOFY7 + XnUEHGscax3rHOuttY7XHBscGx0ljk2OzY7XHVscWx1vOLY5tjveVNop7ZUOSkelk5KrXKd0Vroo + 1ztfUW5Quio3KnnKTUo35WblFuVW5XlrvfWatc7qZd1u9bb6uApdpa4oV7SrmivGFWtt4O2tflZf + K9/qbw2wBlqDrMHWcFc/V76rv2uAayC/yXXe2si7uQbxm/kt/Fbend/Ge/CevBe/nffmfXhf3o/n + 8/58AB/IB/HBfAgfyofx4XwEv4Pf6RrqGu66w3W3axS/i9/NR/ICPorfw0fzMXwsvxfrh/F8Arzj + +/lEPok/gNXENHWUeo81xBpqDbNKrE3WZut1a4u11TWGZ/BaPJPX5nV4XV6P1+d+foXajd/oek+9 + mc9UR6q3q6PVseo45J+g3q9OVCep7dTJ6lR1mlrIQ2qROkMtVh9TZ6lPqvNVpi5SO6jPqM+qi9Ul + 6nPq8+oL6lK1o/qiukxdrq5QX1JXqqr6srpKXa0G1LXqenWDulF9Xd2iblNvUd9S31F3qe+pmvq+ + ulv9UN2rfqIa6mfqF+pX6jfqt+p+9YD6o3pIPax2Uo+qx9Rf+NXqCayOctUu6vXqKfU39bT6u3pG + /UM9q/6pOtRz6t9qmRrUSL0BK6ibnEfV3pqicbWPpmqapmuGZmoOzdKcmktzax7Nq/m0KC1aq6bF + aLGuXVqcNcK6E6sKr+pTo9RotZoao8aqcWq8Fq8laklaqpZmFVhvWNutt6wd1rvWLut9a7f1kfWJ + 9an1mfW59aW1z/reOmgdto5Zx62T1mnrjHXWOmf9bZU6ycmciquBq5Er29XU1dzVynWV6xrXta72 + rk6uXNd1ri6uG1x5rm6uW1xFrqBrhusR16PwE+e45rsWup52LXY953reTW7mVtyqW3eb3hRvTV8L + XyvfVb5rfDm+dr6Ovut8N/ryfDf5uvlu9t3iu9XX3Xebr4evp6+X73Zfb18fby3XUteLrmWu5a4V + rpdcK10vu1a5XnGtdr3qCrjWuNa61rnWu15zbXBtdJW4Nrk2u153bXFtdb3htvh+/j0/wH/gP/KD + /BD/iR/mc/k8Pp8v4Av5cX6C/8pP8lP8N36a/87P8D/4Wf4nP8f/4n9bTztfc25gxewR9ih7jD3O + ntDWaeu117QN2katRNukbdZe17ZoW7U3tG3adu1N7S3tbW2H9o72Lta7u9z13X7n7+4r2Cw2m7u4 + m3u4l/t4lLuBu6E7y93I3djdRHtPe1/7QNut7dE+1D7C6u9j7RPtU+0z7XPtC+1L7Svta+0bbZ/2 + rfadtt+abs2wZlrF1iPWo9Zj1uPWE9Ysa7Y1R3lWWawsUZ7z1vbWsR6gNbRWaWHksivpNdpAb7M5 + tI7W0w5rMj1Ib1KRt663nrc+vez1e6/wNvAkeBI91T1JnhrOr+gdb0PWml1lTfFmeRt5G3ub0FZ6 + w5vNmnqS2ZPeK71Nvc28zb0t6HVvS28rb2vvVd6rvdd423hzvNd623rbedt7O3g7ejt5c73XeTt7 + u3iv997g7eq90ZvnvcnZ2/m1t5v3Zu8t3lu93b23eXt4e3p7eVI8qZ40T7qnpifDU8tX35Ppqe2p + 46nrqeep773d29vbx9vX24818+Z7+3sHeAd6B3kHe/yeK7xDvEO9w7zDvSO8d3jvdPZx9nX2c+Y7 + +3vv8t7tHekt8I7y3uMd7R2j9sP6uj/9weaqA9SBrLk6SB2s3MujlbbqEHWoOszxnuN95wDnQOcg + 52B3bXcdl8fldd3nruuu5/rL84yvudLS08A71nuvd5ynoSfLO947wXuf937vRO8kNp8tYAvZIucm + 7wvepd4Xvcu8y70rvC/RQjpBb9GLNNvTnB63pjo3O193bnFudb7h3Obc7nzT+ZbzbecO5zvOd51/ + uM+6/3Sfc551/uk859zp3OV8z/m++y/33+7z7lJ3mTvoDnnI+YFzt3OP80PnX86/needpc4y50fO + vc6gM+QiF3Mp7oXuRT6/+yn30+5n3M+6F7uXuJ9zP+9+wb3U/aJ7mXu5e4X7JfdK98vuVe5X3Kvd + r7oD7jXute517vXu19wb3BvdJe5N7s2+K3wNfA19Wb5Gvsa+Jr5s35W+pu4z7j/cMbSNtrtj3XHu + eHeC+YG52/xQmWjdY422xlhjrXutcdZ4a4J1nzJJeUCZrExRpioPKtOUh5RC5WGlSJmuzFCeVOYq + 85T5ygJlobJIeUp5WnkG+nkM9PFU9UH1QR6CTiZcM3DNxDUZ1xRcRbim42qHqz2uW3DdqnaHxn1H + fVfdCe09V52Ha5Y6W52Di6mKynEtUp9Sn8b1HK4luJ7H1QGX6vxO7ejcD12tqTouA5eJ6xtc+3B9 + getLXJ2krj4q63SrLrUXtPV1amd+Nb9GAJq5K3RznutH10HXIddPrsOuI66jrmOun12/uI67Trh+ + dZ10nXL9BluwV/0Y1++4TuM6g2sitPyf0Pq/QeP/oQbVkORAES9y3Y9rIq5JuB7ANRnXFFxTcT3o + mobrIdgHS3WqTmuR9ZQ131pgLXRpro9dn7h2u/a4bnf1sYpcfV1fub52fePa5/rW9Z1rv+t71wHX + D9Jax8Jex8BiC5sdB6vdlXfA1ZNXg/XuxeNx3c7bwor35gnOn2HL+/BE5y+w6Em8Oq5+PJnXwJXP + U3kKrv7SysPOO/fxQc5vYesH8zRcQ3Cl4xqKqyauYbga4BpuXyPs6w7eiDfkWfxOns0b8ybwB+7m + V/Km8ApG8ua8BXyDAt5S1fkoNYW34kH4Cffw1rhG47oK1xjeRo7HWOk7tIP3cC3PcR7nN/A83oVf + z6fwqbwj76S2dp4g0jZTYuT70o+aGY4PHbnwLT7BYaGfL06p/BH6VdsD+l3oV+UU/Q8+po3/+PkE + a/ErWDUZ3sUctKvS8xmUS0mhcaGS0E+0lPqRFeodei5k76/g7myFtD1Dy+k90LeBt2iapFslJiB8 + J+gsrORFv0bSalpGixB8ip6kYtot7+XeFIWI2MF/bfMeXMPYr5RPj1zybIW8NiHFCurGRtB1NAnX + NJqJZ6NQ2ywaj/JLaVTocaU+3YU6lyiLuEUlaEExrO4s9jGfhXJHK8OUSVgvfafU4NlY49+hjGbd + lOspna7XjqinaUFoGK2id6gQV2+6BW1ZzzaHUoPDSOz4bEG5T4YKQ6upG9XTY1B2R+oY7KHl0+NG + vnKaMuka6kR51ING0wqWj9xzL4kjaoC7fJpKc2gzM0OfhlaHZundENObAljb+dXN7BpWaORTHFnU + RZ2kP22IkvLpevqAfauu096C9R0C3J1z7S3dbrj+utzWLVs0b9b0yuwmjRtlNWxwhb9+vbp1amfW + yqiZnpaaklwjqXpiQnxcbEy16Cif1+N2OS2HaeiayhVGV7BAQrseHUYEEtvlBzpmtM/wpQU6dj11 + Q1aAopPSM6KyezYIJwlo/gBV6xKIyeuxhnJa9Azo/ouedw3wTN/pdGS7ISmtQ0DNxF9G5/6DAnW7 + 9UjP8H2SVP68J7IEqrfrkZ6eFFAy8XcdHuGvc/+0QQFfHuLTk8Ix1wUor4dASejHFoj0tUjvmRSg + bj0CKbgtCZ3Cfc+e/9DCTRC37Re1sSub6VvTMbFd+wDFrKGOPwYoViQ61YICdFWgrh/N8CGEohIC + lBVgMacDrFqAxd6ABl9Uvsh1oEXl3ncYNCKjw6Dh4OKg/At8PBXmYnrazLSZ3XpEZSMoW7vGabXL + aDfYanAFrbGcCDoRQq6CNazjNUwGlI4dWq1RyHSDV9GidR0ERgRyivMRyGgPJuFJtQtPSkLbH6n4 + iJAtEqoWDrGA3i5gyHrThgdy+geoOG3NFdtnPlLiowH5ftegjEH9e/cI8P5o4xrimR2G3RKo0SWv + F6JQCZA/LE2Manv5JcYorcOwtJm4F2nz8Z3RXoztRfGDhg3OF9LA8jPa45mjXY+i9O1JgWjQDoEo + f6ATknW671ASn9khYXiauJ05sygtsOSmHhWfpotvDHUCmj6zQwZqQ2EdRrQV45UVGR8pc9cNEgPR + Py0wZcCIsHj1fyQi3OkzfYGOZ9MxDBiISC6bgYPyR4jmjugvuthhRNrM4sGym4/IbkEk0zqMaC8g + MkLA6Vbk7tWjw7CMDuBlcbhCdBoBnlk5b3p6INEvMs6c2UG0r/8gtDzcXjy40Hgh9kl+hva0C+Tc + IgndIvmPGnP6t+9pR9kJeols4kl++54908Nj3KVbj3aiPxn92yeFe1kek2/HIKJD5KFobcZ1KCGQ + NjBNTK0MJG0hvga3oJkDW0hepfdkyJV3IVdAy/RlpM38g8Swnjh+cUx/O0bP9P1BItgxo2P+zJkd + M9I6zsyf2b8kNGVARpovY+aaLl1mFnTIT5OTnCF+c3FSoOMjPQO+/GGsFQZayFzHbmKEOqYN6x9W + CW0y0tGmqJ6Rx3mXe0yQdMg7ZtZMH9oQcEHhJKV1FF0UikMoEzEXUfutPSD/A6Wsyi/Mi5tRapKY + IbxnZofhN9sdhxTawiLU2k12LApJTxdzp7gkhwbgJjDlph7h+zQakLSWcrL8GLd88WR75EnsreLJ + lMiT8uz5GRjDLjf/myxXlOOZURnRaS2zZBPSbZXQrgdPUnqGQ0oSFyHLD3V0VSDej7CSKboPjTcT + 47U3I+DzB7R2PbYnXdUzzRcFdSVG+uaMLjf16tEiMthQjXsz3mNCIVKML8CuCrA4EU9QkFJL8/gW + eFieMa3DzIioBZR2t/SoWF5k7l1cR5dbIiGZIZDrj6QL318n78OiOynpPqGfFGq7JoNNv2lNDpt+ + c68em3xEadNv6bFWYUq7/LY919TCsx6b0ohyZKxSHivu0sQddRFTY61iykdJm3KIpsinqoyQ9wNL + GMk4MxLHaGCJEo7zyThhgKTzQ03wVVsXJ0cGUXZUelRmelR6E3YmOJ7VCB7S6W+6U6uLAnqFjqhJ + 2qdUm17MGZGWytw1kmso0fHMHZUcpXi8JiPGfCrFPBWbk67HPpXQKCeFpSQ9la7e6GDkYG6HhmWU + 4nE/pVejWrEJM7JqMXet5FpX1+I+Xit5RkpsSi3u8M3g1gxHTl0+UanjuF9ZUpf18ftZ9QTfDSd8 + J6LjW2adyOrXt0+fE1nRLanNib599uCmzYkdffwk07Rs3Eg8xl+fPiwOzoOaUbNWneyYuOwm8DRq + Z2Q0zU4TtKaR0axZdhMk0Ln68Kzgzx9+FCy13p49/aFnXng618+ix991oPpbsafX7Dg6GJrm/ekf + BH/cfOfTK4tmzp1TOvLeY5vf/nxF3+XiTLI7uJIO37oGzc1xNIhnydUaVFOiSkJ7c/Kc3txod023 + crXFahA9mpAYk0AsITGeEmIXEQZcMWssTOQ3Ohk5mZs7vU+Z1aonUnxiDTWheoIzeobmmuHMSdEm + KslOcCLlIk60bJkVn52VBR7s6SdZEN0yq8+JPS3BgCKzoV+b5NtBffr4wQV0k2JjSPIhLsIH9L9a + emw663zXCxuZL3jy4Obgudi3fQvvmP7SqhnP3PXkNTy67HE+tkew7Ksfg19+uLtw6ocLFq2dwPXV + QmJ6o8/JkIRYSqNpmyg+tCrnFsvXLHY8vnpFj4hWxnhZP9dIl9LNGmA9aPGm4kwv9SlkTVMUB0fH + fdWecquJ6HDUDJ+3RmoNxaPVmKFRXLEzpyY6nC46XPNCh5v4TqCXn51AdzHY6CruWp5o3EgMs0iE + PkbHxigZNSnKl94kLj4DPVR4XHSktyxp1paSsvN7fw2eU/QXDyW+lfhx0fIodVnxfbPnTnqKxy8O + /vHhx8F9bCTrwTNLXvs6eDA4sDR4esfsJ98QY5wfOqL1RX8T6c2cK6sn1E9olcC1KGZ5WazJeCcH + Mx3M4Z6NJXV8UbzipPhqs6ma4Yv3KW7FcsRNii8JnVnvduutETiVk+h0IqTFx8Yr3vgcp6+ZbxJ3 + iae8JPRFjks85TkGZz6OiB9zkh3OZknxI5Xq/E6lJIndlsTqJDVPui1pXNLyJI369RkFBvgZGAJO + +f03nPD37QN6omVLRNnige8+fTAzBLe0NPCI0psQmFRbMozApebZOnEr+F7wUTaaNT/J8mJ3ub5+ + 8ftgKVO+W/WZZ1dscHMiW8j64FoYDH5avDS4Bzw6FNy94umfxRseDKsx0nXMAxfL3EQ8dCbHEl1y + 5jp8zRwloZKceQg84nzaqUxzzHEoyjCVsVy1hzoe7vxQzlgnLMvHca4kWIxpVqyVaXFlOpb4KyxO + W6xvLYXvwpMUraGm8HHacm2jtlP7UtNYoTZXUyhFaaggXlmubFR2Kl8qiFfmKoqmWFydoDJTTVDr + qi1U1UFOkzPVcCqTSbaPSkJncxyC5eTQJhslodKcNHFn5HjobsVt3KGM87DbPPM9iulJ8LTwHPWo + YHmfUWHB9AvJBK+bUFZ2dptsMRGhoiCW/fr0G9XvwrekzA7iEiMGN5xlsKiMqHTG0nW9JNh3dbBv + CaIeZY+zDPX78+kC2ubzrdR3xZzrGjrCj6hXk4PSWM2cJqn13VHNjOT45DrJzZNVZX715dU3Vt9Z + /cvqGrsvhvGNnp2eLz1HPH96NNOd4FYgnyWhAzlOZOKN3L5mbH40PO+cHMGD6JxoV0xCMzM6IVpx + U5Iren5CIzMxIbFu4rDE8Ym7EvXEuHlJPmOeKy4tLR0FJBSGn2KZmgjBzkkQhSRKuU1M9EaztMJU + Kc6pJaGjr4nYVLUkdA5VIU6d5o0R1FsSOpSTIB56c2qmDlPSvUOU22qy5TVZbk1WkcNCoCWLm2DW + +/1g8Qk/ZUk1AJ2PW394HBo3kg9tBmM92jQjLVaq/Xg9o2btpr707CtrS70XDQURG5XB/VODQ8YP + 6bO6yRMHn92tTO2dcPf4UnNLLHtt96EtLP6X72+67ZYBD79cxMbcM7T9etbp+RNl3YSc52IcfsI4 + JNL8nPS6CS0SlDpmcxNqzT2vs850X3y1eR2IcYrDxJ+G+X4gMvE/y0mSE79T/NB4hTRfLLQD903j + 0fbU/zYnOTL1m3MxHdQoJSl+BOb9EOVcEpgy6qJpjlA/e6JTm35Q/W0AOcc1e1LHhWe4HmYDZriu + tPwx+Bvz/rj6WOxbalG/ohUr8KW+FXssEXJnMgerGVjWb9CeD97fM6jvsoCQOvRW9aO3MZREX+U4 + qkcxM61afDOXEKYOTk8zsxrzDWXjmOKcl5RjJbEoRaekeQmNOif0SlAS5s3U2WCdcd1nRMdHKw6K + 9szLJGYR84JBUdOiY6dBLH+VHEJgf45XcMCR5JzGfTZX9ufUvoQryY7hSg1w5bbkcclKbvLR5HPJ + XCjCi/gjJ6awGNJdkFoQvDkRFhppVDBP+wrjUc4wiopNj4vwqprknaF0/Tl4iFXbf5B5S39wrZs2 + cLH6dlxZfvySMaOej0tkmUxnKqsT3B/8s0HJ2sF9lq5VZi9cMH+RkBS4dsoAWI0YmrWJTKj2mxzu + ZnV8TPHMdbBo4vN0r7I8ZmOM0tzZybncudF5xPmnU3fymGidCsdzZvB4Xodv5Dv5l1xX63KGv9s4 + m8+Xc6XcYLyREy35Mz6OdYpbHrcx7s84qaEwV2AZRkHvl7Vsuce3o08fMWtatmyDbkOShOKBL4Rp + 0SQ+VgpJbHYsG7bl6adZvdubtGjVod17fFbpSD7ryb4sz7XUuqFf7yelPAS7SS2UQBksZUN1OYOd + mOfrRcAVCSQK8WgtQsszNmYodVOY0imR0Yq0Etj/W2MHxyp8ha/Epyx3b3QrSieLka3yOzDWijEe + C0O4DlpKFQYxITquWY15Mb4Eb815nrjmGhK3cfv01ppQYNWsqGaaOU+pkRjnKiSfrdKP5sRJla5P + 03JQjJY6LUo+ihLtqiMeReUYUfFRdaI6RY2LKoqaH2W4lUwaptSKGqLkZh7NPJcpBOoiefrMfyKs + h2BTd0DXwKi2aRNWO33CaueCeifod3+mLx16JztG+CBNoYOUpj74I/FNs3lU+azkR4JNdh15++eH + nnhgzd5DoTdXjduy5b5nJsyaMeHZbkFaPWf1rM+aLmB1z0PGskZ0K3Oxc1M//mjHB2IkiiFiubC3 + wmvPXqst0AU7fKJvOile5himqVTI4IduEHFssOk764coHIYYtPGj3WIbqClEgOVuxUfNfG+3kNkL + pdbdqBDThskySuUMrVCYisL8ZaKscEGiEOSS+fVMyEcyvbGJaoR+XgfnBbrv55yGCHSv8XANhW6K + nxqvxCey+FimJGnuuQkxUXG+aLQ4ihXSE2aCGeMrjBKGWCqDqCfMQodqK4gvcppLBZEDf8tJKamO + wkaNuqcyMzU3dUXqV6lHU7UWkvChqTtTlTqpt6XOT92IYNhNGjWq4niewVhGZfvOnJC2uw0c6hPC + eQ4PpjTP0k2OukCzY+FmxmPZkBalZ269vueMh7Zc32vGtK1bH37hWM6IJzuxjsrqhwpWlpk2UTOL + Fm+f1C44IcwXfhx88dHYnAZzzBdMhfEoPorP4s9xzcFZNShgbnFrLnkUn9ere/RCTfYaUn44zAmN + 3IUeRcR5SkLv53hEnCcnWhumRHkGKxfMpVR86JTo0wm5HOorVwFpURX7wnIfDbChW/uMeOKJrVv5 + s4uDE8o6K6sfvEe2u6LmhzdLT+VY0fMsqk6dIRhiel0hJ5rPNU/TY/UOOndzXXoBepzJE3hdzg1H + vKOOg8co3mlQUqfW29pqb7jZHHrfZ4/pgbBZdOQk8uFKggO2LpHlwvM4mnguUbW1ut0z0TGhzamN + 9APa+Pugf6yJUN5hR7aa7e6LyaW0hMoO/nYwbPGEqQPUq4WmDp4LfhcxeKXX7Hn/gz3C5IVHSVmL + Prupc06CUEmKS1HmOn2GV3dohbocEF30IkbOsxwvjVU8+mCljnejVwkrjMggiGkW5j67SHyUtXW7 + PDF069Zxz9RtyCe45pdFq5lPrjLF3GsDzyKA2lMZEx704Zyxopb+YX9f4fKbxlUXuvS2xKGJ4xJV + Xh4izRPryfQ09ah8mIsVOZlS19nCqdB4iylwAJNVio6d5/MZSrwyVBmnFEkv+YjyJ2yyos2jOOFJ + Kg6lWmF0gnDp5OAkFLqj3YoMKpDCjaI1ilmYHBnPZOGzxIvYZF6o5KQnD8fybohSJ315+gVmhEct + 2u/HgvWEP+tEeFGyQ6jPHdJX7nex7pQ3zK+l8ey4dDmctWo3vRLSWy3DHlhVLNoVPXhDzFaF6WPv + Hx+c8cqX69lzji3Wl/0m5bOprx9JZN3f6n9dbuu+Y2Y/9Erwy3m5Ha5p3mfiglnbwOWM0GmljtaA + 4mhyTgdeH6uSlSrjdZ3jnYrT5zbmWd6Yecq4OOZdHsfi3JavcLzBDCPeqGNws67B8Lfc2GjsNL40 + VEMaYSwa3gobYWN8AuuUsDxhY8KfCeVGOGKDv+jzLkzwCWGD98i1mF8TjmntpsIOR+GKzYgSJqG5 + Uuea68bcWX3atC2rVjVv1LiB4rr5wQKl15PMDJ57suzpu1qb8pcIBtEod1lpP+9Vf1BS+Gzt1T+u + kudZXxR99ff53mWnne+ZSIUVA5M55BvURn4Qbqxz//nef9/nfM+OL//4+ik9xH4Q5kFLsVqXdIPy + Jd2ijqZ4oKuRTFO17tSDFVFvZSXdD3TmydRWXUWjZNqV1FZS5Ef63sBBoA3QC0gFutvxA+xwdzv9 + BlFGOUZTXzOVRmvdQ0HUt1TbSfnAUhFWD9JSvWX4Hvm2qETNZfxoxK+UacPPu19Ih3Bv5Gtgh13G + o5QIagkgPhPlFMs+t6R0/iZ1VkeEzqAvon1dgWLUkQsqgTQ+O1zMPhUIleC5DKP+Ypnefi7Tr5T5 + 2yBfBu6LEE5COyxQjwgD9ZRV1FKJoS2gjdH/HuF+AzvD/Sjv007Zz67/iAptjABtmoD2HQdWAZ9X + aFtlFFVCHs+mQlAxFo3lOO2hYer1oSD4Vaz9RCQxnpqgfweBNmLchCSinXkI9640noqom5+hbG09 + 3a/PQz8Ggd+NQ2uVs+RXjlMDPZNGQb662u0ZUC4TgygG921BswVPEH5U4mG6PcInwRvUnY9xzVV6 + hM6oATl+twiwnTRJQJSF+htK/mPcWfegkOvrkaYXMBnxPgn0PSKTvCZ8EhKyYsthOZWyt0ppGfoe + 1ARSRRsikHJmQ8gFyo8HdCAZaACcA54HCvl99IycNyvlHDOR3iXlFTIjZFPKB2QDZQke5kqZDfdh + qRzPMI+XIf8IIBFI11fRZBtNUYYYk3xbdrdEyhayJWQmQiXfCXxDv20+dy2noi/VZFrFrjc3QsW8 + Q5s7CarcKuVrqfI7tbVltThCI22Q83ZlOB7UX6GvDeQcEXQvZdj5iiI0wotyujo8J/QJKPfpSPuB + 1ZKma43D/VHvwViepesdx+hxpN/Cl6HuYZSOun8Sc1zoNGUeedXPabbyBU0TQHgNaEGF/l/Eq8o8 + iNBIHyvTCrwQsgw9E/oQ8/Ep0J9A14L+AfoW+i/mbIzQaWLOynJJ6o9im8/Fl+PrJfytxNfK/KxM + pU7caetEyJdCooxw/8W8FnNTzu2wHG2IpK9MI/nlnBP8D+uPXFsem9m4C20sFfIP/MpzhQ7HPO5I + 2fpGyub1QLGM1hsDoNBF9crn3lg5P4QdyIzYgMjcjOh/rQ3dVUH3L1V/Am+E/rd1PmSmL54PEXNX + tvdpW3aETj9OE6S8TQXPu1ES/6Fcl/fGs2J7PJJsuxB5nqvOwn2urUsbkEcrBG8LwatuZNo6VT4T + cdI2DaEG6gy0b4vU8b1FP0R7xNgbq8HP1eE0sm+paOdOW/9cbfcJefVsjCvCRlPStRjqVa53RJ6l + 6OfKi21HxJZKXqBM/QNZt6WVIn4CjdN/QFnxSH81xtuHuKtl+/qaLpmvt7Qz86iv2ga63If+rpR2 + PldbSSranaFOQNwEm0ezUO6GS+yhtKV8pZzDSfoCyXePugDx7TEmIyDPjyN8FrZlC2hWmMfaGdDu + 0GXhckjWTTJvG9sGfy7ssH4MfV4g66GLxglzh5eAwq4bpfS4iIPcZQhdCQhZTJdzKzJnRtN/+Qlt + tAM9Ef4EehpeRCiXfUSz4HA1Iwo2lXZsD3TK49Sa94aOr4f5vYcWKI/D9uwJh4HW4h7P2gC9gFzE + 5cn4PdQZaG3fNwCK1CE0EmuF1qCt1fuRnzCeebKcW4DmEWAO5/NRGOMhNK5C+UBoiMSecL6KkG2N + 4NI2d7HbLNrbpVJ7W1doZ7iN/9A+2Q6UK/OJNHuoHnj2LZAZpsGbQJdX0p1F4PFHwDlA/ErvYNim + hly2bVVtuxqBuP+oQrzfhrCP8ZfYt4to6PS/P/9v6D/bhwp0HOr57XLPITMLII8LhE4Qcnk5uxKm + odP//vw/0/9kGy5LL/giF1FRJvue1gJjAb+kZ0KFEag9BOBfV6ZfggL62+KeNQbaIL4XcDUwFsi1 + 0QDwA73DaUOFPANYEi4rEla6hQqVvggPxhyKhOugDZvDaURb+CI7vQdtFm3bQqkiLKgyhPbIuN7k + Ut+mphVnfiRO7R06K9Nm0ircyzzCf+XX0wz0uw4wisPXFRQ6NxV0tVYCH/N+ulpQgTAPwlBKyBKA + XekmAH0mdJplloShLkV7lso2dRMQfdG7oYwVVAdzKVuNgb9YgrXW1ZQt6hB1i3oF/kGBJVUIWxX6 + Kd4dFH05BgwAugs+RHgo2sy/pzlE53tfjCCylbUmKr0e1AIaYC7Hg8JSlK3A80JgnvY29UX67xGH + +s//jTioqrJTdr7JIp/aF3ZmMsZ5FTAZvAG03tQA/dFRdx76kxd5LsoTQFisPWTbtFFYU6RTd72p + LEfml2UuQhqV5sDG5EXS49lUAa05ym1eHp8FWZ4qyhL5RJ122XmyLdGgjYF9dh4RFuUT0iyizuhL + ELozlfcODkB49MUI/hDmVfAYT4V9CNIiJRf2CbYPeXy8d+g91EMivzqN8sAPH/iYiPR9bT6+KfgI + DBDv6qLuAZDBfKA3yvIAk4F8iS3Q30HIafi+s1aH8vSPxRhfaIOQITGm4bkZkUXMCcif+ib8McyZ + CBVyJORdzh3MEyFj/zBXBToD71Wcq+W+aETfCT0i/AUhs/ZankXW1DOoFex8I+Nh+DYfkQofY6na + Sdpo6RMLnwVjWXyJDnoRtBX8L/gzwqcA/Uc/ObxrIu1OnE3TLlDMGZsfkbko5pOaQ4Nkv8vAD4QF + 9K+pWkWwzVRXnRPeFxHzMjJnIpNMHxvmGer5DryHXQuWoT3DsSbpbe9z5Ovh9RE5iuCPPYq2wOIJ + 3qHN9UTTgPqYkz+LeSnmJ+4bivkvNnHsuTsMekazUb8ilCm0Glgr9ILUDQ+ExzPS3/+WVpST/004 + ou9sUJiGSsMgM6IH/wlCL0p7UYkKPSnsQoRG9GVF+yDGpuL4/DdhqWMBM0QpxqehCeVzY89l6Jv/ + FR0i5F/MwctSyJ7kuZDBCuFL5qs9ppeD9jtp2hNAxTls2wcpAzaFTHaEfN4NCL/2Ody/bZZSE/MV + sT8Ymg68CvQDZotnoGPYMGqi7BbPg8/jvhd4INL2sDG78thUHg9hL4XdsvdIKqKNDbUS3rf3nuJt + yPQXfKmLfLHiS+iFNf3SCj7Q5Wn3/46K/UmxR/gPa//KVOyL3Ry5v7AnQAbop+V6rhKN7AOEaWhN + JbpKrPmE/qhM/6Ud/6gfL/ERL+VfxX2cCB1i0+Tyfab/QC/a9ymnoRP2ffz/wBd12XZA0svsS3gq + 0aRL9pUiVI4Jue29WuHTdhV7InKv4F9QvicJ70dA+9HG02HY69ZLoP2C54DR6GKUr5svAx1el4Dx + XCX0DEPsWYQR2hcG8TBCTwkoG6BzAX6+EtaFof7zfrGQC7GvSMY3Nu4NQ710L/ki6PDwjPHA+8B1 + 6LPYD/kXXK4eo1kY5byP8NLmC/r2C/o5vkKbZf2Rcv/X4/i/HJf/s37/S9srQlnJOOblXzYVe9H6 + P7YbHqZ+A4DVtv4G2hmezx2Bu0Ue8PUtYC3wgI2wHLUMnQUOc3goPAEyVSHPJXIwS+4PFZePSWRf + bhnqPBKeB2JPUEDs0f4Tfww4QzpWIBEq9/OkPWA8bJOCu+ArnwH9CvZnKejPoJC+4LO2zdoGXG3f + f2WnW30BBMsY6iT2c4D2YQh/TfqNyy7EyXjUFWoQfhb8JVyPLKepbSe32b7e63bb3r5QZ3CN3VaR + pkele5HnYLg+EZZ1bQbNABbZ/VsTriv4pN3PonC86JtMv+YCQtxu880RYP36K9Z8cRfWs/8l7UET + gKswfpZWhjG72rYLV5MblENuhlewsYp+t0xzU2Q+Yrzv0mJohHow9LF9XucyaoXP0aB3YyL2joX3 + w5Ngwwq1naGPI7bK8CDPEpRTFp6L9rnMCLH+Evu9vLs8z8tQ/6SYiF0RZ0xyP/SKSrr/Tvg9dyLP + u5QLZKvhM8ss/hKlqV2R9060SZzPxVBt7RN6U+zpWbfTUsd4Wmpej7VEPsrsTEv5QCoWccY1uDcu + 7J+LcyLY5pf+p/stF/sxl+zFX2qf6VI7LvqGPvmFb1CxzeXrIMSJ/pX7A/9hLwt9GYKyrgH9G3TX + Zc4fdJtOtMsdUd4nhdryMeXnEcVyfbaC2qodqWVkPCJ1/xc+Sfis4oKvGB/xFfH8kXKdaO/Vi38y + q6IN0/aV240MrRvGuSP6N6D8fFecJXWR+Q5Qsj0eYdvyqW1XhaxCeyhdcS98soelv1VoA2mxjhV5 + wudiudo7tu2R58Khcxcg96OLw+fQoXNinSshzo3FGSnaBPoRXyhlOto+SyYV5amtLzpTTuIfSh+j + nno31RPjDlxh9z03QiX/2qD8jnYfha8TkvlNrAfC+/V2WuMxIAEoRds3UAafQxm6C0gkH9asxeop + KuY/Uor6IE2XZyZCfvfA7xoaKhNU9lv0eT7FVJCR8JkjfGVeijwhtPkqaqK7kf4Z6HKbh3INL8oT + MtJV2ogRco4fIE1AE+c692LO7qQYfiPW3ahDnk+QOEcLlYj6+AY830BJjn7QF0ehR8Q+13a0bwH0 + xVuQv87k5kHEn8P9fVRsNCVTW0ma+SfmsZgXMXQXyusszozEmU65DKrQg0uRz6aOT6GTfgefoqgf + +JJrLkJ9iyg3Um+kz/wcxUDv/m3bEdvWlPrF3ldkPwR60qtmybOp8BnvDNDasi29pKx2pwQxVvoz + 6MvH6Es02t6Ois1O0DvvIt1u1NXkIj43EGcuRnvwcCBg740YToRbI79NxR6MPEvC/ClfdyxFHeIs + p/K6wS5DnjFtuFRvRPRU5bPR8vLtvqjtwvqpvO82vWSub5HjmiTOrf6RRvrkk2dWxRFbY3xMN8Gu + 5Bo/0l36KeqsPYjxHEadzRbo9zVkCf1npNr1YS7oDmqg3UGZlfRJcnjNGXpErNkFxDmGsN9KELIr + zlt6h95T3w79hvGsDhjAXpvWDe/dSSAcnA8KTy70AOARaVD2c8By6Z/9Sb0EWAFZ7HPQzyW1lG+p + Fz8E+ixgn11H3m0QwP15AZ6KdECF9y+GCMAvirHXy93tcHI4jDj7fYdIGcDCCkC60DHuwXoMdbNs + lM/RxgBZsi4fzasM5BlgIwGoL97DUG+jeZXQrjKQV9CsykC8oJmVYcdXrwzEC9q2MhDf9h/acbl0 + l2vH5eJrVwbia/8ftONy5WZUBuIz/qV9XSoD8V3+B+24HJ9rVQbia/1LO7pWBuK7Vm4HfNhU2//G + KjFUED5rlb40PLuQ2EP/EsAKS5wlyDhxLpgHitVa8FbQdoDw4ccCd9lpnMBMO9zOLv/OcBq5z/6d + CGN+D6noIwtImy/2pWvB7nSndF2DLh9MN0JfFPMp4PtJ6MgcOTeLbLxnQ7zn053fJ/GMXHuF51rF + ObaQN6QUAYRbof1YBYVetNckwtcfFUYk/kK7ym0EvHqtNKxzYdtTpN4fTo8CKfx36UtkCB+FPyBt + ezGfCx97g31eH7H3h0HDSBDvUvHZFdb8WfYZPCDP74U/9CH08iHo6JWsVQUfpB6/H+kZAL/JPqsP + n8OjDGFDhT3hGGGtP9Z5s2kQEM8PgM6SyFNzKY9/QINYFxqkfITww4ivRoPUQaAfhKHegPgE4Fnc + HwZeCueBP0LwZa4ChJ66Sv2SruJqOIwyJJTvwxBxQp8pL0JfjgnrXfn84IW0Ii/7BHFn8SwP5Yl0 + kCBeA/AgvB1UpJuFNJsgI9lSZ/cS6WW6f0hjrKOOzhHUUd1BV1vzqKOjB12tzEXZvaVvEGuPeTTG + ewPwafisICT2ZCcCbSqfEZafYdpU+5umabdifP+iBaC9gFyE87QrYNv+gi6GXbjoLHM0Y+H35UIf + imdiz7kizJvgx2yFT0nhf8klQpWXxcvi6POt0q+W740y8S+pvBwu1z7LkP7BP5w91jVupiL4LrkC + kfcdVQp9BL/5ffgscXJ/UPiyG+U55Tn0HX5ScCtoPvylo5AjiqwzBRV+kpC38LyW/tVyZQ8t4J+g + bUPEewMh8a7Bbfb83xg5/7TPNO79vzoDqTg+kX3vyvvd/+n+smcQ9tlBxXOEymGxjy7KiNBLzgwi + NAa8tc8Y5Jl4pXMVjMNCe823VV8ZWoJ7gacgJ88i7lmM1QTQjRijWmK9xXdTgZoCP35V6IxyB9UW + +0SId6hfA+/AZ4+8Ext5hza8vh9b4b1ZsQ4aG1n32GsQj70f21WtsHaLrNvU8HuuUsfIPNBLct2D + eauspkaK+NHyeUnj2SRysoXklPfnMU+FvHamPuwFihFQFDIQ1wfoqnSkPuo4iZ7K+dBepO+jHAHC + eUV59dn40G6UGa+I/dIm4TKVL2S90UCSxDmgCD7UeboGMhfB05Dj76QdOA+dEMFqcgiqynekpR8d + J8Ly/dAhoX2aTnHl4yB4Tiwo8oi9p/+0n4mxeKMSPgT2RKj6H/ZtK+X78JI0kX2h8B58rHjXMfLO + nj1ezeWajJWvAWPRr9jIGp6fgn48BZsDKsdzdfj8V9uM58Mq7NvHyD2e3Mi6xJ7HyUBKBSp8Acxz + Ev8S+DgBfRX8xT9sOzcadXfGWnGXXFPGRt6rhn+bIc+V18FOrQDNB70Bti4f8pcCm3o19IsfcY3R + zttpF7+ZxvJewH7I7Hs2iK0EngOaXoRlrDPzQd52hjXTv51rXg7yfQ77PZXyd2kOo1330UPl66vI + eUc8LYE/U1vy+3FKMltRov4Q9BLWpQIsQFMjkOsc8b7z3bRUvNsvoO1UHoFd2FdBX2faEH7Z76C9 + gFYCqLcBMEWcbasn6BkBPQPz/Xest+6nzopKI4AXgBTAALKABCAdaAQ4gbr2cxHfG6gPZDr3w1bu + p1qosxC0tT1/Jto+0fzL6eCIDovwruIz9n1om42lwPqK56GXC0fOUCuf9/9TneX6M3IO3Ds0AWvD + eaC9QMehH52NfdTE3A1dCercf/4ve09a2Cbhewo/dkjF+v/tPYzLhcP7z+cnoL6PnCtDzxh7YLf7 + UhMh/3wOrdUUzKNmsH8VoDeEzXgHfbCpdQj8f4+q/aPNW3rp+Xh5uJJtidiiy7VVjcUYAZLPm2iW + ANrf3PZ7QINngV/tuC+A4rAfUDEcPA6aatNbbXsfwZJKuDpcZqgPUL7/Ld7fEuBYvVcG0k0X73lx + A7papFsZEucbdJG/FH7nK4FtJt2OO6XsA+/kfSSOatk0kuZP+76L5FX4vavIu1cD7Pc8KiIS/479 + HojAK4p4z3OI0Heh5RXf2xTvXdrrJzH2jYQ/d+Ff5AtdHxlbVkD3KPZ7ZvKMPuJTDKJ9fBCLj8wl + 5Jkg9Hl4Pz5U4nyAMsx1kJ1s2OPPIUe2bla7kE9PCEO9GdQNf24Z/NCV8j34rcZGusocCxyR/mQP + 4I1y9MI6YBHSfSd1y53Q+yn6C2hXK/Ae/kPEh4DOEe/0x6ivUj/5buAXqHd26CtlIdYONwMLaaBA + +Tm3Bz5wZ7TzLI3gByFzKVg3/A1ffC/qm0kd+fvhfVfHwVDQ6ExdHdNA80AN0DjqajwSCuoTKtFx + 8jcCw4XtiuzNVTi3D9/fTEuVEunjJIgzDehrL8JOox5810TKtU5QvjFH7mmL8xNL3wr7iTUleGRB + z5B+n63fpyD9dLm2y+W3QX+sxX34NwkXnXtr6VRXfUzaN8Hrcgps4U9i/VeNOip/w9eojv6XIu2r + 1Fe9G75ZGTVC23L5Iio2xT7cNUi7E/04DSrOQh6iXnieItoCGVsK/6YY67J8iRTpm7UX9lt3of/f + yvfZZBrtGzy/1T4feCR8rhjeTwwdhx95PHJ2K/s9X+xZhj6WY/wn8t2OfCNB+yFe3I+k3miD6E+M + 7BeBit9WjAtTzMnyeOMOhMW78aXIt0PyQZVnQeAn1osxmh9jJtbBB2kAnvUS6xXU+7ojDfmfRv6u + 1JVPwLoSdenNKIazsNzx/gj3p75Yz+VW9F/5BqwTN8i9zSS5d25DPxaG9IVGws/VkHY9IGQ3AKBv + kO9c5Q159lQk67PPEbRn8bwB/GCJ0BT1eeETh7j6PEDBueoTcr+hgdw7vBG+7HG07V3Z/lxxRiDX + YOIsm4GKOj4O+838d+om9hn5ALmn0VuevzwKH+dB2G7wCLIhfzOn7g+frxkPg38HII+5KOdNKnZU + o95GE2oakXWzDp4FyXI0paX6IXrkojOe0XJdFnm/Oy4CxPeteF8R6FPjCu/pt4q8qw+0iNyL36HZ + vy1JhN64Ee1YWImK988XGJ+zEdp2ehb66RntE7SnN9sLnf+F9nLomPay8oDEYfRrHVBK47X9dLe2 + BeHPAQ+tFvH6GIRPI76IVqstabVRl1brXaiJeKb+SHW13TRH5ltBi/QYpP0CPNgPWd9Os2S5G2kW + dMUgvSbyxdh1het5UJuE8AEarxp49gkN0maHz0v0gTS+fJ93LNYvz5DK4CkwcWZSg9rqr9B0dQLN + gt7rpb5Pj0jZKUQ4BuExqH8QqHiGNOxzekRfg7T3SnkOn2d1hd5DOrWAJko//1e6BnQYPwadINZj + W6km6ihSW0BHLrPLF+9xLAcdI+9zYR8ekffF8qw/VzsFvcQhk2J9M4zamgrdKXGYiiSOhKkzk4q0 + IN2vE83QPkOf3wZ9ERhAMwwPzQCPCJihDgUP90H++iGOaCLSLNU/BW/wXPsgtEPyUPCvELx71/5N + GLwByd8HkP4ZWiTz5EHH6tCXvcO/CZW/iTlFzY0k1CH4nod0yIuyZug3Ua3yOcHhM80HD6dRnjEO + NAO8qE4dhe4ysnFfgHm3OZRjgqrPShRBd/fi92GMPqNmqKMX2lOk14ce2oI8HfCsVmizdhTxnYE5 + khZBL0yU4RbUhJ9HnXPQ9kWUwsdhLN6iSeoCGs1/Rd6JoS/VK6g7bGEvrD2uknmnQdYnYSzfoA3w + +9eqA1AO0qsL6XY8K4ZuL1Lvsff6RqItqxB+B/xdgfXyY2jn3XbcDlsPr0L6XYgX/8fScplX5hfx + 4nc70CHhd2DusZ9F3h9ZbOvDgfJZsbotdFQPQM81R7gByr7Hlh+kk20Xa/vKeyG23wwdcBVwvxL+ + fWRbZQ8VyN/T3BM+r4j8y8LWG/J3Havss4oPlf2Yk7Npg3475hCgTKZs/Tq7jPBvfdNMcZ73K3AW + 5YnfI4vftl6PPgHi3V1RvsjLk6gtf5E2aP3CZaG9A/jHWCstDX0Im7RBQP5mUoSbhcNEF/7V48sB + bbkxAnYX1Raw9V357zgr6L6Izrs0z/nw/iVrYu9h4t7e+6jPJlJc5Leg5lvlvwltaP8Gr0XkN3n8 + F5os37++h7boL9MW43H5mzoXqMuxi1zOb2VYxFmgFuKEH1H+u2xhX+Te8jKp64s1ez8GNMlYRkmO + CTJcLNfvn5IHcR57zyb8LhnkxfEQDRVl2TT87kj4PRIZh3Z2xP1woAfk+3nYESfwCsKYZWVQC2Wn + cV8ddFP4NwhlPwJbgN8AaOEyscaqEX6vpuxVhC2iUvGbg9W4hzSX9gR9F9hj/47hD+BRoC5QB4Cl + KcW6t7Sv0An8D6qn1aN24fcVwu8yKrfav9GcRg/CFynW28LHWEc1sOaSZ8F6LLXXmlJn04c5NQ3Y + Dh6+AbvpwvMz8BPgI0KnybNU/i38Tfss2ugmbUmxthXyeavc5/djbscbBZQBvUjwIS3YNAtr/KV6 + aYWz08UotzXlOsZAJ56V78pgLVX2tdlY+PBl8CpLE5Q24j3dsp+Bk+i36C+88TJo3LLuuE+0+/+n + 4I1yHV2pDKYrpZ+/Ur6XLvttwVc3fqQMfSONh7/YW++E55+hf63gPzSF/jxISXwlMe0c7OQC6WvJ + 82j9B5TRArD9A/nbw8chC6K9v6P9re3fLc8NhZQEgi4ofQntqMGysebcA3mtRSn2u2NLxbsHJvJp + r8kzCem3GumQvzz5ftlS7U/4ev+wj6u8f2GPoOJ69LLrWnvvlOS70cGN9nlvS4S9wFR7DS/eveoV + Rpn4/cfDgPhdy3VIcyWoeKcaMhlcqHdgJeZnlIurfF/8/x+wa8JQMN685v8casf/Dtqy/1sYDcMw + a4ThwPy3riBybgjD5aoAaG/3IKgZ+I9eqwKmE/l+Ff9faBWqUIUqVKEKVahCFapQhSpUoQpVqEIV + qlCFKlShClWoQhWqUIUqVKEKVahCFapQhSpUoQpVqEIVqlCFKlShClWoQhWqUIUqVKEKVahCFapQ + hSpUoQpV+H8AjMiXr8ymBOpDBinkoywS/77xAeVt0oituSWnhDVdV6Nmy6xrXawptQFuBB4HFgMa + 5bCG62qktmx0bTSri9Jy8D0FeAJYAgQAjU6y2vJZ5rqk1JY511qsFm6zGCpAaap8xHNWOtwtswZn + DckamjUsa3jWiKwxWWOz7s+amPVx1ieutNJGpTmle0vV304nTj7NHj/96ukDp/nHn8TF17h/YlzS + /RMTG03MmZg3MX9iwUTt3nGIvqsAX3eOxNcdd8clee+YfMfjdy+++9W7tTvunnxP9TFjY2JrDB2B + r5dGbBpxbMRfI9Qhw3H37nA2eFhMkndw6mDl1WHbhp0cHBqsDh5WOKp64ui4+9olpk8Asq7txNqi + zW1pMsApj7WW/WmF3rSikcBkYBugIXQlnk1m2WBLNtiSjfQjWRPENAEXm+CugKXL3OngbjpKSKd+ + gAr2pYB9KbQd4JTGGlAjIB8oAKYATwA62uFd70xt6ci6NpV5kNeDkfHQq8A2QEOqcOgj4HvgpIxN + w/dIIADsBQ4wz1rtY++1GQi3qZBDJa9dqki9pFJZhkx7IzDZrlOUHkJZ+uLJsqxXw2WLOJSVapf+ + 6kVtETWIJ1l2OY8D2y+kWGvetfjaJLvWk+Vlee07RYay7JJvrJTXaFWw1b5VwCrPOn92y36ytAK7 + psUV+qOXt0WUNcXu7Un5RGR2JLUseJ01w3ilMXOdO6olpoey1hnTclNoOzPWJYl5ksBcaIUL1WXh + m6EOpxxfA7EG2maA3wbaL+6E5FPOIKevZU7QGdXywFmGv5gztc4oY86wnO/zv1fSvmr0Vc5XfMib + 976pLHyDpa1ttDZnLc8PFASUp+aQf9Fs8i+cRf4nEZ4NzJqj++fM5f4Fhap//jzVPw/hhXNfmquM + vNbLGoO7jdGexsRZIxZHTdDTRNBY0Li1hdy/KXSAZa1DdwqudbN42ep4cCIebY2HDMSTyqqxmLX1 + U5dsYTEQnRh0JyYnjhecP3VeyTo/8vzk8zzn77y/8/8+9bdaEtqeE/o7KrZl3vGC44r8yjnOtv3C + Cn5mjX5mBcdYv2MFx04d40sQOlpwVDl5lE0+uu3oyaP81BGGv6wjU44sOXLqiJp3+NRhJe9w/uGC + w9sPq3k/sYKf2JRDBw6dOsRzvl3yrdLoibwnlLQlNy7pt2TxkleXnFyiH/iD4e/3wpTUrB9Zznds + 8eevfr7tc+79NOdT5cBe5t1RsEPJ2tFmx407+u1YvOPVHSd3hHaYC7cu3KZ887Xq/6JQ8e/eo/v3 + gL63S/fvAn20WPU/UpyYWjxtV+qMSYNSp042/ZOAyYWG/1Uwe3oh8xcVkv8hhKeBZpXdWKZMznn5 + JGtwqvWpG08NPzX5lJbUPDahWWxs09joK2O92bGuJrGOxrF6o1ieFUsNY2vX8dat461N9VO99bPq + t6nPs2ptq6XU93uv8HtrZnhqZXhTUj1pqd40jXl9US6X2+NyWE6XbpgurmoQNcVFPCE1z1vgVSZ7 + p3i3ebmXp/IsfiOfzLfxk9xQ2RWpSSzZnWBUd8f64t3Raoy7IInlJRUknUriYsCcSdUSWhYkTUlS + 8rJZILoLdbmlbaAaA725bSDb36WEp3ULNPF3CTjybu+xhrHHeiI2oEwvYXRLQJ1eooBEt+t1e48S + ligeFyZtgtBQoEt+4aM9/cmBQV1u7hGYktwz0EQEnkjuSaP9Y8b4xWf06DBFyCaj/Wvq1u4QqN+h + f+CKDvnt/RU+owMnOwROdeg/DF/5gZMZ7UePZv5LPihytPj4x4RDY8Qlw2NEEN9+EfSHax5Noytm + lZ8x4lG4DL9fJhzbd/SYi+GX5coP2hBICDQGs/wi7WjZldGRPomY0aI02Vf0ziE4mdetbZfAVd26 + BLx5tweqZ+BmF26a4caV0dZP9P8BRekV/gplbmRzdHJlYW0KZW5kb2JqCjk0IDAgb2JqCjw8Ci9M + ZW5ndGgxIDkyMjA4Ci9GaWx0ZXIvRmxhdGVEZWNvZGUKL0xlbmd0aCA0MTA2MAo+PgpzdHJlYW0K + eJzsvHl8E1X3P36XWTMzmUnSNGnSpknTpECAQstWqBBWRfattEilyL4pmxuiFGWzIIsKiiuugIoW + KFAWFRVxRVDcQUBFXLCuiAs0+Z07SUp59Pm8nu/r969JZ+bMnTv33jn3nPdZ7qQII4QsqBJR5B8z + bfT0zrufeA5KnkEo79kx1832b3rx+HKEmoxESLh6/PQJ0zo8kR5BqOXbCCnVE6beON4zdel0hDrO + RejuvhPHjR57uk/JAYTeeR3aaDcRCuyFnlEIHYRTlDtx2uwbSibuBPJgLkK9Rky9Zsxoi142GWFn + JZxXTBt9w3TXHfJzCF9xAir5p88cN/2RLd98hzB0j9R82NHklmmOGzmugjOg0iYiztELIdwDTkTU + A92C48RPysgmGqQD6PV0Hq2iy+gj9CA9y2ncAD6fL+FH8Yv5Kn4F/xr/HX9GyBTi4jypRnpeimdN + zpqS9UrWm1lx3zzfw76fs53ZWdk9s/tlD88uy74iuzz75uya7H3Zh7OPZP+YfSY75tf9Of6wv5W/ + jb+jv7O/h/9K/3T/jf55/rv9L/p/CvABR8AVyAmEAy0D/QNDA1cGFgRWBzbkkBwhR8+x5zhzPDnZ + OU1zIjmX5YzOGRckQSMYCKEQCakhI5QWcocyQ7mh5qE2oeLQ1FBlaEFoSWhZ6K7QI6FnQltCu0J7 + QvtCb4cOhj4JnQoXh6PhbuGK8Jjw+PCU8DXN57V0rQ+sX7z+2fU71sefHvcrPiecc51rd674XOdz + Xc/1OPfSufj5MefP1Hep/6X+TH19LBibHZsXOx8/H4+zGUDrCCIBMoI8S3PpQDqHLgAuLqeP0UP0 + d87KDeRb82X8aP52/g5+FX+I/0lAgk8cKK2TtkvvZyHg4tSsfVkxH/JV+tb5fsl2Z/uzL8semOTi + qOzK7O3Z+7M/zP4s+5fss37ktwMXm/kL/EX+YpOLk/2zgYsr/euSXExPcrFfYEjgCuDiygYu2oCL + GTm+JBcrcsaaXPT/Fy4ObODiytC60FMNXHwTuPgxcLFjAxfHhScDFyuAi671OeuXrK9e//vTrYCL + 6JzjXNa5DsDF6Lnu53qdO3z+yvO/1BebXPwr5o9Nj10Xq2RcjH+JEPcjbO8hxF+CzE9sEttzh4Bq + Bsr3geWw5T3LuxZQkvOHzr+FGn1+aIfQj9yP/RA6PQ+hUxwcHadtp/XT2mn1tHLaclo+LZ4WTvOn + 6WlyGn3H5gydWGjuF8B2/feTTXrH90UIfV96ourEzQgdn3z8xhO7Th/4svmJ5afvPb7h+Jpja449 + emwpQseeZLWPu47NOAY6e6zVseixwmO5R3sd7Xm0+GjR0XZHC4+2Otr0aM5R79G0o/jID0dOH/nm + yFdHvmB3Hdl/5MUjLxzZAdSrR5448tyRnke6Hel6JPdIzpHAEd/JtdDeboQmzYZt6qQW4+ozv0fI + 2ReU9QHxfvE+cW3iee23IaR9amsK2v6dzQIcQ3QM02/cDdQ+BjybCmVD+Ud5wCd+O38UUKkAtpEX + OCYZ5v4Gqdoy03LI8ociAFKNYGVKSXK7E/2fH2WX8jHsz6oERsGxEpVTzVbV9EQNtf9/u1ftwDa1 + Y/KsHfqfP6o10YdJq/9lZH8l2lQva6i5DLY1DWd7te1WK0JWc5xWt7n3JC9S9BhagBbSK9EadAot + QsvRUvQg2ogeRwaqAhbfhu5CP6Gf0R3oHrQEY3QU/YgeQk+hX9Ev6Ax6FCzC62g/2oSuQmPQSjQW + vYnGodfQG+gd9BZ6Gx1AX6Px6F0A+kPoWTQB/YBWoffRe+gwmoi+RafR7WgymoSmoGloKroarUPX + oBloOpqJZqFr0Wx0HboefYNuQHPQjegmdDOai3agR9A8dAvYpfnoO/Q92onX4HswwRRzmEfn0Hl8 + L16L78P3o3oUwwIWsYTi+AH8IH4IP4zX4UewjC1YwSp+FD+GzqLf8eP4CfwkXo834I34Kfw0fgZv + ws/i53A13oy34K3oD/QBrsJLcQ3ehrfjHbgWa9iKd+JdWMcGtmE7OoE+xw6chnfjPdiJ0/Ey/Dx+ + Ab+I9+KX8MvYhd3oOVSNM7AHv4L3YS/OxFnYh1/F+9Gf6C/0BfoSZ2M/DuAc/Bp+Hb+B38Rv4bfx + AfwODuJcHMJhfBAfwu/i9/Bh/D7ahfNwE9wUN0Mn0Vf4A6FKWCosE+4QlgsrhJXCKuFO4S7hbmG1 + sEa4R7iXzxXWCvehJ4X7hQeEB4WHhIeFdcIjwqPCY8LjwhPCk8J6bjI3RdggbBSeEp4WnhE2Cc8K + zwnVwmZhi7BVqOGmctOEbcJ2YYdQK+wUdgm7hT3C88ILwovCXuEl4WXhFWGf8KqwX3hNeF14Q3hT + eEt4WzggvCMcFA5x57l6LsbFecRjnvCU53ieF3iRl3iZt/CK8K7wnnBY+ED4UPhI+Fj4RPhUOCIc + FT4TjgnHhRPC58IXwpfCSeEr4ZTwtfCN8K3wnXBa+F6oE37AH+KP8Mf4E/wpPqLYRUO0iXbRIaaJ + TjFddIluMUP0iplilugTs0W/GBBzFIeSpjgVXTmunFA+V75QvlROKl8pp5SvlW/U39Sz6u/qH+qf + 6l/qOfW8Wq/G1LiGNKwRMSjmiiExLOaJTcSmYjMxwoeUdMUlVorzxVvF28QF4kJxkbhYXCLeLlaJ + S8Vl4h3icnGFuFJcJd4p3iXeLa5GH6Lj4hr0sXiPeK+4FjDtfsC2B8WHxIfFdeIj4qPiY+Lj6BP0 + KTqCjqGP0GfiE+KT4npxg7hRfEp8WnxG3CQ+Kz4nVoubxS3iVrFG3Ka4lQzFo3iVTCVL8SnZil8J + KDlKUMlVQkpYyVOacHdyd0nduDlSd6mH1FPqJV3KzZYuk3pLl0t9pL5SP6m/NEAaKA2SBktDpKHS + MKlEGi6VSmXSCOkKaaRULl0pjZIquNVKU6WZElGaKy2Ulkq+0kr5VvlOOa18r9QprZUCpVC6Q1ou + rZBWSqukO6W7pLul1dIa6R7pXmmtdJ90v/SAHtW76t307tKD0kN6D72n9LBGNU7jkc+Yi3/EP+Gf + 8VH8C/4Vn8Fn8e/4D/wn/gtH8Dl8HtfjGG4O3hoimBBCCUd4IhCRSEQmFtyCKEQlGrESnRjERuzE + QdJwS+Ik6TgftyIu4iYZxEO8JJNkER/JBq9vGXgsObg1LiBBXEhySYiESR5pQpqSZiSi91LaKG2V + I8pR5TPlB+VH5SflZ+k10py0IC1JPmlFWpMCUkjakLakHWkvvS69QeaQm8hccjO5hcwjlWQ+uZXc + RhaQhdKbZBFZLL0lvS0dkN6RDkqHpHel96TD0vvSB9KH0kfSx9In0qfSEemo9Jl0TDounZA+l76Q + vpROSl9Jp6SvpW+k76TT0vdSnfSD9KP0k/Sz9IvWTfpVOiP9Jp2Vfpf+kP6U/iJLyO28wdukc9J5 + 3s47pHopxqfxTj6dd0lxGclYJrybz5CpzMm8LMiiLMmybJEVWeU9vJfP5LN4H58ta7JV1mWD9/MB + PocPyjbZLjvkNNkpp8su2S1nyB7ZK2fKWbJPzpb9ckDOkYOaIIfksJwnN5Gbys3kiNycz+VDcgu5 + pZwvt5JbywVyodxGbiu3k9vLHeQiuSMf5vPkTnKxfIncWe4iR+Wucje5u9xD7in3Un5RfpUvlS/T + RE3SZM2iKZoq95Yvl/vIfeV+cn95gDxQHiQPlofIQ+Vhcok8XC7VNM2q6Zqh99H76v30/voAfaDW + Xeuh9dR66YP0wfoQfag+TC/Rh+ulepk+wrjZuMWYZ1Qa841bjduMBXKZPEK+Qh4pl8tXyqPkCnm0 + fJU8Rh4rj5PHyxPkifIk5Yw8WZ4iT5WnyVfL18jT5RnyTHmWPFu+Vr6O3EGWkxVkJVlF7iR3kbvJ + arJG+Y3cQ+4la8l95H7yAHmQPEQelq9Xziq/K38ojyiPKo8pj+uXGeOtr1j3WV+17re+pvxJvlee + VJ5Q1isblI3KU8rTyjN8oZ6jB/VcPaSHSZ0xTvmL/KDnkR/pfHobXUgX09vpHXQFvYuupmvpgxC5 + PEE30qfpJvoc3Uy30Z30efoSfZW+QQ/oET1fL9Tb653IT/Rd+gH9hH5GP6df0W9pHf2R/kx+Jr+Q + X8kZ8hs5S34nf/Ad+CK+o7JJeVZ5TjmnnFfqlZgSV5HehfxJ/iLnyHlST2IkThHFlFBKOQNRnm/C + N+c78cV8Zz4K93fje/C9+Mv4y/n+/GCIpUbQbP5K/ip+PD+Zv5qfyV9H8/g5/C18JX8rv4BfxC+B + SGsZv5xfyd/J382v4e/l7+MfoBH+IX4d/zi/gX+Gr+ZrwKPbxe/mX+RfgZjsLf4g/y5twR/mP+KP + 8Mf5L2lr/mv+NP8j/yv/O3+OjwtUEAVF0AWb4BBc9LSQIWQJ2YJfCAg5Qq4QFpoIzYTmQkuhFW0r + FAhthA5CR6GzEBW6CT2oJPQUegmXCpcJvYXLhT5CX6Gf0F8YIAwUBgmDhSHCUGGYUCIMF0qFMmGE + wQlXKJuVrSn+UAtVqJrgjzBSqBDGChOFSco2laiCagFPzq6mqx7Vp+aoYbWJ2kxtrrZS24BfWKxG + 1R7qZWpfdaA6VC1VR6oV6lh1ojpZnWo9bv3S+rX1tLXO+rP1V+tv1j+t9TrWqc7roi7rmm7TnfqT + xkT9Kf1ZfYu+Xd+lv6C/rO/X39Tf1t8xphrTjGuMWcb1xo3GHcYq2zjbJNs02wzbLNv1tpts82yL + bIttS2y326psS23LbHfYlttW2FbaVtnutN1lu9tYrR/S39Xf0w/r7+sf6B/qH+kf65/on+pH9KP6 + Z/ox/bh+Qv9c/0L/Uj+pf6Wf0r/Wv9G/1b8zblKOaW4tA3+Gj+Hj+AT+HH8hxy3Igi3EQi2chbcI + FtEiWWSLxaJYVItmsVp0i2GxWewWhyVNv0IfqV2ql+Mv8UnuLPc79wf3J/cXd06/Uh+lV+ij9av0 + MRanJd3isrgtGRaPxWvJtGRZfJZsi98SsORYgpZcS8gStuRZmliaWpop7ygHlUPKu8p7ymHlfeUD + 5UPlI+Vj5RPyDfmWfEdOK6+izWgLqRJexW3QNrQdvYK/QltRDdqn7Ee3opfQYtqfDqCDIdIdpHyE + XsV34OXKa7itfik+RYfREjqcltIhdKh1vPUF64vWsda91pes4ywxS1xB6Df8tYIVgtsrVOHIXu4W + tEcB50cRFUOxqe+oB9VD6rt6b/1ybZRWod9lLDQWGWONZbYxZKnyKVqL6tDL6Al0J+6CVuCu+Dq8 + Ct+J78LXo1o8V5G1LM2nZWt+LaDlaEEtVwtpYS1Pa6I11XrrY/Vx+njtcq2P1ldrpkW05loLfYI+ + UZ+kT9an6FP1afrVWkstX2ultdYGaYO1IdpQbZhWoBVqJVo/rb82QBtonDfqMTZiRtyGbNhGbNTG + 2XibYBNtkk22WWzwCDbNZrXpNsNms9ltDluazWlLt7lsbluGzWPz2sYai9GLaK+xxLjdqDKWCrOF + a4XryX5lJ8RTu5U9yvPKC8qLyl7lJfIaeZ28Qd4kb5G3yQHyDjlIDpF3yXvkMDlGjpMT5HPyBfmS + nCRfkVPka0CcSwBhhkDUN4xmUz8N0BzAmTH8WH4cYM8AfiA/CJBnFF/BjwY06sP35fsBfuzjX+X3 + A4a8zR/g3wE8msXP5q8FZLqGn87PoHm0CW1KmwFC3cTP5W8GdLodMIplg5YCZs2jEdockGoVbUFb + 0nzairamBbSQtgHkOcP/xp8FFPqer+N/AOwxAH3srE/AHp8wGfBnijCVnqbfwfY9YE1XQJvu+u18 + C72Kb6kv5fP1ZXwr/Q6+QF+ur+Bb6yv1VfqdgG4n+M/5LwCxmgJu5QFuRfheQiuhNeBYCDCsBSBX + J6FYuIRvyjfV79ZX62v0e/R79bX6ffr9+gP6g/pD+sP6Ov0R/VH9Mf1x/Qnalrajv9Iz9FJ6Ge1N + L6d9tOH6DfqNdC69WffpfuWAHtDn6ZX6fP1W/TZ9gb5QX6Qv1pdApA3xMk6GjOCQIUT+IwiFi5Tj + BVGSLYqqWXXDZnekOdNd7gyPNzPLl+0P5ARzQ+G8Jk2bRZq3aJnfqnVBYZu27dp3KOrYqfiSzl2i + Xbt179Gz16WX9b68T99+/QcMHDR4yNBhJcNLy0ZcMbL8ylEVo9FVY8aOGz9h4qTJU6ZOu/qa6TNm + zpp97XXX33DjnJvm3nzLvMr5t962YOGixUtur1q67I7lK1auuvOuu1evuefetfehBx586OF1jzz6 + 2ONPPLl+w8annqbPbHr2uerNW7bWbNu+o3bnrt17nn/hxb0voVf2vbr/tdffePOttw+8c/AQeve9 + w+9/8OFH6JNPjxz97Njxf3OJ/+YS/80lsnv+zSX+m0tkZ//mEv/NJf6bS/w3l/hvLvHfXOK/ucR/ + c4n/5hL/zSX+m0v8N5f4by7x31zif88l8rtQBmwefj3K4MIIYsj417B9w46xSfFv2HV2JN9BTFmb + 3BDagDbhSRAdvohexj8hFgntBL16HblQD/QAxHN3o8VIQCOg5HY0GL48lN+NM+I1KB8iPQrbAag7 + HCK+XSgdu+PfQvS3kB6GuxYiDeWgrmggxIx34L7xa9FIdJy7DbVHfSGSnI4r46Xx5fE744+D9uyk + r8frkYI8EKOOQQfiP/Afx4+iFnDHatCw4/hOeRuKQi+VUPNBiD7vo+Ucjk+I/wUjCEAMegBxqB86 + gPeSCLQ+Dn2N3Xgu7Q6tPBavju+DWpmoHCLa+yA6a4svJQF+ZLxf/ABKhz5ugFbXoi2AKtuBJ8+j + T7HK/xR/PP4TykDNUW94nhr0Dt5LY/XzY10QS224UVNUBFeuQS9AJH0IosCXyDW8yheAhZ0Tfx+l + odZoGIx2Pdx5Cv8O/id4oHQ/1yveDVmBL6sYt9GrEJV6wBcegEvAw72GPERnIgl6bA3fsRBz347u + hdaPgbe9HTzpg/Qx7mnunJAVOxG3woyE0f3oQfQSxLpuiE1n4Vsh5vqSdCejwLf5gt7NbeTeE0fD + U18Jkfsd6GmIo+24Ax6Er8AT8Vy8GFBqLUSwh/A3pCsZSqaA/zKRzqDPc93gO4Sbxd0GerVU+CZW + GtsXezf2e7wgvggNAnmYD6NfjR6CJ9uJDkJU9Ak6jr7APETsVviyKHkYvgm+twAGP2rG7DXQyyH8 + Bf4W4ojf8DmIFxDECV7m68M3SGaS68E/ewDQhOHJ9+RP6qI5oMltaTEto9fAqBbTlfDdRj/nPNxB + iFcL4LuGfxi8j6f5l/mfBFW8VULS2+cfq29WfyyGYktia2JbYjXxz5ET5tADXMhGxTD60fCdDPO9 + BiTuOXQYq8A7D26GO+O+wJlReDKegW8ATi7A9+EnzLE/i/cAlz7CP8KYNYhU2JhbQoTRjQyA75Vk + HJkBPuadpIZ8SP6iIngXOnXSZqC95XQcnU1vpGtoNX0b/Lov6Fl6Hr5xzsJlczlcmItwl3KjuGu5 + h7ivua/5kYB5XwkWYZqwCCL5n8V2YmdxoDhILIdYdbv4vlTBrB7Yvh2N80r4BHidPek2tJwUchmA + yO+API9CY2k/ApJKNuAl5GZcQ3L5G4ROpBPuj37iwsDr/eRh8Cg70X64Dx6CJpPWidaENO4pOBRz + r6A6bg882zvQ8g2Cim8hPwoq2oIRKYI+X6WtuAh9C31Kj2ORewQd4SzYhevIejoQpOB5rjNfigL0 + AfQsnYFvRttIT4Qs56RlIMf98VOAC0NxAf6DxhEl/UGK2tMv0W1oCvkY7Oj1aAm6B4/lJqDlqBDP + RV+jJ0ErmvJXA6468RtkEldFHLgGEW4jPF0RzsWUT0MLcDm9T/iRfIKuRQc5CzpGn4HRHyTP0n7c + T/xgPBE04Ga0CM2Iz0c38qXce3gCOIAlKMSdAHSbSwu4ABznAaqMBEzbDtq9C3CgK+0HJW6QnL4g + F8MAIe6D772AExxI0CTQ8eGAYu+gGmEoqUUTeCsG1EGIeys2GI2IP4nWxiegq+N3ohaAB4vjc6HF + DegrtAJtwAtjN6HpyAeacwz35XuRg3yveAtSRT4hQ8iai+cXuB3CbvQdfJ+Fk878blTFfYSGoC7x + ZfEPQLqbAMKuRVehy9FJeMofoIfL6F5UGOtPNsd70enwvMfRoPj6eDa2oInxqWgA2oOeEHk0WozA + HFfj9+B5b0LjyOD4bDouNgn4sAK4EAVuXQv4czs3g7uN+xMtA51fA3izDvTmKdAcpvsoesXC2bNm + zph+zdXTpk6ZPGnihPHjriovHV4ybOiA/l2jXTpfUtypY1GH9m3bFBa0bpXfskXzSLOmTfLCodxg + TsCf7cvK9Hoy3K50Z5rDbjN0q6YqFlkSBZ6jBKPmPYO9KvzV4YpqLhy87LIW7Dw4GgpGNyqoqPZD + Ua+L61T7K8xq/otrRqHm+P+oGU3UjDbUxIa/GBW3aO7vGfRXH+gR9NfiEYNKgb6jR7DMX11n0v1M + eqVJa0AHAnCDv6d7Yg9/Na7w96zudd3Eqp4VPaC5zYqle7D7OEuL5mizRQFSAaraFZy+Gbs6Y5Mg + rp4dNxMkaTCoak+wR8/qjGAPNoJqGuo5emz1wEGlPXt4A4GyFs2rcfcxwauqUbBbtR4xq6DuZjfV + Qvdq0ezGP4k9DVrq39x8b9WyWgNdVRFRxwbHjh5ZWk1Hl7E+bBHot0e1a85J94VTaNzevXRx46te + WtXTPcnPTquqFvur1w0qbXw1wPZlZdAG3EtCvSqqekHXy4CJfYb4oTeysKy0Gi+ELv3sSdhTJZ5v + XLAnK6mY7K+Wg92CE6smV8DUeKqq0eAbA1s8nujO+Ank6emvGloaDFR38QbLRvfI3JyGqgbfuDUj + 6s+4+EqL5psNW4Kxm616klC1xsS4hmsmZVZnVJ/BDZzFbETB3iAQ1f4xfhhJaRCeqQPbjeuAqsZ0 + gGrwKcNwV/VYmJFJ1XL3iiqjIytn91fzISPor/oNgQQE676/uGR0skQIGb8hRjI5aRA1uJ6iqyOR + 6mbNmIiI3WFOYYydzfO2LZpfV0uCwemGHw7APjQQeDu6rGM+sD8QYBO8tDaKroKT6spBpYlzP7rK + uwVF8yNl1aSCXdmbuuIcxq5Upq403F4RBEmuMdejndVSuOFPN9IdPSd2rMbp/8flcYnrfYYE+wwa + UervWVWR5G2foRedJa53aLiWpKod3UuplyQp4qXmVRDKkQ2V2UmpWs2F4E8whXpsrSiBVJol2N+r + 2qi4LLEvswQC/+NNtfGf2F3m4cJtyWFWd4xcfN7povOLhqdWURgwmNc+Q0dUVVkuugailuiwd/IA + Eo+Glgb83avRMNDMEPzVxvd2YFuZtzoKLOvOKoD8JYqSpxdV9CbpMvgw6WzRvBcAXVVVr6C/V1VF + 1ejaeOVVQb8RrNpJXiYvV03vWZESnNr4rqXe6l7LyoBXE3HHFs2D7EpV1djNiIagm6h3MzaJ9t2X + llUPiJQFq6+KBAPB0nHwLJs7IjUwtKI7UAR12xzESwZtjuIlQ0aU7jQQ8i8ZWrqFYNK9olvZ5ly4 + VrrTD6bCLCWslBWyEz87QX0wsGYLkcz63p1RhCrNq5xZYJ6PqcXILJNSZRiNqSWJMiPRUdjsKAqO + 5ZhaLnElmqrNQZmUKKtM1G6SrC3BFYNd2YXA4iDzYuKzGU6GlkYt7aMdo52inUkXAhxhRVugZBfU + 7YTR1s64C/ZuhjYHm8W1uHJzp6h3p9nS4GTNSqjJyiobymDkrFqjhqC/xIMPu/AEw0aUbu2MoH1z + DzW6sQ9DWhhEYx0ygYnJ+fBIqUqq+gwBCWQXLR28lkaX/ezGahysHhW8IcCerrokeGMACoPVfkBr + qLQZXZpZVlXlh28QuDKmpDSxZ5dw80xoqay68qpUXW8myMSFUxVuNeVqaybDkIbebkr1NhN6Y0RV + qrvqMf/YG4y+Gl/B9uafOfzN7VAw0T9Y6USnVSOrRoA8BqqzWMfJccCpNbPMbAFGcq85EmwapzHg + E4xnuuRnIAcwGbx8M+kfMY/YPFZdHuw5FmqwDYxuW5isgH9sGasVZErDBP+/VsKNKjFDYjZeZXRK + neHkWUJ9q6onXHw6seG0F9vARwm1TMAEPIupsoHqyd7qqWWRhiqj2TNXgW53ZAre0bz5UrZVgNm5 + tLpyzGgYItib3mOCUHA5FPhLr0pwkBnqKuY5jRkNtzEuJ3uqvjpyUZOACRggChpij1NdOdBfUeav + AAzBg4DZXn81D0f/eHCfgqMZbgxMPM9AAH84jK4aAvciNm3eahHwbPzocUEGrtVM3hPcZ2PkYHRo + SGk18lZVBUGGYIihXlAZmg9XC+He7AB/0yPB0eOYZzeeOXbjEi4HDNfkDmvN2zMYKIMqJGTyEhgH + inYV242pYn5jeUUEOGGrslf5i6pA4csBq7jwmJIKwDW/4e/lN6d6tBfOgAm92VkZNJSoKIdYRbjf + /AtXT4tsLhdDF0rMv2siicqS2arpRFQPTFURzT8gZkSqiasDXGQPjwePMO0CTBRjHh/qDeyNglR5 + 2d2gRUOTZiNxf292qzc1YYnboKQsZQBA3jeH8JKBjZFwZLW9z+ArvMDYFibIIR6+iCIRdash+KQg + 1pK1UQfiuZMUWUTuJEYZksCfJHQPBIUyXotbInfEOFtcX9zfOFPcr74YdQHaOA+71q0CtoAtBDsM + IHveT/eej7IFfj+3l73H5ox/zZXxh5EXZePrqhdGSqOLm2R1yCIyJ2eR4foOx47M1xyvZf6RJWDi + RDJH05DMCzYEMYCBZEU0vBZVNNyaLhouq12wuawOmuayphOny5pBnG7NQ5xeSyZN81qyaJpb8wk2 + t5Yt2LwWi9cbQnIazJvmdodc1jSXy+okoTRKkSGGbEIt3h7tYLVqmsUiI6/b7XIhizMtzWZ0toqC + QEln5L5bc92thaxRW9EA68NWYr02YLnbK98N7YLF3WYr8oMRqiWPbPVvnMjYUx6pO2mcbDieKS42 + ihN7YBeQxYm9UQ9ssxXlw34x3zJys7FvcUs3O+j/8WndCpeXz/BuS/c4MimppflRZSqMXrZn64oo + sHPLVFGU3fCEMkbuLoVdCu1F+ZHCwoICW4po1brM5Qi2LXQE2gYchZRthc4gDTgDNOgIUEfAEZgw + fONrl8d+xPnD1wzHnYbfM3zTW31weuzt4WtKYvuHX4s79om9moGfWo2nrMabYkPYtjq2enWsBD8V + KyFd8BQmSaXxY3wezHM2ao7a4TXmTL8+xzkzfaZrTss5+YvSn8z/DElrsh5LJ7fn39aO3Ja5IEBq + 0nGFa3SApDuj6ZMRfcr3aTqZlTkri1zrmekl16Kb0kmV6zYv2eh8Np3c5qvykyrLbZnkLf/+PHIg + /WUv2eXZn0YmtduVTia5xhWScfm4pHBkO9KrcEQ26ZfezUtaeYqySdib6yeoRQtfi5YWC/Kmp2c5 + /enpfv8uS4s0i6VFuKmB2zT1daSKd1FW8MoKx3THOgfNd0QdxHE0a4Ubu2vJiGhmRmffTH8WzurQ + oemV6zSsrWt9pV/E4uT2M+41J7/uTHmdcab85Jm6cjgAfRJ1OVnXpW6xtWXECrMrWosXW9nBKDYJ + c3b/9kHJozfqwzDilulerzPD7c4yWjqdbQy/xULDWVGfTNvU0tY1U6lshEEOtkw12PxH4Os5AFNv + K0zt8gttqTOQhJAgBHPywm3btGsfZvvCAoi7edyuvUsQ011iGLdr17ZNOJgjONPSXRgL7FhY0I4e + KHtvzucLpjz37JhuBx9c82LsNBZbZOxuNXhc5Y3TYr5re466tPfoYBD3i22/c/zyWwdt2jRmzL1z + 1y45MmTm8m4LXqmd/+7dsc2ls5vsnbvoihW96MKeE7v0GXVlj5w+zerb4rXDV/cu2zuOveM6gm7F + efwugKZiU36ciKeY/4EgOt+PV2KCJwsz1id4jbrUYXiqotatvNs4jKIEwfN7DhQVwVM6aNtCJ13S + 8kAraM/+22+xH6DtubFBpALk00D9zbYteTpGhl2UDKMWF25FD1slOEZt4sPWKxE1qJ9S+oztwWVm + d/Vn64yz0CcoMJs171aki4zhXaA3HCa2Nu3btS8URPg6DYyPr36n34g982/MuyQYwZHYoD34D2z9 + 4dP6c4fKqtbsfj6WHfOji0aUwEW1CWliENkCU2mX2ZgsD1MMxxr0ML3SCpFJjWGQYUD8UaPrJnGy + RtNM4vuobrGQYbo1G0DqGXty1BH4/G3kWJdTI3cEka1NXhi+hemudKdB6ufjSCTnkrw58/eM6Hcw + NogtCO7ZuaZqxHvn6j/9IfZLTGLjfip2DN+GDiALGsvGvc0CZuRpQNOB0TCmxYRgCy5GFkLhBAkd + xI4D0Ch0DZqH1sG8rlMeYcpypvzMSaPOxEW2N+qMenM62WyKAmY+OZvN/AMwykKYzDRBzGvXrv32 + AwOHFxSBOB6YsTTcL2P0FTCarriWTCbTAIEuMbmYMZ1Mp6Qf7gcDCSLi4adDpQxu+h3uSH/jZLlx + CuX3q2vdCs0AZkBcDLzI97BuHG0Dzq6kKa7dtg1u2AUPuhiekaL2Zqtuwh6pOPEgzyFuHdRZxz2S + UHxTGmHoWxsGnhz2rgMHDpjvbse/JkUw0zTBsZ2Ixo9tSSsitfFjUX9a0T0UE/owfY4Seh3CaewV + cAx1LfQbRL4BCdi4DZyUrXOgL7AmdUZiNpnlKL85gSKRCEikjFPz6sSFGG9cGSvN4L//Kw1s8DCw + wTZ+L0haFo6xEWwmicDG4+P4NJ+mueTa+DemVDEimsHESrYhlZWgdFWFvcrKUD6I1AHYHYAnNp95 + s/D3ls5ASwJr6RTIp0n8EM1QFIE1abASZKgq27OyhiYvtBntzwmLyRJlif6GlZdFxU16Ovo6L8/o + 7h3qGOkcmTHYO0WcooxxTHVOyajw3kiuF65T5uiLhXvFNcYb7k/Jh8KHyhHd0zCkrkb8DFKRCtNT + glzxX5CClCT9B2Kvj0WjthLXLDkaCLZpBdohGzKRu1rgplRFOf5NouKOEnlltk1V1VocrSmxWRUl + QUiaBsTWEtss5hlEVWjJj5j7laqKpGRVlKi6vQSt9L22lMkPPDo4DLBnZPkMk0yyApfPQOUQRVVH + B5bWCP4MIxNgAIJm5YX4CZQOmx02HbYO7INhAx/Qu1lLA5tQM1XTOI9pHDg+YRyYmBt2hvrpdlB3 + 0xY4DIbwNgNQXxSGTTm87rots7tNPvzI+zeu2rlx7tyNG2+Ze3k5OYw5fMkzo7bG4p/GYrFXNt27 + Az8Yu+fHn/BEPPmHSYtAxo+Ds3cOZMyCrUzCtloanjxFWFLcQinCkuBFA1OigRIa1WxtpnDzyAqy + VuKe4bCMBJ5QmccqwW9aTO5a2DwhbDpf8RMmKgLxXdRmimumKa5WU1yBW9EMJowpiTOlz6PyUU1v + w7O2rKwtHvv5KE/4DGUXLsYLUQIqZiRmxPzAScLr7eIqwrYiNjOoHMDd/HijMDZZiPK8jFWZ8boL + GF7TEAPHA0GbIIhtAb4KybmaroeH3vNF/mzups5zs5+99M1R8AzFoN0icM5H8kzdTGiUbDM0t8Mh + DNOYQtlsJvFDVDYMoHxpvI8pqotV8PnYVV+mFa74VPaEvlqyG8Zkcbn82YaNEH828wTeZwPKP4Dy + mYBFurD9vgKmwqShQ9VuJ2aHUVm3kVQ/J6KK3UGG+dJYGWt7CzTNAENRyDAXsz4mt/+pN6bVrD/W + m9lZ9NJOfCdhN/+isFt8TXojU+ytlqlDrVPUsdY59jmO2+177F95vvL+5FFfVHY4iM9iSILwZqYn + LTPTI2V6ACklTybVfEYteXzrABu21WL3NjZOxAa2FRPVcpG6Wxqpu6VB3bUSyyzXYQBapvJ4N5mP + /MjAHaKqbVsXMopcQ+YRjuwiuRCzrNhsKmk5AO/ZCMNfUzvBde9SV19+0mZn8gC7lJOXsGJJlY3K + XiPTyDJ8hvBC/CckgqJKcJRhS+lrhzJUjstngtayqdW8oqgRXy0trJlK1DTN1N60pPYyRw5Yytw4 + ZyDcHgQq5a0x42i6ciBo8MeJ59sTV+ix+37csPamWx/AOx1/vHv47GXrX350pG/Tpq7FY/besu+r + 8VPueqDKcfCT7zaVPrXn8SWjW4MklsRPcekgiRF8tpGVUDLcUTa/7kyEmcpEVDjBTYMWTVd1n8XS + 1OnL5HxNM/mmWlBT3RngvvgNpoR+McykhFUP5zOMB4MOX2Qv6tIFTH4dPEzdfmO/vcjYFylgG5OP + VryWrvXUFmlcT9tw23VeOjh9qjE5bWz6tdqNaYu0qrTbvU9o5o+gOBFDf5gJAksG7sZsOV7DbWtU + 1cm5d5HHUQaZGJVhdDwMT7NfJBf2RnJhb2QG7LNG+a/xE7+b6ZG/UrzoJrHRTWKjm8RZYdN2hDEK + G2ECT31mB7s/vLKFuxZ32JJxGO/CHcAN2BtVGizDyua1+M6kcEXqTPFKgv+ZSHmDDag/ydQI/CMm + awlRaxCvLbyfgnaCGJUxOMIzmBAhjLmgqukWkJ1tU3U9sykH1I6pTTWIIjKdpkRlmhJVkF/IhArC + xIIiOLD4wNE+nVkDU6rE9g1kSsCYhIlsj4I54ZKa7NVT5j336M2FfdPsyqzaRZMnLUurCXz37A1v + Thk/9taVsW8+fCmOb3OvXVx969xH0h4iN9w85tYFC/zbXpuwZeyoB1r6nl++N/bbKZYj8AACGuD3 + W5BGMpnk7UFq/K8E22tKNCFpQPiUJRFShNxgW1IEn7ItQoqQG6xNihClZGUpRYgp6yxJDXWSpklK + EXyKEFKEnCKSdizavsReqk5U71M3qm+ofF/aV7ubo3aALKQKVOQtChXBGmram5RLo5SjGiKqxol0 + N9kNjiPB66IWxHHs1yNvWrhaMn4Hz1uiWdltLCkzZ0n4VCbxg+lcWWpx+6gmRnOCbcTKQFtxpU6Y + jipaWhtEDOInlLCb2T1AnNzO7iHbrLV4mSl63zPfg1m5M8wmFBunDNPIGWeKzxbbiorMEGtxywiX + SE6A2es+EtxXDdxXexHYifejSmERzWlRRLmsrGLWRBkIItSJpqlRpUitHFikRsNFak4mHFsUmday + LGk1L/qgiHe7yskC1UgtLdjBXBekcilTyhIZCVtqC7TFhbZCZ9BGbZisqV9AHrxr//6aWFs86gm6 + /fzlT8QeAeReXT8FAIF5vQH+SbCroumROFIyYk8RDjU52/YU4VCTU2oHYidT9AQI7kQYuKoxNuJM + q8XndGbamZFVdI7zZWpWjEQ3uCCmC20SJmAy88cAjykyPEb9PgA5hnFt7KaZ1s19H8+NWVVZaxzr + Ha+oH6pHvJLscFubeajD4rQ7HG9a9TSrI82qa4BzUQfrOmpdB1GeVY86cXIYO3QOH2YYCMYwamMD + so0yrjHmGSsMzvifMcxtYpgbogjDTdwpDHOv9Nv34LZIx6uhZoct1m3/hGXZF2PZRWhWzqI8wC+T + B+WANOUA/icXSy0jPIgVamwwa+RWfCtlF9hJauIaQ7YZEN6UNThaCGVqDpa045wJhHM69UzOdHcz + Nd0OlnPLVJ1LGcx8thUmEiH/AW+AaQ6WBANcQ840EXzh8LDnnWun3lqzadnwZU02Lief1O8YsGDV + XizNvuPM6/W40qhauu/R+7YM6JJOfn4mdt3I2Nl3X1u15QQ8fj+QNCfYzSzUDH/byHJm6zgbj8IU + e5v4ohrWNHCnvHyOL02z+DAKGczRMmMtw+cymOi4TLvpMmMtVzIwOvD+AePVlAiV1xn7ypkItZiS + gXuIUWePjB7+Efah/il0rDhWmmwf658tXZu5UFqU+aH0frpN9LM5zEtAgDAsyJw5L6MC5gU2rIEa + gYF58eFRZjITLGZqkJjZLrQtdJH8hBrJT6iR/IRmGab8GBgZAFXwbD/tYD63sbI5YFSHrb6U0vlS + MOwD1NxttuPDRVGti2uU6xrXPBfnMpIVgBsmrFpLXOmsKVc6G7OrluRujTSETglb2Vje6hKG0zSY + wLAG4drJHLCaPH/QH6hNSRdrgNnOMu82jHmL1sSUKU3zpuWYMpWmeXnTZHr5CzJVkJAmLIbzzKhJ + EJl1tDP3K5iDbEZ7ZitxWiNZo+e2upv3nlLSddhVpOueCTX11x9a8Hns5IO3f7Pps/r2A5b3n/n4 + ozfNeYobYp3cql+rzj8cHVMR+/29qrpbcB88F298acPL5z8rf6qs9qF7n3sOZmk02Mt0fj3wfqmZ + nbDu0zAHf0TiZDAqDJhaEczJqjaLUsKmZYDp1VLi0aVZ8mk0AKRyFKFd4HANngexXYY1qcD9jTPl + M4r7nanrb5xlMQ/LNjBvFzyEhGsL+uitkVUKssJ0DZu6VtglmUEREBXEYDu7vf1oum1ZrK5PO30n + vfXX27m/Ni1bHbPHztUe2YS/w689gCgaAlqTAVrjQkHUiuy/oDc1KvL6WjIzBvENGdaypT3gE/gm + PrvmYwbfTFKc2W7mKCI6y4sx1dFTAQkjzIu6m6aSZjRVizaoHM11qqy602zRaaqc80Iu4uJEB7NB + dWayMRGd7TAHIqQGIiQGctLMe+gpM5vsn5UBcT6awwpZt+xOp4n9TvNJLzxfqjPoC+cnB5DamNb3 + a5uOm6b3Tu8dPqV+24qXW+Gb0c14LjdbmqHMVK/V5riWoiq8jFskzVcWqIu0O1xv2/Y77CryuZEK + Pa1riRsx8yK99jXSa19Kr7eX+Ga9KGO5q51MQJFGtSONakcaoUBklh71AwroGOmGTvRavKqmwJ1S + fXdK9d2pJIh7VjXFtJZM2JqbqpSbqpSbSqrkznKmQnW/M+okzpWtX0vZGtPAmMmTMw32psF5theV + m6xMJIobYCAnfmJLpt8DILDF789nhxZ+8NlPbG7qN1EhYXfKZ85AMyAu2wqca2nCgtcr2JuYsGDX + hIAJC0IjWDBzz/hCXr3BVUZQ4khrhAaNoQFPnj711It7v5sybfEdsbOffBI7u+qqRVMmLrx9/IQl + HXuvHDJ/w6Zb562n3qb3Tl736fF14+9p2nzfkj1xcPP3rngJD5244LZRYxYvOB/vt3LAk5W3PrUB + JfN9TLN8qBkZcSGnsEPJBusesoFtP2uKJTPypl1ws0RJEyaXbpspmDYzX2Jz25pHlCY+llceYKVW + axoaiLEZBGqGTRiGmauRw4Jvxu19kfICE3ELTIaDzDIlMpj9+uzVhjxDo0FccJeizUx/yWbq4n/p + 9eK+/qOr/MYdRS/t6OmbHg1ekT48OJ5OTZ/mmRCc47nZt8yz1Hdf+kbPHs936af8Z/2OS9IfSt+U + Tjs2HSuQJr4B1lHMr8pkneDDAxPWsIZ1m901r5HsZzeS/eyU7DMaFyGlUT0lfrahntKonoI7RG0X + O1srmzNbuw1sbUoLQiktCKW0IDTL1qAFtqiN2FZGLtICMIFJDUjKf4PLdcEE7kZ54FsF4ye2BvyC + P5V/mIHLy0wDyCnWhAEEnjc4VaYlbJyFaDCACXeqM2nbJo9ZPjgiEHy7zcwshnFqIQlEffqm9Lmj + h9w8sB1ut3va9vNY3L+i7qY5Pz/6zKfkrSdm37Bl49ybH8FDjDlX95338XTVXTIFSx8fx8Z9sS9j + v8S+jm199kXa5v7t+x5YBuYP5HsnQngRFzbXrxOrOX6IFQRRJkIxR4uxwFlIMbjdiLAc4SNScs1h + BrNldUZi4Si5dsRzUmoRoEtiGaDQyZaPdh44cICWHThwfv2BA9DGdPQF14l7BQlobmKtZgWt5Anl + BSoRfjcZARcoGbGFRIVdeCBEcgOjTvQ0ftrPEY/EFZupymvF4SPM6SpmthVl5Hv61cHH7TESQ2KB + PSr3RhUOdJvwgkCjxBxXQf4BYPoBc2WrLXZi7JxO3zofo4TM34Dv2xrbF3tpK+PKTPwI15ETTK5M + NEeZxwuYE2UUojhEiRjiOCEEjsHD5CAh5EUeeWScIbFR9TdOJhZGgEdsNabYHFIRGP2EzePNjJQg + EAzE5qlsXJHCfJZPxoG2LCgLcB3Pd6Cvs41euaH+/g3/xLNKsoKD6AxDKEwYzzDigGd8FDOe8Qme + CU/7KS0WkEfy85hP8uxUOXCsuF8dY9o/84wiQeAJSHCU/0+eYdyW/XGdzrel+HycvkXmx0ZvxV1w + 8dbYeOBbvB4hvozfBVyzkio20q5ZEO390SiFeL6BlhuV841oLkU3SioIXEN2QVVfSN7yVwISoJqg + KC8k7z2TKiRqqhBfKBQsqZxEeiqBngpXlVRqxGJJ5T9ShGxNDSNVIiZKdpRgq26Y6YBfapLEH6YV + IMw5KjP9GtNH4c19vtHKmCBNlCuMJXSl8Qa/X9hr/GQoEl+GS8hAY6JSbfyq/qr9apU5ldM4K1Us + Ms9xqmaVBFFUgZYEVcQIQTdR3UzO+0U1DS4RSlmZk5VRP6emwV2yj+cln0CFWjI9KiNJ/TbKfla+ + CyugFUrUrvrROJEOHsgd5I5zdCWHuVqMo8pAda94XKUrVayyc0MXD4pknlgpEvEu/cOPEuqfARv8 + uUF2PBlGXR0AWrGnrsvJYrYUWccW1FLvYkSSmVymAIuNffus+/Yt5hNH8ID7VCtD+lT7Bo1IoOqI + 0hpOp5K4K/4ThMV/JLyHmTPKI//Hx7tZEmpp66g6VZIQBgySVEzMNzi6mGlzkNsgLsRByt7QoOE8 + QaSk8F1S+tnT9fc/8gn+eW2vnMxCftdfvfCeWA8yAq/Zef0dS0Hz10Bk8C3Iss2MRY8lVhtBwKJN + 2Vobx/UKlgTHB2fJC2Rhkudafro8S7mNv00R8tJl6s5r5kvPksEr/KaRvH/z90WwqLtElh12X7Nm + TZuizCwfTFC2z2dDkhvujTXc625kJ91gC1XzXkuJOyyozCkXauOnoiHmAgh2Zv4FgQmCILGRCqbo + CWlMLIWhoYvavTgCTbVrlITCaiZrV7Ww1lQmzCprS/U0hzH+Lfq0pIJLn9/EZ39yHems6ZWYRHIN + 6a8aU2oThJBYVbKYK0nlkU4j3Q2rROXF9SyJ1t8875fI5CY+FxYNYIP5Za8AMQeJ5fTtRdjEMXNF + ybtFtjcDjN021W7HKLEQgCSclYi1SCNnky0x2wKNcrJWEsSBgsSaQDgIoFzQnplmRq8h4Q1vzRo/ + YeGK4ZUvLYvdhS+Z3+HyPr1ufSh2BE+7Mtx9RMehq5fFNvG7ynaOu/LJwrw9lRM2V7Smg23p4/v1 + vqbpuXWi2mFKr8E3sjWC8fGv+ev4wygL55ur/2PI5CwwC2bwZfLmm+goRvlRgTYGbMDsrEq0IGsl + uo9/mj6h7aQ12mvaIXQy69csm9WeZcvKos2EJrZmmf7sS7WStOHOkoyJ/JSsm+xL7ffRtdb7Mjfg + x8kG2wdWB0pDHiPN8HBs2XxLkyLTDfU3KTJ0UCCvw6dSr4+TjbB+OQr7wV/0ZLtSk+5KTborOemW + ElfYL2HAZfNUK5FMSZEyfGNGmjEwTKY5gTCXQCRTCjZzmuASW5WNRPBMb9QCuMbphqFy3lpaUDMV + Ym4HEFumqjQxV4k3cMzkOnYJXDAnF+bEnltYwLnEMHOQiDPNzlwkrublS2KvfFUX++j+53D3l4/i + 5p1eLHz5ro1fjpx2atFjXxDS+sdzL+Gr3/sKD9t84q0W6+58NPbjqt2xb6v2MNv/ENiwEaD3OsxL + wiOy+7NxdymhnTbDpyPJdZEWXbwOntKibMYYGWebCz6yqRKyxXwvwG2WmEplWghPdpaRYqthSWZN + jYT7Ckpl/M9K9XtKqf5IKZXvH5QqeVp+kSa1btX9xmg76hUlQeIlTuKEDLfHTYTEL9Wp4ExPS3ek + U8FLXQFst8LOLWUGcLrFFkARtnrbDD7zcbl3MzL+WdWSWuZKd6XbnWkEdCwUKEguvOWBZj2E/3x6 + xC1ls2f1n7PqwMLYZly06onWPfvdM7X/ptjb/C5nVt+rYgf3rY/FNo4u2NSudc9vnzz1ezMfeyfk + URAc9ltcBdUl3nUSeJ8kiSKiHJsyi+xTkCQyGU8z7G3EofRyv8WvEYtH42TSYONTaxwNYCb/P4CZ + LP8XVFM7XZHUguQU9EsBW3m/Myf/hmTMReQlE7V4HiM5xUrub6iVYKczkNwe5XLPP0Qj5z+gC/hd + m2JdnolpmxhvIIjlFgJvZHTY5E2OyZsVIm5gD7DmAT/xK4R4lP+f/IgqifdbkvAV+xs3LJ1G/ldu + nExkx1iUdREndpic+A8W2P+TAxvoZ+e/ItX1A9nTd9xUPx5GOg3wdSfgawivN5/d403zOklFHr5S + cmA7zc1FAbuLhJCPmADoZKPFWHD5rDTgE2SMw3mh3Is0PbeRpuc2aLpWkgueNvAwr8JcIzppcsZ0 + CpOLRZ+akmI6hVbWC5lZmYfzslLMzkoxO6sBVLPCfgu2NICqxUwiWDLCY664CFT7GeVnk5w0TFYy + l6chz8bejbUXJRY7i1jGEXS8Bxf0ZnoyMzKpoIaNkDOcHZZCXDgYcmtZAZSuOwJQOc3hF+Eshw8F + cKYCyp5mg51PDgRQLoUdMpO9EfYWVXGDI8bUHyKIHTSamxuwmknNbVMxtrL8TsGOqYJsdzisLhPS + rfSiVVOb+Y4Hw/W2IdtFyJ7uElsSgHb2OmCanQNwb2+jfcm0FbFD6z6OPVyzFQ888jDGd4afC1y1 + /ZqFL18f6LAYk1W3/NSZdHkG15+YOWsnvvLjD/Gsmgm1d7eaXtlv0IIBSx7eF/ujcnR7bAMZeRzQ + PodhB+6V8PA0kIR0h7MNR32yZZ3lkIVYeEIUCVDxIlGQGomClBKFbSWSXxQFtqJoOmMgAlHFdMjM + 1QiBrRk4TacMm05ZeSX7h1tKSg6UlBwoCTnYUaL4k+/m7I1aYFD/g/JJSeVrZAvSk1Dk17BfG6hV + aNM1rlOZO1I+o+GlnAbbkBAnIMxT8/W4ovJ800BgcLWpBWY1qrFXpzG42xJPTIXscsHXZktEAdiC + sH/8ZfLXyy/XC/yu+ifJiL96ka31/eBpXgRgmg88p3iguZpIUs9PUwQRk4ygQHTVkmHcnw0MRyka + qvJqwmBSIBqqnkvMh1k1SW8vYVhH2KtKWztcYr6ytLWwTeLYolXi2KRp4hgMJY5ZvsTR7Um84tRM + M9r4+ZX8czzoO/grK9A6VI24fBRFA9Fx9BPi7X4oXIkon1g6ZnPjTs7Z96k5+yE1Z2ejRiKIM+fs + Ue7DskbGuvvI0i2VEKmVl82YWVzfEAKxNWXTdWqIf7YCOJLk+4qM+y++zKIZ4HP7+Nd0NItgcIaJ + f8Y4MkGYTa4VlmhLbIJsol6NwkCvFntqOJ8uyxeJuNxIxOULIi6HLZb/QRe2lkhhhWUm2eMrqYVc + JWEWTCLh57KSqLkopZT7HdjviDoGOiocnAOHkfnOS8LGfpeS56NJY9LHvj3FrjqjfMbZhugAAtBE + 1q4u0sXMaWwDLso6Z9pSeEaTV5GLX9No1xYYZy46hTs9J04f03tyk5fLXrr1pQN4nXvD3O6zbqG/ + nM+ofXPyMWZTWWTYzHy3+vFENgYTQAseSX4WQ5P120TSIMk0pdK0wY7S/9mvOPs3f074J3/uVHnC + jWAmE9GUy5B4zJRGOte8TN4DufjV9AruRUjQ4QkMmtBAqZmSUCICxEVr9TCdCWCRrJrNNGEgvUDw + 7A26JoxS7ewyr6tURphIsmJFkkwsimDOu5Gc9L+2m5NuIPbaRfLJ/0g9+fmai96IZStFXfbuNQ4d + 2svyUpFIQt5R6g3ZbNFUGMHcU3PPmXve3EsMdYOMIqYnAoaOmVzrhWyMxdyLqWSNxBicbb5lxGPV + b7G30c0dD5EHtoLvCMw03xJhrZmE2chuUoLsyCAlUS3p8gip6TKbRWzdKXIm/4zpZncpLk48THkj + 7UUJDY7OQ0SX0ohX4q5TF6mvAyvV3mpvnTblQlpzaym9grtOu8G6WJMUwktFWjvrANKH9hCjUj+t + m9VyL1lL14hrpA10vSjYiW61tuJJGs8TSdW0VrwEpKQO1gfjKCZEYv/3GoDJajXYPFXYK+3Evots + AJVtvYX3S7W49TZVtqQSZclsWFQusfij6jwFK7vgsa1YgbqkFg46Rl0tjdLzyNR/lRkv5NenG9io + JSU7/HwFX8kDKpINW23M9mSwF9fLi931pr6yHBKceRqdnixn8luc+JVP8usx6szc0uKbzdQSHEC/ + G1JIpc8jFcBein+ISPxDM3XUp1qFa00upJeYff9js9XCLibfv3l/e6DI2jxgvoOzvX2RtaC9SW5r + AaXJ92wiZTNnlKMZ5Sy5j9h8aQqzfVZJlYieTDaxbwKBISpytWuPA2ACcRDb7sW5+IpW6Rlt8SjM + 746VPBcr5Xed+2XVZQPvp+f/6sW9da4td+IcQ4QHwBfJZr46IaZWUncq2Sml8khbSuxKyhmQ3Gq6 + uQwLGJmeXI8N2mzdhkmquSdgo0QpTRQlIlIqyRwhsihxFKD7XAN000bQTVPl2wCjBIFPmSy+wY3h + E7oO3kXUYypcuV/BfmWgUqFMVyoVXpEaxw3JSMKf8F80GPL/Fj9wf3dhGuKHRhYyUh4pNuWlfMaZ + //RZ7GypsqhoMWcKSwI32G8FTuxQbW0kP+yQ+SpM61bMjwVJqJGivYqAhXu39yqSogUJsqBIzMkw + f1uwPQPIggTJSoOJXxwowSLRmgabg52f2e4AMitBZgHpZOQfm51JKUq95GxqfUKQVCohLIIwcY0d + qURGqhAzNwrbHniNkl2vnY+B1Mzn5oHEVJ6rZL9GhOjmM/59ZEVePNS0Q308Ok4z0tK8Lq+X4wwu + TXEpXm6ja7t1v5W6XG4v8WdFbQMcA1xRTylfKg83htlGOUa4RrlLPMO9S11riZHho9TuU2TnRfbd + 2UhInCn7vr3EGWY/2nqh0cv9Isgim14x5eSIbNmeTarILDibVzG1UCqyCTdBWfRUZuEsPWUy9ZQI + 6Q3RkB5mktPw3n8yLHKUIKER7mZkjrkQXaZyTuUNwtLvP38MwH4PuFmxm8kmRaYZZmRCaaP3+1Gg + gGO5CjMiaW+gwgJka0PCwRw0Bi/B7d7CvZ6uiW1/8WBs14bXcdZHR7D3xm9XvRP7iLyJp+EHX449 + cfR4bN221/GIF2K/xw7iNti7FSt3xb5KZJm4etB1DblxS3P2fONsU9JIH6NP2hXGFWmcovoAyJHL + nYjR7RdNyD++cru1xB6WdsP0JDLL1hLJzN5KRtIononaGZ8kj9+D4c/j1lIc11Ic1xqcFO3/Ndj/ + e+ojo7GvciGjOyMxJcnpSOU+zACDhY+braoZ9FutLOh3/3PQX+DyEZiXQMAGdEMCiTS9s9/UO8t+ + iL0RW4Jv2vNQed/WC2K387us9nHbp+2O1dc/Q/GyeSNvc2osz1caX87/APrjRE0INWdg9ajww2GS + 4W7vJEoml80C5bTstKDQjG/hioQ78cWujuG+fF9X73A5PyxYGr6Gv4nO4ZfRZfxqdB99HD1NP0Af + pH+FvnJ95fZk8hHUjO/Ec+X8ne414Q/CXCi9WbhNelG4t7t3Zs/snsE+4RKp1DbMOSJzRFZJ9nD/ + 8JxJ/HjnlPBN4eWZy8NH3EfDGYobO8EWbfEWIfaGaCtvEedOczfjO/IcoelNqNgk7E7nkRCgDg9P + 2Anic30+nRIp1yfKnouExtNIaDyNFhE8YYebza4jpbSOlNvtYNrL5teRUlpHgxg5Licef7PKZqRZ + ICVGgZQYBRoUNxAGA6E06KviNj1+U1+VjKYX9PWCuvZLJodS2mrmipMZDFcRshUabxhvlCeTx2gm + M8ozZnqjTh4hUXeHw7m+JunpuTqJUirmmrotyrrP1G09qduFiR+U5Df6eSf7JQD71Wae0Cj5wFQf + Stsldd7GAKB9OI/7bfHMoocefOzV12J7nqvGPd9gOHB1/akN054G9f8k9gX2Hp048opxD5ZHFhfd + dMVePPLTT/DYXS/Fnvh0W+z4HfnlD+CiLdhyV+yjGFSOvZPXKYPJ4yNg/TcBIrhRDplnymPArlix + vV3miOzx0rRsTjZ/ciOZe9Hc57IAjk2U+cMWRqgpQkkR9tr4F1vtnjZw/GlrTl4bGzvPymtjJI96 + 8gjXP96aFU5ch/pG8siuR3sDEbJennm5f4gyMnNa5kz5BuuN+kLLEv0ebaNeq39j/Vo3AMv9Nj3N + ZtNtuirbvSTgSbcIdvZbGN4ty+kuT4bP9UJ8b6Nc+d5ENsTlQoEcE+fcIIlWyXeR3F78OlVDGOoL + Wx8QUr+1E1LIZKZYMsxki2CueJX7c6fnVubS3Bw3+du7Uw1w5/5f4U74r75JsNOGf8ptJi1Qxkl3 + Mt+e+PG6iXqRSD2cFOWbv3xJ/PCF///YexMoK6prb3zXPNyp7jx296VnaKChuwEb0L4gNJNMIo0g + LaiAMokMEpwxCjigEo2KMzigooZ5EE3gGYc4k0TMi4lKIs4a+QzyItB9/3ufqrpdfUEx771v/df6 + VqO/Pqfq1nDq1D57Pqdy8xAd/8DyB2R0NeOr9xl9/YG+pEJw85kO60VNJBGv96OuEkB4M6l6oziE + KELklI+Jyc1anNxvGdeceBw4H2odXDEbGBZ/NX04eeGwaCQaLBG688hhSxi3ZclWndbyN734xuWv + /XFk5fgzsodeGH/xhG6dRvyNW7vsrlF3P9LaQ9o1+neX3f9uQVnpqEtb53M9r195iktpuVSo7XPZ + kItojtvk7Kfil9IfoYcwgOUJ+KHCkddT7qjnMmPxfRnWG4zblQRWBhSx4zyO+KrbUXc56ilHPWnX + 0TaPWQTB2xXOrGQqmy4QLhAXCotEsayil1CfOl0YppxRMLhoUGljxThhojK5YELljUFvCTl7iXhK + 7UqZXSm3KxV2pYTRlXmwWSmzK+V2pYK8Q41Uq/SUl/KlQkVZb19dyaCywdWT0k0l48vmuGZ5Zntn + hKbHLnNd7rncd5VxaenCsuXCTa4bPTf5bjGWlV5XdrvnLt9d4ULLbO7WqTyQLE9o5Z25coDOiYBY + 07McpiPr8XS7LHljkk+WRTzdCivKuDIpIuXCU1JhN62wMCIw1Ylctc2mT5mKZpY4Uv21+V8y062s + 1OtxSZ1SBYVJVZFFgZe5stJi3CdLhcluiQyNodtQ9/g6At2Y050ZFAaX5sZwU7lLuFWczO3kNmbc + 3QrTweDA8XRjiYa0h7aoKfgEw7V26Zbt3VS5dEutHDpznUnt9Hr58Z3pedgQ7pyo6eQ+TmLZWZTY + R1x5gCwfOitgc4BALuMicBYxinhPyxHfPPIAc0BZEU5bkrEwJ03VM1qaqw7Qn0PUUzjISb2nKPVE + ck3NbxvjnHODjfjkDi7JdUtGupkpQ91ckUKmDUUEOwqEw9VMHivka2usQFppBUubZHOMrLhoOBSN + iFE2nkm8lU/e4Znyu6vmrR83ZnK/1jljZ1549be/fOT75dIu3zNPblxbfwr357OXXr786AOvtP7z + Hu5PxsW3TBi4cNDgC0ui51X1eWT6vP+YNvONa70333rtOaNra2dX9tu2+NK3Fy76nPxKPVCr3UX5 + P1yUWbCyzXIVuyLbnl3lpJ5d2fbsKifx7CL/lvhCJDZgix1qO/mFW9JmOssOOc3x1ZQXy3HbOMuX + /lnGxfi8ajH5b21/299tbn/M5u6tpieHrqhuv8fpesNXjwbngeZPDDb3vsFykef+JbeCKtNKI/jG + BMZfaxqsaTcUr+KDrQXiTa1JyfPMM0f+SX23Fu05ikSEuH7mqgrlvrPFs9VXVTGy04pJ1In91EZx + uLrYt076zKe4gffTFFJZC7UTmCHHgAi1uWND5bxt0fM5i543rMjUftOi55vTES4dGRPhp0YuiSyN + CJEftBK2N3lYkMr2R+hpa16VKT11e+zoOempi5YHzZSeek566s1hsuzbpKcZnR5pNFuO3ZzxxsyE + KrITZD/27fY5sga8yzSdWRJdrd+y15hHlzl3/eLUF6a1Hn3nrdYjl7ww5Jmr3t0u7Tq26f3WY4/c + ynk+F0Yf27x72/kvsNUCQEMtrJHmz/GnMwqWutqT4GzRIGLFEjlqOx/4kVwd2pnETt/4tzmRY3cm + 782NAy37RU7qqXZ9a5Me8nh+Y133E3snV2rlCfB2RU/Y3iI6zMqg40rtiApWHI7dTIBiqsyy1EHS + VInjper33zTef9NfWwumF4LSf0urJa4LVAplerW7h3uq+0b1Rm2Ve4/7oNuVdo9x8yLvUnkrJVrj + 3C7md25oYAlfeLauaWlVCqmqBDj4eCnE85KGt/o8rYOqTVe56bzKAiWV9WNUbqm6SsVtjst4+Exl + /RSeu41/iOd52uNPS2Mkvoc0VVol7ZEOSpK0k79hi2vqE6YrcT7NMSfEDHNVh0T861hD3ppAVrZZ + qM0duBl8SIT/Z7MW4KhQQ+TftrPWR2ysxKN7jyWvIbBVAZnjgKa4HD/vjjHs7RKoqu3IIZuiE1dr + OgNrOX5Ay+/+wF3Vvai4G7fy5ZYXpF1H/7T0kiVLxM4sVoMmgLKYtH/+v8xZmz6btvDd4Qi0SMTr + oDJftiV3hNDuCJvefG2Zj6Kci0M4CM8kaFsaCnYF72drVV68hE2TPgd9+hwC2J19B2/jsdIyrXqm + tqkzlPs7B8pj9dAbZVXv2DAY4h8WGBI7Gyb4zw5MiBmr1dU+3h+LxQaON9hfS1OpNbhEvCpcJ9W5 + B0mD3CPCZ0lnuc8JT5OmuWeHF0mL3FeEfVKYvPMBVGJ9POvzBtN5FmVKCVFfoSBKEi8rSH06sh/N + 4/X53KFgIEAfe4yhXd1/iwSxNJXugJ/KzKSwqqVB4vk0h3yYg5ikqoXhWCgcjgXcmlYYDmA14Hf7 + fGnDHzIMf0Bzq7Gw5PMbyIyxSZIQM3w+TUMywDbFAgG/H9RENJowBmjcWEhjj42FMCIDEjd2e5qy + q+LxndzNm0zjoTkRH9mSiLW0JOItsVGDpw/6pP1yV/gfGQuUTmmjvn7FSKdLvH2BZEkLJL2If/q/ + aNecf5DMfUjmfsegCOg0rcEcAmX4Wxen/5yNBMvp7m37YYs7I2VozQyOhWsWNEPO3emQiRmPO4C8 + AF8Zx4dVK0uTXOfmWAmaYyUYwCJYy5VwlK3JcQ+2XvHKh6WJU3Qu+sUfRpekun3y29aLn2t9vUKJ + hlpfRV7ecPedX5YKH7QkWr/6581bhV8daRSbV6anDzn6CI4s2eLobn4q4+guyWKYbqw41AqPQ62w + mGwuJ9gt58YX147P52ZWiyjaBgQtjn/MwfGPOHTTNu7vswP9tjrkPok6tKNJ1foKYj9tZ/bTLYFo + HbLNTzNerIhx/CPQH40s+Fgn+uk/M/2wIlbin0C52Fntold7xYu4i+SLXB/IoiQKgqwqmixrsqDp + bspMS+uukK67ZEHWBDI9IrRXSPMcsmxOdrtkDpUYzrWTj2c0XdcEHiWHdycfy2hu7cyMvlTn9Z3c + tozH5XKnQThzNH8bY9zbMrSWTsg2qzMupnK5LTXr75bixce2e7wvdCJmXsXEPWlXXxstZvEJaVf9 + afU3v0n7K7pXVanIzyWWX0y1FZRVbOCfERujSJcpRz6x6tbc4i7kVkL2kDlLgxRvjpnTmobmsooQ + d2Y/2BQnS3lim0J+HI9PbuZcMhnQ+hwXqhyqho/IWD2bV82UuzZ+7+f7tbz+FddpzOCB53Kpv7fs + 4OcKI1sbr7xy4Spuw7EtLXeQz2d49jMxJZ4GldBHKGZaX1fNo3WJexJdOnu6dKn39A73SfbtMqxL + s6e5yyzPzC5Te9zkWd753sh9iSc94Uo7hF7BVhqi2rr4+srt8ecqX4y/XfmH8PuV6qAIV0imj58U + rkCgLRe9F6l8o6lWFC2KVXXtUlcv1ncdJg7t2qROrJqhzqxa7F7hftX9vef7Kn+fOi8nGtWlddGa + TqHYlM7zOvOdU9XeBu9t3oe8Wa/0kHeD9xuv4H3OJvcdTV63tbLWF/ZaW4cyIVpxxctmRXllmjXl + LbfGojfGRtq2Jq83JUR38uu3xEzFi3wzXXV94PjYnaFUSoHcs8DgCr0mJbg6n2ecB6j+OiOQ/3KM + 0GOWO9zVBDIju7JOpaQGW8b6V6YaXCoSJZZS7hbNZCwl7xn1ZynlG7io2aWswaW2bVC6kz8n463I + 0CoV6fIe5RvKpXryxpHViEb8u2blOVt6bmkq71nPomCFJXU96vfU82vqufoozQyni0dVO8oaLYsV + V9uLIVTbArnalNUZf1N16W75bZkvkhtkXg7Zumkot56CeZ3uTbKXucXYSJNjzB/G5mjKzF8ve5lv + jCWVyT1PaUsDouV5TPu1qspAdYqtqPR1TitnPvyqjz8mTfwAmre4ecBcmyZ38nzTO1Cfm1LCxhKl + 8MP85A4Qqqrcbm/nnUI3cvGnKnShhtUFVywaTYXMNTWUXHZYA0vQZk5ae809Zt32Yf/1qqswp5+f + xjNzNxKmxfZKygVZ8fLmdCk8SOg/7dlZG54fsnBor9nvXcjVDr7hmssKNsYu3nvjDevHGFq0+PlU + 9PwX502umTvzoofLC64b3/jUslHXjgp5PYnSMv3ibqdOnB+bf/OIzHnDuy85eHTZqadw71emjMqR + 1UOnnjP61J/ROF6O45gitwYU8AE2jq/gJLevVOolDZakhqKNRXxRUXGqNjUwdUnRqiK5b7B/pH/i + jMgZiWa12XO2rzlybmKWOsdzke/iyMWJPUV/dr8XfS/+9+BX0a/iHxXsL8oWxdNSta861ENq8GWk + M3xjpBnSewXfiUcMtxH2ijIPyRSKSj2c8rpo6kCb+yzmUNRy0wgyxU2x0r0uznBlXFNdS12imaXs + YmPWFbNyNg7bnuSDdqKOuRyZi+bAMxc+c6oQKbkWIcOziNBvEuH2Jn8tBOyQneixQ3aiGeNldnVt + TuUUrHU/4k1CGc/v4bhV3BpuI3eQE4u4Bm40J3BkjNOg5WgCcAENL45RN8csWC5A1M0x6uYoA4OG + FTs0Qk3mYiy5k02C4OKFQ/q0MzaJcBeYGZRs3wEk/pb2A8IMRTSwSQamAJm/AAl6K6cb3rA50c8l + ykk20U9W2BKKDVX1ttFfghTcu7amkA8bUFJcIYSijlmr3R7fumDT+RvmZ1q//fXzs/m68b9Y/PRj + ly5+WtrV8t1to297bWHrN63vPsDdtXv8zW++vvdlmkM3JvuZ8DXKjQR/nmktRLMHbU1EtydNaXbF + Z1cMu0KvyGkN1nmv8XE+Yp9j4BIQQAykXEosJbo4b1hRqa8V1tcKm1WqGNTXChv1b77zMnMMGi82 + 1xDYnFHNzRWlTg+eHh0XHBedGpwavY+/T7jX86jxaMKteuL6LH6mMEu61H2JZ6lnnXubtl3f5nZH + 3MvdH/GCt3iKb57vGp/g41AMZMp7sNy6qdisVbAG9sNBNNF9Phe0tTGFTWdLzLUZRjaZ+5p8pV6V + yZviJLBMlUMO2fCP3GFQ6qoqQk0F1fGMt8p0AWcseuYyVq9xvU0unMZdjM4yjMiGMtJKMNIalgrb + zDtsk3bYYt6dmsKlbytckdKg8IqXxcJ1uoDCpLJiL5eiuK3ho/RM1r2YczmZZOhI2FxgLVrO1lM5 + ZSL+uuAQRc0W2Om/yDqN5gP4P/M0IsFOzC2yRnMtAighAmKMUSwqrwHGel1KLsPcMdeCrcVQx1a7 + y7kU2WKm/TcVfPOr91r/a8HnNz7z16IN8Wsm3bD+0etn3coti+54myvg9Kc5/toNa5Oz5/z2j+++ + 8HPklI1IuR+as6r4IOOUV+q86Cnz1HkGeaReoV6pCfxZ+pmhcakL+WnSdO2C0NTUnqJ3pH3B9+Mf + Bz8OfRP9Mv4x44iRoqKqBLHREQniqUp3vtTTPdKX7+UZwQ/2NIaGpSboTZ4LPR/Ln0aOcIe8BhcW + vC7Dh5zSpfgBWSXKnAF6O1aZm3kYq+XguTZ9Hcr8vnZc1XdCcitt8pUZxl4/Z/gz/qn+pX7kqzRU + TO7qDxD78jMNhvisX6aB5Wfc1s8cckQTfi/RhN/OMvPb2WT+5+zWIWNdFFBzi+vYK/GYVLa9KVCq + 2NERihIS5fVr2q28rXyoZBWRqG+0IiiFbAgzxUApNIc2o0imnCkJRpHxwroxDj5JDmrmh8uxRrbT + TLdEftn/gOWiI7QxSsqcSm4SwuYaywKyFC/oLpNTuhSfySlptWXmv+vUi0Q8yniT2pBvcs7p/qdM + f/GafZfOeue6qXdVb2lJP33p4seeuGLJ2uUPrjz6yEOccNPYAbz3SCMfeOO1/3j5vTdeJNk8AmVz + IfLKMFJchFFctAhSYbRumqVmbbxrujBbmqdNd6lhcxVY1ucHMmdSrSDF1nwJ/Fk6EjqcEHsG+sZ7 + pgYERiYGpMYGJsfPTJ0XmJs4L7VEXhI+zB+OGRDhfJ5odEyEnKdCJOVbZawxeMMQkyldgV38ehqr + thTbk2Gv2kCec2cQ+RhNKjr444trbmmKZjyokjK/qsdeuMpjZ8d66KJaRZe6jR7OkyiizOWy8joq + d5DaWcQVRZ6zFeLtTZHanDxom36k2nLaKFUypV3qbHqxycxiU5mqJkrCzJFQipGQydRSjHhY0jmR + UHtR21zFwqIHcB+S02EW8xiZm2WPP5jz7Pu3zO9vzS23pvORErkgmSkAJqKWojSQeliVPbCXrHzR + iBCNeeYYYPQw+KBg6GLQYm96krE3XbGnkk05t7m6yl9b3TzfweLMDJ+Q0om5jblObFEaWTh3V9d/ + PPt56zdc6K/7OC937DN987ILVra8x491n9J045VPck3RR7ZyRaijuLnK1g9avzfSG3ZdxN25/PSL + 1pFPOYhkuFT6I0S5c81Mn5DG+eLV8R7xTPyS+H3u+z1PetSEp9KzMb4nLsbpJRYliuoKVI/g9qV0 + LsxXhYKiIIP+UIgLZYPmy9rRFMyIbdPxbIYQteaNudCUEEHgb+dY+t2WnqfUsTS8qlRR3Srg4hli + QfGMB1mQZZ9XMtu8mJgSdLUs9G+tsHfICnt/wfQqlsTL1gLdmT3CliaCR2Lx57ld0AkOczrYZnzu + nZNB39/ozxjF11VfN5sWPS38WO83p6WEDL+sKbKKVo2hBZLgl31JDm3wLtdey1UhC1mQ3AZ6JEgB + lW5b5wiy7mORa91aq7u2xsy9LOlV26uuD0W/UFCRnArTAmebH3oomLhu8RmTk6fUnDno7beFe1fO + n13XOCHwgN449fyVx2juOgxsHSt8gXyCVvrozN7TVJdLCnV1lYXOcA0OyVpBvKCrqzzUtaTe1Ts0 + 3NUYalLOdl3kOqJ/F/Z2L+lacVrJaRVnVKzquqar0rtT784NXRtdjZ0Gdz6r01mdZyoXdLqg89Su + S7u+V/FZp3+UfFPhj0bk8E5+09bKVFBhmo6Rhh5Mz1nKCBpNXf6qjCGlUj59cHHKrUfCtWW1tCKn + cxXObx1T6+2lY0qb9LJYbG+UM6KZ6NTo0qjYFd8iP74rk0JRJoWiOSkUZVKI1oNie78wpRAdRetD + WVIoauZoYwUF5hEHjzpi3dPdFF3k48qguMgmyCKbIIssgow2FZXu9r3t+9CX9YlFvgbfaNTxbLbi + syRV9yYfYyu+BJGdr5gtPpSiFpkrvPmYZPLFq7ou6kTCqWpUG2eZb0VeDad8YgKKcZzDtHbaAWst + jwNmIGk+KkaoDeEgjQgAwZTENHnscXcxW+kRe10OBysZ7wiaVqmp1iOPQg5CHwSg+YzMzqww1+0g + uRXtZU8mcK5VM2ODq+b0RVfdEPNyizf+5eDFv7/l+cvXTf/Lmt98cc+6q6584pnLlzxxdmJsWc20 + SX023sz1f381x61cvfTYrH+9veQpocvv9+x+47cv/5b4yQoA4TMWKXzVnLMUwfEdjtbRCpYZZtmX + ib2EwcIuj8h2haPxuqjqd/tDgsSBLyUpIZfubqfPuB1U5bZ1m0xFk7tMy9T2rstq3B6NizBlJpJh + U1kr2d8QEY9GbhQ/m9TKjDstQcdpzN/H1qpmfh+Non3MWKRpsGz78HaWkz+KBTijdb3rNkYORvhL + ImsiGyPZiBjhQzYRhWxCCdn0FSoz04oNbN5BWhg8jYNmP4gsFdHyNx7JRBk3E+2ZUY7k4iOmYQg8 + Y188M0dHhYeMiTl17PlV9rSo+VWH2lOVPRHdNArJLcn4mFf2KmVe2Z3kPCpyMCA34rVQRQscJ7e7 + dNAFCTlXj61zJFrHwTQS7Yk75rqg/hI/Ixc57F+x9eo9i381Yuuls8fc0h/NwW9vb370/pYp/NoV + V4y79aqW55Br3YAE0Z/mUoHC6+ZsKj0/0tO26gVWBsQtJ/Mxh8OsrS456qJd39rEu2w73a7IdkXB + Su6iLQ7rqq0uOeqiI2olWm9XsCuyXVGw4mhpm2++rS456mLOzdenSetN73m0tkpbo23U9mgfagc1 + BbQi7RJtqfaQtWu/ltX0Ig0NPkXkBU0Wnsvusa7QpUm4mgNZkkVdVsokEB8S14gbxT3iflHeIx4U + eRDT4l7cEkXTz8CPF3OkJjJSE3VqgsiEpmgLTdHOJhDJK6ET2Ymj1HyCW9CfrRqKZFXF2SEe4lQL + nNkh7f8ld4i6JNPSO2zBfPN7BLT2DpLUDVu3bhW/fPvto2Gx/Oh7wGcfbh3L9WX0EuCWm/SSm6Fk + V9y5QL9d8Tojg+1jhW674skdYw9awa647YrHUi/LmkSpTOon1krLJSmqSpIiirwoBYHzuHgh5Bb9 + kktxvJMS9k5cspLy+1ahDhSNohzwlOn6KhdX5GpwjXYJNMco04fegTXniLmFXMzp6Spk/is3vQaX + yjxXTJq44sHQM52G5MsR8gT1H2VQ9G0+NIwkx08Vm0CbeyP+2toVhmpOmveqhq9cNfQkp3mVJJgj + Pi+BL7nJr+Coz2hz/D6X81VVWe+KM1cIppQFWj9z+dbWi4p7F/XpvbV2wN3DxM9///vvr7jHO+x2 + cfLRNS+OnIbsDse98C+atyoEzLki3lz8STtRxgEbJDl7NqfO55b/tRYEzqSaZNMElJvkSZrg8/xT + OiwLmr3KiJlTqtsVza7QLJQMy0kdL/xM5wNyOsgCUQe3BCooMHVwK5YBie3oxHZkrsc9sihKotxH + G4LkIHfTz9Z/Jlyqvyd8JCvrZK5ELlfK1Hr5FK3BM9ozUZwon61M1K4SL5Pu0V6W/yC+Kx+QP1f+ + S/5eDQd0XRIEkZdlRdNU3NBUtUyRQ4oiC6JYJukhSdJ1HOYi5SeIEgWFXS7QxZ2cL6NJIguLFKu0 + FU4z/4xhTkxYhYZU26xcm4xdbmv5H1cZ5IZPjuz53MoNfBnHoa7dAKORU9M0x55MHDH6BHPqJ+MU + 5CZF8cP8QMDcVRB3e/7WacgMJ2UywrRUaEo2m3+Yks0OVX2dCxGj2R2tp5wHWmQYy5j5sRykVLW/ + wP5aAXbPCI0r0q4XeC3moakwzfMnmgsSZ3Sta0G9phYU9JdpbZCCepnyz9Os2NTJWnaYzYWaD1VV + LP1Uzu7Z3IlNmNkcoeKDzUa9bBZsy82KTS57LhV5oehWgfdFTg1F8G6hUH/2h7J4N8fo5K82Jc3D + ueaJZgihLUGOTZzx6ci1RRBVFKmibIpSM/xvCVP6cEcJpyAH5NZ/3jqL2/1B69prpF3Hnuc2ti5u + mcYXXd5K3zy5DuVnHzYX+drjpWcuIHsCWZknE3OHnkAC5kk6x1WPk2s7miQmvtis4z6nmLOP63qZ + ZY+eZllszk7OlKHO55OKpIekDyVxNP45KAlF0iXSUikridglOi+YShJdiSlLYbSOHgJuDxxEgnRo + TP9q05gKHBqTSZym7adahp+dEZfN2jlyljCDUWJ7YUbSjEJG1oxltnWc7NoCuvnyrNd23VY2ednU + cuVytMdKhHksQ/h2CDqYmdFuBkxb3e+oFzh6OOWoJx31hKNe4FidLOWoJx31hKPudqR/eRx1r6Pu + c9SDDnPNcNQDjrrfUQ86FHSnsh5w1P2OuseapKHaszUoIyAz0uWpKxMPiAe0v0U/Tkv7pMNpPqqm + S7RYMq0JQklhSg6ThaVwckkibuh7y7hVZWvK+DIUst6yVX7OLzK/JZsj4mcRU+a3DLEFJtmnM4hM + /DzzXjIZ62exUr89KajNh7mTa94Ss51ObWn4VnDI0xQrW5XkkuxOydydkuxOSZpw7Kc7JZkKn2S+ + 8yRxVWZUJN10z6Qdn03irbYDX1ti36TEZs8lFnsONZWUcXuBo7ACXwTEpAXGpAuOY9JMiYCIZTkc + s30ghzIhZkKY5O81+XZp2U5uyZZ8pcIMMDE71BF2anYubEXbLSzlZ/4CIPcIaoEjKZvNH3Wu3+F1 + h4LlIbc/yQU8YdvAsD1kP6giZnRDTyCr5GRXGBWR7XNciibIhVjdPEc2DdsamgFgj8MwSyCOstVX + mUHCnClO02RtzbpZi+8uuvq1B9dvKZl82iW/3Hr2tDOu7SuW3zlqyvln79qwvaWCf2DOlL53Ptpy + N795yZIx9/6i5c+29foJjusI9wnzsgQlQQ7yTxg7jY+ET4MHhcNBWST9oBjp9jKDW23sje2PZWNi + Wg15Q5EAWq+cHPHoHq/b286E9TpGvjdnwqaavKUxZrHGmPXqYnari9mtrpzd6mL8zlXMjmBBTaYw + MrsVt7+3gpy6Ff08bE6BcjHT2MXh/65RMeKvCbJhYwdj/CWxNbGNsT0xMSbwteGITXsRmxojtt4V + YRz68Fa/35r6f0LTVc8zXf0O01W0+PGeTCDfFB4VZQuZ5v6ZxuwhZs62+6HKXjmBzZ5t+LrNno3I + fk1XdUUXZKPcL3uTnE8PWGRHC77MJ+UhmdE8egSJS5ACjKQk21eSIycrPu+gpRUPX/r+1LVjDH1r + l9lDFz4ult+9YfAlI2uualnIL7947oDb32h5HoXUoOxnYgVSiwfiXJboZXs4Zk1E+4zxFFqjOjOd + anH2Q0DR4+4h8lC1SZ6oXijPVNU6o2+gb6RXbLAxIjAiMjg2WZqsnWk0B5ojZ8bmSnO1acbcwNzI + tNjPuLAmS55zhLOks/Rz3HOE6dJ0fY5bj6ZExY8cMtTO9xZyRIBCOd+b0RQqTTI/W5KRm5L7mJLC + 4jxW6NQOqbOKNRnWXN7amjDLKnsy3tKyuh4KB4qhpBVByaWTUHDwQ+SULHeWXPtY99pEljPWvFbg + cQCOAXB7ybvLVgcEFsWFFCMq5rO3mBdj3sDW4oAM3pq4Ig92YLLtA1xuK9QEPRPk3re+u+WkJGN+ + VTOqp83t6cuefUshIZZ/NU4ap50vna+JpOYxRrXJ5TcjQy4xan5wS3FMyO1jfmKAeeudrrVBj974 + 0l+4yBVf3vxh69fPbl6xfPOWZSs280Gu4tbFrX9refPLn3OFnOeN19/4/Uuvv4aPtKJ1ptgJqSoA + hdw+xoUWuY1uxqnGCENsSG9M80Xpzu6SgppwTcHAgkvSq9Jq32jf5PDo8ORE9Rz35Ojk5Cx1tnum + MTc6O7kn/cfQ+7H3E38sPBA6ULg/nU1HSsQqoyrcS+xrNIrDjUnGx64vC1oNl98rRFKUpiFHUl4X + eOPtCCruIKh4jqBSTfHSvTpn6Bl9qr5UF9OMrNIZK7H+EzOjTo/Zifa2fZZbrMJM2dBplPhY0v0i + LljL17YFEG2WZEUSM/GmQBnAiTMw7MQLw5F4YbRLvDicn3jBks1QVrHEi6IhfWJcu8yLXOJF1aED + x+dcmPM/69unXIDX740w96zXhSxHTu0UuuWkGHOoEa3YMiwSDrE1lCv8goNgVjza9/aLbtg769IP + r5h0W3f/usVLnnp80cJNrTOlX980duzK7OpHWo/efEbflqPCo2+++Pq+11/7E1LN0NaZwn6kGgNS + 3G8Y1cxx8VV8l1g/fgR/mVtuCDfER8RXFa4plOqCdcmGwkHBQclxwXHJC4IXJKcWLi18R94X+ET+ + 3P1FzOjMF7urwvV8L/cwvtE9iZ/J/9n9l9hHkc/jnySP8T5O9IQSKZfilUMpEUkl6q2FdtQC7RIZ + 2lz/QAFoH2f4Mr6pvqU+sZC5/gsZvfiY69+Xc/37mOvfx1z/PqZIMad7hN6gz5wDLJuHs0kavkV+ + m2jyP9uXiTb5S4+LMedlNGQqm5RSxv6Yc19hzn0lYhraZrSwoDDfrW959R0ufduhf6j/8fRhkgcn + hhh5iC6v7HElGHm42pMH57eSGnpb7vp2UeauXe4e/+vWb+b98eqX5j/c0unpJQvXbVh86SOtM3m1 + 3yiuO6esab1u3a1HTheeefPN377yzruvkF6zDIB/GanDz7Fv5GT6VQc5Q+RKxDrxdHGcOENcJMqa + X9VUzRP0ax4QVM7FmAHoWuUqlVOL00EuyBfnfwnR2ds/7PPOWXD/yvgdioPMeHw7ndV0e8sOX8Oo + wJAXT+T2PmA0H1pAy/JRH9fb3zAC49UVXrbySvMCrjm5g5RK1CVdO4XeDl3SqUeaoTgFZf6yh0+b + 2XDOuacNHNjv3FChWL52/tC+j1cMaZi6oOUd6sOG7GfCJuzDHmIhs8Zz4c2crRAnP1cfRvaVjiHg + XFS+vN0nVtrqpY56iaNe7Kh3ctTTOSXyyiaxOFTcVxuuDSptKp5efKV2q3Z96brgU11fEDxaNBGL + 9hjR9d2olOTH87xRw+mxyepkbbI+2TXZPdkzS52lzdJnuWa5Z3m2lm+t8NEkvdLOvUsn6RNd08qn + VS4qWVS6tPQO/X737ZV3d72zx6P6k+5HKh6t3FL+Unmk0jbmiu1KiV0ptSuVphvOOoYqJXal1K4U + 0HolgcL6SWpFmVsXE+nysOjqXpCg0GNxvCtLU4k3xEfHp8Q3xN+Oy754UXxe/MO4WBS/Lc7Hf41k + FEYKZxkMmRAdbtB6Qga3l+OBMzi2mtiWUKSOZTYYXn8dx3WfXDCngC9IhRXRTKhlrvJPbHf4J5kg + 0aKY6u4qSnCJ0ngmGKurodNrWHA6Zv4lNhFnX06Np+nMeJrOijMPXZylGdCvAzRTcvLntE252oIM + pwt9XjxVv7cL14VuTZfpYs8a72IzuS7m8mRYec5+6VuauiRYWzpVdKmbWrOnhm+oWVrD11C6RinE + TOuQDZ+0+RpQKlOFWkiVHdTItMUeI03pUh8TlD72IL60xXOPkAlJXxtmrNYMcZqTDjL+Jl/xh7bz + MN7TyqNAfuhcCRn1jKqvF4yyU3WrquZTNoXDpPya0sGq6KuR81meLnlhaD4qFbm1IaOmrp+p6FZY + IoW6lvuNgBE0BLnYk06CVqkkOakb/ikM4WYnb0kSiks8brWznuQqKzRdrhKTUGQUkFVgrgjJ/jBj + tEvVtddeCw7eTZGM5rYdnGmcAscVuMrLC7qbH9jr7oonEuECpv+F25KB2ee3876uV1Fe0Z2nj3Af + N+MV/6NFQlgYtmGz78YrrlzSq+yOl+8ZPeCULr8Yd9WvJ/k3uhfOvHJWJFKdvH733U0zX77q7T9z + p6ZmL5g+6NSSWFnNsGtHDbmssqhq6BUXxs6cfGafklRBUC+tHXDl5EkPTXgauVVp9lu+i3QPRLmL + mYcq3c4j5Go3ObCtrjjqsqOu07qD5eQb35MpxcrSOAec26NzAkQMrcqno9YouHxGMRRznhOob9ZC + XcWovrm5rKIO1gZPVS5RliqrFBHQfFijbFT2KHsVmS3OY63Sc4iNA4XmwLIsT9NTY1WsdXuOMJom + w4SUTQoNWPaJaYApu/hZEON6b5qR5/xj36U2w6cHSFh/TXNkSVj7a2uNVx2LHCQ3CRG2UofgolVD + azLaHA41Dr9X15js1mX2YaSammrLECiLmklilO7h78O+YcdmevJG4oz+58/pev31W7ZtC1ZVFq59 + yDht+sP8BSs5ZU7rLStb7hjZNUFy5jqUM/vFcmz2DjOCnqDEqXC0jk8HI7TkxcFMPBCqqwpypWow + 4uaCEReKaT/2P9RG2nkdIg6dLOLwOkTKYlFyDySY7yHKvA7RAEu1yE06iDIZHc35G6IhK+nCipNH + mUsrSv4GD3V5NsrtiXLRUQk2H5hcDYmDCf6SxJrExkQ2ISZyYbZcAM8Kzm2hOH5OcaDPMqe1vdp+ + TdRsxUHLKQ5WCF9ngXs2E4gF65mvQWNhcm1UvJ2j14qFH+9UMJUIljndv9765hWymYRoeD0+D83M + o7WmBdkQ3UnwqH4zeNaly7Woy1WxGdRI/H7mrhJcEZmRQYOdUm3mCVaUs5hZtG0RR6Hhyn3nPjLa + cG11+S8eO/bWflvv3zp07uheC/nbW7bc0nPI2HG33cDXH30PqSBBeRRIBTp/gZlF7Zif65iWCyee + lstHcq58pzKutmVi09xqZ5Z1VFJBV2VOzk25LWXLq1VXOWfesom3O3pJHBT763WS2h5/vRYJpOpU + +sOjqNqCJWeVOvl4tcJOdVCJf5idpxWX1UEE/+DWe5mrK7vXQRr/+NydoVIr1+uhlz4UhuhNXBM/ + UT1bm8HN4GeqM7Ul8DPuZ/xl6hLtZ/oKbgW/XLhRuUG9SXsAVmu/0J+Gh/Vfww5lk/4qvKS/B/v0 + r+Aj/Sgc0rvi4+gxiOiVUK730UdDRtekTCBSJyEZ19nfYKb5xjIpu0TuPjbpG5i8o75gqwox1zX2 + CtvLS5LbRVNL3q/CvkG8WfVmFVTnJib30RVVLdP0kKbpIPB8mTlhU9J1VKfZ7EtZ0TUBOKnazbmL + 1Uwmoy3VeG0nl9yWkZZKvIS1jJbmM1yx64s/EDl/nYi3NLc0J2JfH2i2PmuTi6z569uvO0iTyKxp + LW3/nBODaS4we9fOucBsfmOwluN+1TrnNwfKimJVXz3berFY3nL9hfPOWszfwKiS5ivuQKoMSF89 + j5SVo0jy5vzGkaDjsWKN1nLxdoRJyuVS8Dn6FNqFmnIUbNjTG+W26Y2aI73L2za90dd2RMBxhNp2 + BEkFu3ntRpHZPHv6sSw6prsfa+ewtc7xuXNHBBzz6NW2I5S2I3TH9GTRrqOhVOw44jNHBDy35Is/ + bRtXxfhkXuvQDxxpKrm6vRRqgOxmJhzNiWSy5XN5h32WWWTrSlDNn3abP+zZ6jWTQ/Zkqqnmz7Bt + 3S9w4EZ7iJN9SK0eN/tYh9vP8aIu+nUrrGLKYT99ru5N4903jXfYqqhWjJNRX5v+FPGFuC5iZ50f + 7j/Hf6tf8KfN79lan6oU7YqfBJtW1KnOSBWYYfnMjqLSOlF2a0E5qcUDkgii7NJcXjVgQFAIKSk1 + 6SrwlkKZ0kWt8tZBL6Wv2s87SBgiZ5SR6gjX6b4h/uGBc3xnBmYr09QLA5fJlyuL1GflXb7tge/k + o1qly18JlZ4Kb6WvIlAdOgX6BH6mLldXC3e7H+ee4J9wrXNvg+3yLu/vxHflP2ufiZ/5Pg0cko9o + KRdbvsnN/hqyOWXQVI+Zl9diK0nd6xMD4FcVtUzxlXnJdeVVBA/nLvPszL6b6UNizIPcoQvzT3m4 + UFDWXf5yvcp/lnimPtk/x3+l/ya/7tdF5BX0OswXkz+bvLrqULW5hItxgP4zVWf8P5kJCWyWuSJp + uq663G7d8PtRgxixRYIAGgLDMjN0nzf9W7+iphV/IFAlKSFJUrz4nss83pDH41X9Pl+VrobwdJp6 + bnEy4DklIKo+v9vrYc0LoA5AXzUg1hbw0dqAeuiw4eFoOe+lHgGp+fGMnh6tc/P0a2g2Lj8+o432 + c/P81/hpmZDxGZchcVNZeFhA5vf4Nu5w8PAMZlTERx5qbo6hUYD/ExNsjp142rnFFf3s70+Yda54 + jf4EqhNGbCwal5uY60m70/zz2f1oUO7H8b93K/TwpQP250TZTN0RG+vGtc08V7N7Nyk9OLa/07gR + G2ud09LV7P5NStr8MdD+k0K0QNbe7Why4Q1R0uzdrPSg22yGU/hd5u1zd8ydHnWe7s/u36KnxTR9 + aX7iRPvLzd7sO9sD9dA1wNbm2xRsmz1sRrpphLIlY9tbOz/0j8QDkw7BKJv7LlQI3IjW53Y92SDW + PvnsQ71O3b6hdetzT3b+E4qL+w74X+Mvbln9+pv8jKPv8VduO/Y2abU+1Gf+D0oOg68y9RlPGyc2 + ctLDOQ0ddzoVlLCPc8kir8m87MGh4GMGuK+6io0G9smW5A5fgPMVx1mCR2ZMvH6S7y7xLvUe772+ + PdIeeY/yuk/zZSL1CSGohT0JoxfX13Utd6tLrQ5MECcqE11ne+/mVuurXTv4ne7fuV7zvmG8J+zT + fu/5i/GxHrBHtcsNAb8v5kFtmFZ4y3ip5pOB94Cu8zJb4ZVosarKWuphhiwLiqppnCxrNLsd7RTU + MT2cz+cx0KZAvdUluA1d9vE+3XgZXtZ4owy0EIAm8J6XPZynzC2E3G5B1zRB4GW0691u0EcHuMAw + z9XuYt13nqxdndFRZdiRkcfIS9lHtU7PeNPC1XzxaOz6Yf4rmQut+ZCpRaASYXxsHPqaLc3dNpBI + iWi2hkmz9cXmep9vhcqGh/kXCxoz/dX+Fqlt9cYK6l1sudmCendxtF5A0PbmTvUGW3wnXM8Vd6rX + Mil7rbeqiSwwx9JnmDaScbPuI+UIX277hWY5rjZKikkfypgRKjgfd33rPX97pHuqa9mWP7X+grv5 + /ff6tn7OV3Kt3w/pMbD2aKu75S1u+MTWZqK5Tq1jhX8gzSX4l5jHDt+anbGbmwdnBz/tik+0F7QJ + tIlsr/2rx664c8fnAlrH5RqSgWNfKkfW7jyyLtBDPsElpOK+gOySg5mAL+3KuNMWecerqxLvJ2Jv + JuIGFczdyURscosvxfmo3xem6itDTb4NupDxZJCG0pU96gz6o7i1QMQTC1S4KtwVnt7u3p5e3nv8 + rspAZXBoZGJgYnBieGZgZnBm+DJ5secy/+Why8PLPDf5VwZWBm8MrdafcD1vPOffFfpC/zT0nafF + +D6UTRUGgjGvN7cUSiToSiVF3yDf9T7BF889hOmUDeTWOunj87kNlC6oC8dDwWBZQA/hhs+N4qPM + pYdcLj1Ik/9dMl0AUkaKr07tTvGpnXzDNh/2SCa0kz8r42oIZAL8lMDuAB/YyQ3c7uOKYXBSp59Y + n2XS7h7u0W5hjDvr5vEFDNxS7cMe4hu2JtNXoijBLmyhz8Ih9dMS3jHj0IG4caB5/teJmPE1qyHl + fd02FFRnmhqNhRWM8FFOeJEHx9p48HPmin7Zz4jBT6yyWXAo+8H2PvV6cZ96L7KJbeF6v7Xc4USy + QwG1c4v+HTp6VXJTnNbIz+hz4j6frrPeZDq6GWOsMLP5+7CFSCx9HVUCtDavCfXr2n9o1F8uuVrn + vvB+VXFR1UdbW+cMKO1xZVNd64VPGpWlydm+ArGy5Z5Lr71yMT/76O82DJw4jkZJJXLmd3CUeLl/ + sFHCHb+yd8bbFNjJv6ryAa7GXN/jrYyGFe60QpZJ+UJmOFY685VatVHP1evDuEa+UR2mjTYmc2fx + Z6mTtDHGHO4C/gJ1lnYFt0i9QruZW6beqH3PHeKTcbWc66xWafXqY+qfOIW4xg4jXMej8NJoYdmS + QD3H99V0XtX1Mo5H/YPn6KOD/HlSFT67fh4OUrLRNKZOVXl1fifn24raiCQ/x58DAAoFFlhEu9iz + xsuBN+Od6l3qPeiV2MIPpfSTdxHoV3PcBuBGwzzIggBsNViI+4xFnYh9UtTHTHI0WqhyoIrNGjJa + yIXZ3/i4oX/Lx2xeoWWLGd4XrU8DWC5FJIptnblylXzRZu+p1Je49cIO6kXqSvPTNfMnshVASG/4 + YLOPOsEqPtuRrNfUSPJU0o43R+uZY0SP1PMhRCLSxmApC3GLjor8TqHHtjlk65lfN5dNZxUFQYi5 + 9uLkElrxjVN613YKV/KPLjy7dbQwreU/5l02i/vydkGVb/9Zy7lXaPdROAcUgNK/PfXYFF//79Sk + CvTv4Y8qulD57vUHvjqyoeVCA9SxuKnh8Rw7AP8qp7WOgtMNOLLhyOUGWPtz//x3ydYuvj6Hjfyf + 4FxxIYQRw5QC+JnUBGdzK2ASvx6uJAgFkBGfhgV47HrcHoDlLjoXjx+P+BDRH9GESFj7RiLOQ4yj + bTz2WToXr3EJXYeVC2GSWgTzpKZsC97vLukVmIF4EOsPix/BE3I9zMXtR/G83SJAHzoGz7lLXg+r + cf/9+PsFuO9BLM/G7bVYn4zn9bDqmnILxKlEyLi/M17nZut5K4T/gN7iwuzf8Fkm4jWHI5bjPcZg + 2YgYgccEsRyIWMG9Ajdwr2Qfxt+xhOvw/itoP2KQVQ7F6yzD3xvwvFLcvg7rCWyHjKUP0QlRyT8N + SDjwPJbV+PwTzOdGvAIX0TPnngnbb7XpeJhtHOEE3vPXiBK+Pvsxlpqjbfm4Lg/DhFpYiuVsRBIx + ln8T5opnAIf9dY/0MQgEpDzqpw8Qp4rTYBRuc9jOcdJWuJe2ESMZFmZbxPthjXAITsHfLpfvwueY + hv3dE3EYqvmvoJtcBtcgfQ3C61+LeBCv+Rmjh2lwFt6/O5a14seMhpYjVuK9vrH7ifoGt6/F93om + 3usYjQg8fxxiCL6XpYg51B68fzX1Ob13rqm1Ho89gMdMJuD+KAM+O9EknUPn47XKLDp8uK2Eh/GY + W7Bf92MpIsLUBhuMzizgby/jdeIIGVGA6I74GPEwYjaiL2IEohLvDXhfgdEr0gzRJqMPpA3pFexD + bBujWfMZHmTv0xwza61r0X06yU/DbAud6Jo0XohmsS2b7GvTmCKasUtG37MZ3f+DnpNoKlfi2BO/ + hCHUBjYGkbbsksYdtpnGw138eLiBlU/DdUSz1D67pH4hWmN9gmPCKvs7nrUHGyNYCgAlFq1fZ5d2 + X+TKi+BRvOZU+XzkKWtgqLgIhgq/gPPFgzBI6AzdpR64D58Hj93IfwlnqnugFt/laNy+J69cTVD2 + cbOkPficT2F/7oMHsE/ni/v4YnEfJ0lPZT+XgHtVeoq/mtWPK/PB7TF/o5Lg/O3f3f/fAf+u9BTy + zKeyX0j7sll8nttpTChfcj0QabvE/ZsRSxFd1CputTqb26mMB0MGOISYJ2agr5SBPuIefD9h5PM4 + FnD/eOlvsFu4Bd/1vuyfuaWwlMdrKGE4j78LeRrei38XriPQ9bG8xEFH7Wgun5bs0qbX/JJ4vkVT + RVjKOP7esnDAwmHEd0hHI5Am4yQbiD8z+YA8GrHcotdZOfp8FR7D8mabPvPodFYefbrz6TK/ZLIF + +bs9TvFeN9rPT/yReBzxSOJzxGfs4/NLx/k38euRjokPvwmTrHFdbGE4tvHv1thHPozve0I2Kzdm + H5e3Zp8QAtkn5Bqs/ydCyj6OfbEkJ1PPzrZa8rSzLUvN/eCy5ahUC3MtfvYo4zffwi+ZHG1i7dPk + DXCNdBTfO/JA1t411hjE/sR2zxanYp/fCyvxOeLCChyPuB8xmfqEvQuAGMkFkonCndjPJItugeuE + v6C+QOfWgp/JiwaYgG1/le1DmUol7ZMmwMPyl1Ajjkdeuwem0bui56D20LtXLwWPGkY+sQ96ik/i + MWHQ8bg1rA8y8DijCzp3NgD1hXIBKEizo/AYut5adk4GAlZ/PMr6gp2PugjRMPUFXlMOw5lMn/gS + HpLGwwQcQ2uVpbAWlVbAcfEEXuMxPG84tQXPSzB5fSecg+PrBuRNNyDPAUb/k7JHhafweZYgX0cI + S7GPnoKYtBT7cDZ79kGiyWNX0PgR1kM50Yh8J/Jh0ifuhJvEKhgsz4ZbcN8tEvJJvO/NuO96HL9V + OHZvxPOLLL4NeO8bcT+d20C6DOkINF6UDATlpUwPANYG0lPw/sLnsFYYDjcgHQ9Q78R+WAbd4Cf9 + yz5tluSwzL4lGHAVln34WvgD3sGFdZKhz4rXwkyxCWqEnjh2/dBN/D2O1e/hPsEHU8TX4D5xJ6yk + bTEIlcJGfP6tqFvS/rdhDO3n/4Dbq2GS2B/PvwEuFqfAQmET0t47oIsz8F3jedKtSCeleP63eF0L + 3EcwSWjCsbUc69+jHMTj2D22ZocRxKHQjZ3nAGurjbw28yPwqYbjO8X2Ur1de7GtuXbabTxB+9hz + 0nXxPDpGvA/6Yz/9FVFmlq1j+VvgKcQa/j04XRgJl3FPZHdhJzfmYahzW+zFXYnoLvaCHYhrsd4V + y98gNpjbqLv1gr8gluG192C5RWbhJg74gdCbStz3IGI14nX7NyfoPifa74SUzO5qt70NZQ2CO5Td + Rcg/Hvu5N96vt3hqdhcBaXE4Qb4GQspiCAkVuL8Qz8vblpI4nrZBqQDZ/zpZm34M+K+nox8zzme0 + 3weWkZ+AvzrKNJWWbID/Sfv+O8D360f0YP37DwibNARB7t3sn7Bs4t4Fv3Ap0iACt7vjdtDuT/s9 + 4f472P6898cPzLZSn+fvz9/Of68n2+a3wBQnbDrI0cPtcBpBbMDjEfnb6qtwGkF+CX976fht8fGT + YBJ0Ee6lNiENVhy/LY+GCgJfim1N0Dk45hC57beRRyDoWHa+B4YQaOwS+K1oryFyv/eCwYS2foXe + 1K/Cvebv9vux30v++8H29RTfggFYVmDZF8txWA63S+eYzR+3+ftsXnKiY/LGRs8fuub/S8Cx8xri + FcTL/7fvxQHSKsJAyH9FPaQB9ch9qJ+cQ3NTW5CXHKtGrEM+dBaWf8J9KL1bOyM8WPfjvguxfADg + 6HdYX4D795nI8mIS1lh6ZRz3bbfOVa3rjTPPP/o7gCOHEBvM84+uR8zC+v9BoDw/+j6W/4Hlajz+ + CzzveixfMH9vmYLbixHP4/aXuD0HcTbWV2EZxrIrIogI4Pl3EUgfOc4O/V8vT2x//NQSdZYLsJ1F + 5PPC8sp8G+Inl/b7PEmZb2vY7/9kpcNnkFea/YA2099R79votH1+zMaxS3yfrU6I47MtqFO6SY8m + XZb0Z6Y/WiWz35gei/cFCNkl6c6kv5LuTPorlmuZz0Bi7RlPdj5rlyU3nLyVOwQPIgxE0ipn4zHf + 8xXZt5D3+JC+v0Pb6FECbiONUXILS3B5G2WXD2XdbuS732H5Jm4XYPmdLdNs3nocjz2JTPvf3v53 + ZeR/Q6bWWJiShx/ab+MUC8MI+bL438XJZPd/W5b/gIx2yun/6bYt521op0ENQclkdxHy9dLj9ICT + bJ9Mz/13t/P1jn97O08vsbfzcdzv+bRn6zMJSOSQN+7+XZBtIW5r0/3tNuSP49x4s7axjwY7gXyg + 0pKhDyP+iTyjAIEyKns7bl+tHoMa9Rmowe0bECgXsw2IafQblr25W8i/nW3B7Z/jtiG+yY4928K0 + k9FzPt2Sfs70Q+wzxgdXUfuhGtEPEUBsQsy13zXZkHjv/TxKXbJzxUnZ78S3EHk64EnLXjAf8Qxu + +3Dbh7w4JPuRb2fgcfLHY6ljqSN/H9vm48u2yJezY4Yz3/IiGIp8/mJxH/m+si8yn14r0NeJKI5y + HcrQIttPh9th8g0pafKXZHda/rmp8rcoByegPNRIduB9m1hMaLZIftxv4ZeCCwZZPuSQ7Usm/xTJ + K7k7GMyP4fQjf4S68WQYhGgQzTjVePK/CB+zWM0K8rsLo+B5K761UV8PD2qvwIPqNGhUr2HxpruE + ++E63He/civcL1ex+Mp4W66STDyB7498mYmcT9N65nydgLVvMpxB/hjnfe3z1EaUpd8yP5TpxzyJ + boMy/ibENDNekT18Yn9n9g3L73mRJeMX52R+vp9+MowVrka7z/bJrsPyXThXXI6w+ji/Lfa9sF9a + fkgXsnUTrE9gvj4z3kM+qKAjDtfI+vlz9r6G0TuTPDiGffT+s8+KZnxuoLgEj+chLn6DMH2PLD5H + vmHEBP7PePyDOEYvxrGCNCjewWJ411vAY7Pr2HlzzLiZPA7RgO2ageetp9iRDVjWhuwBcTzcxMD8 + atmH+VD2WSwX8K+zGKPPigXGxZVwFvNptsUEY2Il81tXimch8P0jLsPtUvbsVsn6KoPn+WAYe0by + zXUHwN9UoZ/lI7WOVXZAo5JBenVBo7QFSoV5qL/sQV6Xwnc3HN+rD64T/g6F4ilwgeCHaQSuMfsW + 9yWWqKkT+C9w/5+x/AVuU+z3T3CuHVcz/dNwlOE11BUQViyXMJ3Ar+c6WXHCiVa9wKzjvnrYzmBf + Yz2scwCPy/4dcZT/Jd57IEzjd+I91mBb8D6CgeMvD3jO+RYqrfsMESfgGGuP0/OB51JZnQ/cT2VZ + Pqz9iXzgfioH5gP3DzxBO37ouB9qxw/tL88H7i//X2jHD123JB+4v+RH2jciH7h/xL/Rjh/q59J8 + 4P7SH2nHqHzg/lH57UD+hHZs68tomz6N5X9a8v5zLM/AEqmv9UXyYyNmWNv/aR13NwLt3+w9bLIH + ZAdaQJ6XJRt4BZZfIdCuzo5tQ+urWKZMH7l9n+wdiC6IJvNedG7rc+a9Gax7tm4xz295Bsvf5W1H + EJ+Y92P3Jt67C8sSxL3W891g3Xej2fbWO9qOb02Zz8jO29iGrIA4E88vwnJcG1q3mcj+FstfIcgv + +orVLqoXWv1Bz7yDrtXGF+CIeC/yjKkAKKtDynqzFK+AMxjPfbudrLqE8cOP4AnG77LI+/pDjexB + PeQBGEh6A/FwaTo7/mZpGsomQP0EdQWmL+wHSXwJ4tLHMEW8GAYJ21EvHoL8Fu/B4jJ4beLbpHMI + N8JIBItVspgQxU6WwAp9K9NfDDwmJH6K7b0HdqPNdoN0NnB4vqx0x+1VKNfXwhLpCrhcnQu75YMU + M4UZKK+K5ClQL/0chtq2rTwXNMmNeoFVqqvhAqUr7l8PafETSGkrUK/bC2Owz/rY987F7hUI4f51 + pn+F0R/iWBXiDNZmbC/qYSLa1iE7b0Bqxj6ZxtozisWcngQRbXSQvkHZPQwqFQ11r2q4QYvBGvkw + PoeMemoVi8vPsPq+B8WflAuhp7QCym3bXT6A/XwW6HZJ8TjbH4C621rxIqYvBlhcy/IH5Er7GhRv + WworKVciX6+x9aicTmH5CHI+B/t5sCT5mXt+q3ToG6ZPYQ/qp2Goojge84nkl1abWBxvD9KSpc8q + u2G4ImC5DmbIy2GcNBL7JQjjlN9CQBkCMdLPFIXpdXNJRkvfoy46Dsrx3ZyOQJsiO8uMi2UnWmOc + fG5/QkzGwXiutY98FfjOsy7cP946F3/PXmraGewYip/dZNVPtzDNPIbObXnfOv4Zh6/mQxPMDkk7 + 9VQrl2r5cWVb7J7op/Gk5U/0odEYppyqE8T488s7sLzI3kY970Mco7fjuWmEbOvR+aVoxvuvNkum + G1L5mFU+QrRGul5+mZ+/8kP5LD+ix5rjzC7b573Y5blWWZ7LyzlJ6cyTaSuzWWvb+1N9d5bPLWGX + J8g/MH1ybaV8nP3kLNk7AcHSY0l/H87i/JSb8yPI5XD9HGmgPZoIlE9wIsgoSQjKnPaw9PwfhHwb + nodQi/KR/ScB23ytiex9Fr608DBB4NCWRoi/yEf2nwwnzq8bJD+A90Wo3Uwor5pg+v+PAPsAFJSk + aoCVMsnCHwVqGQTlGws328hmCXa/2/1o9ws+2yf43Bfl2mzf37ru//Q9/k/fy//Wc/9Y252wcvTs + knL35BO2G98Pwz9NsFya9RC0IGO/Pod4CvGahTsIOFYSlKskTEd6ms7yFXPnHEcHt6BtSrC2rfwb + WUbNTomZ44Byf0zAxBP1jzLdpD+lwuwnlrdj6l4f43N4rBzbGRbvK9XGwForT7aIeAvKXRrnPcT/ + gBntdb7sONOezj6MclLC4/3SImjkX88+Il2OPOFg9nfSNagLIPBe11t41cIaU/fLbrDyIGWWD7we + nnQCbdtCAh1jysnsY5a+TXrsAhOtn5r729pl817hX/gcRyHO8kszzL4eI85Em34mxIUv8XfUFyje + JJwHA0hmCL1Rt6KcmyVWviz5Hj7A0oQH+2WM8IRjfFN+DeXVIFhODr2nl1EG0PEvs/Nt+76S+Zdm + Ix//CxSx3B/8jeX04DUo14n0IgEtCmk00sVYPHZs9vfCaiyHWvgX4mJsbxPM5K+HbsIMtIf3or4T + xv3zEfOwHsPSh5iIuB+xGHqy/UeRTo7g8QhBxO03sJTQtpdw3/cWVpqg35m9vR2moU48Da9nHreP + nWNChmncC+xe04SBeD08jkdLSUCNQghbdRl/X4bn7Tbtd/Ir0PHsN/sYre0Y5Spo1GdAo3AdltWo + RwzI7uI+h/7iJPDjO/UgeuG7fsuyH8huehuBvZV9ELdf4/PzAuw4uVVKz8BM6VToJrWgfvBXpIP9 + 0F86DPdJDVApj0E59jQscGYuUT4xyyXel33L9n3bkM+GsPYSDMF3CJS/YZf8U/ShEHze8UwesVx6 + Dq0teMq8JsufNsca03OVQXAdjuNGxFAr73uGGR9DHRTHnmjmqVaKj0EBXok3bahW7K0sjYdxyBty + vlcqKaeNaMvSBUnHfJr/A9m12JZEdhc/Bgqtc88x7dIs+at/iSCf5f2O+NNdhP+/41t8Xhzqh+JF + J8vNOFmuxnHb/2ZMJT9342S5HCfdzou5nCxehrRKOnIjypXd8vrsPtzegfgF8tdHCSJks8w/aupr + NwouHNuL0AYdBqWWT5T8pIXIvwrFlcynv9y8HgSRNw00ffPZY9Y8B+ZPJd8c6aVCjM2DSFjzGuj6 + wy3/LZs3kfPT1sF44rXEU5nMoNxutNOQ30wj3sK/CrX8MZMHcfsYgHgR80sOxDYOZCWr810snjIQ + NL4Wn+UOE4Iv+yrjSV6TZwmA19tJ/Azlr8mvCoSEyb/4d0wexH+Ax9g4hPiCYjVkTzObmmyzJ5ls + OmLyScYLyQ+JdTYfxbSffDQGaR7MyfQlS7d8Kq98zi5Pphda5zxlnXP88VbsBmVJkMnkV6Az5fbm + 7C6AWpYb/QmzV4bi76SDtOn5tr+dvSd8R2Zsn8u3CyieQ+/WtulNv1nrO45yigkmp6kfP0W9TEe5 + ewa7B/I4Fu9ZmD1ktZPskzjS6c0528+25WxbA6Cf+CA8KlyIulAPykli8v55h337KIHlkLwKj7Fc + Zixx35t43FBTbjAZ8hJiL+L3iH8g3jX9VC1/prlD1C85e+ghyh9ofVb6K/bXy6CpZ0Bc3mXqK8JS + WEB+cQLNKyCwuVM21lNeDcuF6mflEZJdP8gqkefCMMbnF7L4xmQhgPrBGKSTRjgVt3ti/VTxKtTV + K1icqkm8jM2JGS/EsR/a5lfV0D7xajyumuX3jhOvgPHSSzBL+iNcIP0L1mnDYR2W9ws89JMGmPMn + xAXQSHYa6hUreB3ttYUwCuWDF3WfZdQW1h48nn5j43Y+yrQbYbX4W/ztUyznIVSUY9W4fRBWc1/A + amEhvic8Rnie5U2vFr/Csif+Ptcq/4L75iJ/MPC49+EX4kWgyhOR58wDVZyD8EKRjDYV8pnJeI1T + 8Jye7D6fokz8LaxibTgRqE3zrDZZ4L7IHsI23YrldsR7dlvywdrhBLUj/9pOfGq1J+9+BOoLJ6hf + xG+hO97/LsSvEe9gm05DrJBOb99fTlBbc/iufbtZH9qgvswH9a0Nr9XPJwD1uxPsuee0vYccsA/o + nbB3YdGA8Cu8N9XpuemYg2YbiQYYjUwC3n7/SJNnsHZ/wtq7WiyDWaxteB+pEXkBvnvsCzrmzNw1 + TXq6lZ1Hx+Fv7B1S26ifN0Bn1oZXGG0Np/vS79Sf8iHwydvxmPfwHhE85gIoYfemay8328fOnYk8 + DK8ln4W/F6Gs+hj3ESLmb6z91nPl2k7vn9qO15Q8ZttRl1yNY/QMuRKvVYjHX4l6JdHIeMTL0Chv + YO8qIJTAauQHxc75WoiotY/mhg1DdEHUWttUFrNx/FNB4/2n4l+MJzhx/8lA/CAPNfn7xEj2aec2 + 8Q/EKH4mlo+xunKy6xCPIv50MqAce9zmX/n3IF5GQB3Am+NrTqyBCY7+Z31PudDi1/AAQXahTrMP + lkkfwTK+HPl6OV63HLoiChEXIHogkogCC52t38qtbRVR6b4LGr1ukgHZXd4/sJJ0bxxRWbRjsved + TAfO1/VsHTD/ONQTf8u9m52C5edYLvuhXJcf2s7PpcnPiTlZu47TSfPzmrZm90uQ3S/elf1MPJD9 + TJmMOuF7UKN4sQxCvWsHi0V1BfrWCcBsxEIq89v5U/P+f+pzU54g0yneNG0usuNZzOBpS/9YCJPQ + LiV7/2rcLlB+BQE5DDF5FDwo/QZWKE+CJr+Xy2FZrq4EjxKEmOZFOfuWFeNAO196BPWvecxXGmRz + iUn/LobdQjXS5i7kK4tQl5qIcuU+0Jl9SPbgX1GHWUVzRLPkqxlEuhPF6ElvteY20xzmmXJ/WO9q + yr6gDs8GXG6oQTob1M5mfRd47gmWy99o7oMEPxbtsCegs2PfUKvsbJX2/otZeVy+ZfZ7vjvcwvIu + 70FbYTez40kX8aEOHSSIFdn/IlCf/xjEpVBKED7Gd+ion9RezMvRP2kO/kly7k86Rnbg2CPY42Q2 + NBKQhgpN/ZJK5o8ajeX3WG4z46XZIXl1MON2VDJfViligoXb81BtxoeydYietn5Ptr1z7hHNHbJs + /i72/CBxEOqIpyLyy8GOOvUPHi9UIB/sASHucuiO11hMPg7pC6S/NxC7oBFpvZHVn0b94XdYvob0 + vQgeZb8NhsfEenhMmQ6PIU3fhzR7H/LQ/tI6uImddy/cJ2t4znPwC2l99ivpHhxbdK3VsEKegMd9 + hr8XWPdCfikNQV1nLtZnw0wxjdeMwRjpKjhFRptPjmN7e8J2loNyTvYy7t7sWr4Iirj3slvFFAyU + n4Sfo165QnwE9egnsZyLuBCGCt9gifulCdZvWEebcIX8DG5PwO255u+orzSy+hK4Fbd/zr2QfUSc + m31RWIf2Ef7OvwwGu0cJTBGvY+fQ/X4ur7PuOx8GYl+uYNsXZv8lXoLP8098xq1s7D/Lr4ZilYc5 + BGkvNKr74OcMe83SFcbzFkJKbZtDNzJ/HHDnwh22TyQ/d/A438RAPO8O6GvLDcopoDmS0ivZPeLs + 7CP6IwDqrchPxiPvWYalZc/JuF8ejjpOIwRl2YQ4Am3Kb6FBPgefM9/HksfvyTbD553LPQ2TsDwH + y1G2XYfX7iFJOM5no91E6IR0SNhkQTV1W+20bItyBpbXYjkRhqudsSyC4coW5I37jy+ZDwygAHlj + gGLxjpigud0L7uKvYPMbA0g/soxSBnkoKDLqQ71hkP4lXKA8wGJ4ATzGL6+FkHQf9ucS5MmXI2zb + 8F04WzqKNLMOKoWhqDs/zsZRf9M2zh6wbUdxGvQX/ok8zryebF9XDCLfHwQrhFUwhiAK2PeEq9CO + Q/AP4LVmIZ2/ANcpm5Bm55O/BZbJgHLhPOSNb7G20HzSYcKpsJutNbETbUHCQ8wmHMbWpZiB4/I1 + vI91jFSei+U+KtwKIbkE7sd3tgJp4Qj5iKw8uxXyRfjcl0Oh1I/5MIPSJJQ1tUjHO7CchqW1jW0o + xOPJN0B5m2FrjiuVpMeGrdjlKcgnQmx+Lc1nuIzlIojM7u0JDdLfUfen93QvrFRlOJ/FLSqhj3AX + 6uAFqIeQz+kjOBePmUhykfIKtCsgKq7JfqPUoUz8I/KIhdnvrZwDtkYH/y3WX0ZedjB7WMbnE2+1 + 1uc4H489H9/hR3AHrRmBOIsB3zlBnI60+Bempy8TZVgmPIl9IEGh8Dq+w3soVmD5rRZC3IoZr2C2 + YC2+08+yh8U9iH3kB8tGxH0IaP2MfCqkz5MfC/lrIXcUr3cmXvdFuEFOww14/4uQtuma48nOYX1B + +as/0ZcqhHG8hdv0wuP0pZPJxDzfI8qaTTh2kf1kTzPzgFopx4Dyl2sRhomW6wGOLUfQHKTpeExP + LHeYMq/1QuED+Ju6iFbuyjGxOScGf1YbxNWIQ8iB8LryaQ68gSO0GHEJ4iCAjse6kGN5YwDGKoDA + J0h6YwCiewBieG5yP0Ah1otqLLwLkJ6Br8HbhpL3AMr7A1T8AaAzPkuXNQBV9wN0w/OqUc72wHrP + QyZqtgP0PgPJ+HKAvqcA9MM+Og356ACsD8ZrNWJ9yF6A4Sj/Rz5sYsxpP46zcCg3LQaY2APgHDz+ + XJT/U14DOH8RwLSlADM2Aly0BNVfbM/cSQDz8TkWTgW4FNvys68ALtcBrhgFcA3qytfivuueR9UT + dYuVKwFuw669vRzgl2d0oAMd6EAHOtCBDnSgAx3oQAc60IEOdKADHehABzrQgQ50oAMd6EAHOtCB + DnSgAx3oQAc60IEOdKADHehABzrQgQ50oAMd6EAHOtCBDnSgAx3oQAc60IEOdKADHejA/1VwAP67 + +W3QH14DBXgwIAPLAaSo9BVIwG86a9kAl9CV/uOLoQCKhCqhCx5cJHTZLBcU7RQqt5THivY+L3SG + /Qhe6Ly5qqDoWaFCKNjcryizUyjZEgjX+AZ0E9J4q2r2N41/5yE2IHYjRJgiFOJ+A/9eg1iK2IDY + jdiLkAHwL/2aRsxDPITYT78IBUJqc7rIGFAhxPHcOD6AT4jCN4gsQsB2RvGuURiNmIK4DfEQQmbH + 0Z55iGsQuxEH2S8ZIbr59tr/r7HrjWnjPOPv+56LDyjYeKlh5eI7Y3xduCROXVInkOKzY4+21gQJ + NLOZF0gIUppWaiRDkCo1vUiLtKhtqDYp2zJpRP0wVa2qHueKGagEE1u3sm6ZtiyT0n+024f1Q8fS + D+vyyfu97xmyaJm0O37P73mf5/f+uefeO/uTwdpbnRcElU89HRfNY26z+G3RLH+z4PI3DrmcecyV + 9biyB7vd8O60yw/sdDkQjVucG5riK6mgFMRFBrHw07CU/YL4KCUquSLdR2yASXW1iCkFyp16fHZZ + 8hAqMYmSE0StrkjUaWqJpxpYlW2QAFHZ39nnboZ9Xm5uic+mHmefkjeBZUBin+L8hH1CnmfrvOaw + SWAWWAauAhtAHVvH+THOj9hHxMc+JDEgCYwCs8AysAF42YewfvYB30rCcj8JMPYBrJ+9j8t6H9bH + bsC7wW5gaX90EvvjC8IxYjVHjdac1vaaEwjGK+wPzq0d2FE67jR21JLUQfrIQ1KHE30Q26/NOfCk + WmF/KWuGeiW1h10jNsCwkmuY+RrRgEFgDDgN1MG7Du86sYCXgSuADWCXwfoBja0B7wHXyR7ABAYB + mf3ewTQVdtXR02oqyH7HfkVaUfHfsl8Lfo+9I/g37JeC3wWHwGvsHSekklQj8gR9/PxX8MAx5O9h + Py93BtRqqoUto3YqbAxIAgPAKDAD1LFl1uGcUAMYZImsyQRKh3wm+KfkFZmYp1RTP4gNqHGj9zwC + D2ZWm9WZqV/6EZrc6Be/B48b/TsvwuNGf/YcPG70p8/A40Y/cQoeN/rIKDxu9IFheDAV9pOfdT6g + JgaeolrKx6ZRpWlUaRpVmiYeNs1PcsvD1/Zjp6sLFbtsGju6VGuRWm9T6zC1XqHWBLXOUusctQ5Q + 6yi1DGop1ApRy6TWEt2HUljUfOuO5n6zjVpr1HqDWiVq6dSKUquTWhpNmBUWdh57SFBWUDnFHzrw + I314+/hYGBUNY8+H8U5Yhr0KVEXLhEjrcMVfDXHuKHcl3fbunvgzeHxW0XEVt2GVfAx4cINWsY1W + McgqBvDBJoFRYAXYAKpAHdQdWPiMsD7YGJAERoHngQ2gTixnA2DkmdoS3xQL44uO1RY+AHjYKs4O + nGEWNrf7Fb/hf1SaUagvRAdC1RBLkGCQEBJokVsqtGn+y6Z/fdlE6lP17CKb4a9u9nKNZ5xbeHXT + Hzr6kpq6j/6AhDzYeXQ/0WkUvI+URHsvUWTO3URhr4PjjnIE3XyOvlNdpM2817x6S/mr+plSYXD/ + piypf9YqHuqof0Lk9Xn1mnJBfTdWkRF5W69Q0KImpAvKPvWNNSE9h8RlRz3LaV59TulXn1JEYsJN + HC2hZfrUw/qI+ijGyyjHVbOEMefVpHJUPeCq9vI+8+oeLMFw3S4sdociJo2EEHlL3fvEE4kKPWnu + 9F7y5r0D3oe9ce9Ob9irerd7273b5IDsl5vle+UGWZbrZI/MZCJvq1TXTYPgBm6r83Piv/JPiUf4 + fsat+JcleK6pzMjjxP6KlGO5oTTN2SvjJHdcs/85FKnQhkMj9j2RNLUDOZIbTtv7jFzFWz1sJ4yc + 7R38Vn6O0osFRG323Qolw/kKrfLQ+XY7cDC/QChtOf9SO+evnX+pUCBtwTPJtmSgr2X/1zN3MWM1 + a9w+2u7wt6ftS7mhvLP3tde2pwt2XPjVKvyc/f0hrZhfoF/Qf2QzC/Qmp0J+QeqjX2QP87jUlykU + chV6ROiIRm9Ch61zU+hkfEpzHdHkkKu77Oqi6A9dJyfo6utJVOii9fVC56FcN1fqzGbmOjuFplUj + JaEptWr/qVmLQhONCk3QImtCsxa0uMbuExJFgSSkCAm9nyhCotD7heTIbUmsJrmwJbkgZpLobY3i + aprWNzVN69AY/+8xkTYMWu4tjBezE5HsWCQ7AYzZL5w52WZbxzVtbrzAE5ot6WPHx09yPjZhFyIT + GXs8ktHmeot3SRd5ujeSmSPF7HB+rmhOZJxeszcbOZYplPsHuxN3zHVha67uwbsMNsgH6+Zz9Sfu + kk7wdD+fK8HnSvC5+s1+MRcRW30wPyeTdOFg0eUya2zAth1rDxfSQf/pPrGHe8NtZ9sX8dXlVdJo + FOx7I2m7CeCpXaldKZ7Co8VTzQj7aqm2s73h9kX6ai3lR7glkibG5FRpirRln8y4fyUcCE1O8YK7 + 1ij9rwO5rG0ey5QmCcnZXUM5O3loJD/n9SI6xi/J7tmMNTZmK9UVN7gbwR4elKQtIY8d4LH6+prw + v+//VI0P8qfAYktlaoboJCkVJDuUG2Z4IwyP4FqLI/lFfLHinxWlAi6wRA1a2hyjtmzDIG6b8Gve + xORUzavVYrLGbk90KW2WZOvgxTK2KjYphhXlNIr5VLP0sBQjKXx33gPeBd4FjoPjUswM6KrEEmq9 + nFAbGzKqty6jbo5aMMi/AQxnrdoKZW5kc3RyZWFtCmVuZG9iago5NSAwIG9iago8PAovTGVuZ3Ro + MSA2ODU3MgovRmlsdGVyL0ZsYXRlRGVjb2RlCi9MZW5ndGggMjgzNTkKPj4Kc3RyZWFtCnic7Lt3 + fBTV1z9+753edmZLtqVsSzZlAwnJJiEQyQAhdBJ6AkaCdEQFLGChqNSAAipNUbDRLIQesGHvgqII + goCKohRFRUQhu78zs4GPPs/r87x+r+/fzmbm1pm599xz3qfMDcIIIRHNRBTyj7hx+MQOm57ZADXP + IZT5wojbb/XH33i+K0JZ1yLE1Y+eOObG3ZnWtQjlvYQQ22HMhDtGJw/dGkao6DJCxS+MHTV85Oml + N0D7BLgfFY+FCtt07zAon4By+tgbb52KXrt9PEI38ghVDplw84jh1PZtBxDaOhLK9TcOnzrRs5gd + itCfb0J//8TJoyZSVcUvQBnut/4OdVTLmWKOG9mvhxLkHGMRba9ECFdAgUMVaDqOEz+pJc9TIaqK + mkLNoBqohdQT1F7qAq3QVUweM4gZxsxlGphFzDvMKeY8m8LGuRn8Nv5lPp46PvWG1DdS30+Np81I + W532iy/Jl+rr4uvtG+yr9Q311fmm+bb53vTt9x32/ew774v5VX/QH/bn+6P+dv4O/gr/df6J/jv8 + M/wP+1/1nwswAXvAFQgGwoHWgT6BAYHrArMCSwPrgyTIBtWgLZgU9AZ9wexgJNgtODw4KkRCWiiQ + gTJIhpyhZTgy3BkpGekZuRnRjLKMCRkzM2ZlzMtYmPFQxhMZz2Vsydid8VLGmxkfZuzNOJTxfbgs + rIc7hevDI8KjwzeEb86d0dq1LrBu7roX1u1cF3921G/4EnvJdan4UtmlDpc6Xqq49Nql+OURl883 + lzf/2ny+uTkWit0amxG7HL8cjxsrgNYQRAJkCHmBSqeqqTupWUDFB6inqH3UH7SFrmbaMLXMcGY+ + cz+zhNnHnGMRm8ZV82v4HfxnqQioOCH1zdRYGkqbmbYm7Vef2+f3dfNVt1BxmG+mb4fvbd8B31e+ + X30X/MhvAyrm+Av8pf4yk4rj/bcCFRf717RQ0dlCxd6B/oGhQMXFV6loBSp6gmktVKwPjjSp6P8v + VKy+SsXFGWsyNl6l4vtAxYNAxXZXqTgqPB6oWA9UdK0Lrpu3rnHdH8/mAxXRJful1EttgYr6pc6X + Ki/tv3zd5V+by0wq/hXzxybGbo/NNKgY/xYh+mc4P0WIuQaZR2yccaX3QS4HhO9zcb/4qfiJuBeh + y/suf4D+dvxUjNDP9M+9ETo9A6HvaUjtp62n1dPKafm0dFo8LZzmTrOnmdPUaXIanTLWDB2fbV5n + wTnlzHgzv/NMKUJnao43HJ+G0LHxx+44vvv0R9/mHn/g9Ipj648tO7rs6JNHFyB0dK3R+5jr6KSj + ILNH84/qRwuPph+pPNLlSNmR0iPFRwqP5B/JPhI8knzEcQQf/unw6cM/HP7u8DfGXYffPvzq4VcO + 74TcW4efObzpcJfDnQ53PJx+OHg4cDjtxEp43osIjbsVzgnjWo1qTjmDUFIvENZV3KPcI9zKxHxt + 9yGkfGnNRkg+ZRWBYogaYcg37gRiHwOaTYC6AcyTDOALs4M5AihUAOe1/6EYr5nXqXyjOFncJ16U + WISkIUadNKjlfBD9n4e0WzoI1wsygVHQRo1My+ZTZWeih9znv90rtzVOuV1LqRj9/z5kS+IdZl7+ + LyP7K/FMudvVngvhXHa1tEfZYbEgZDHHaXGbV29LI4WeQrPQbOo6tAx9j+agB9AC9BjagJ5GGmoA + Et+HHkLn0C/ofrQczcMYHUE/o8fRRvQb+hWdR0+CRngXvY2eR9ejEWgxGoneR6PQO+g99DH6AH2I + PkIn0Wj0CdqL9qEX0Bj0E1qCPkOfov1oLPoRnUbz0Xg0Dt2AbkQT0E1oDboZTUIT0WR0C7oN3Ypu + R1PQD2gquhPdge5C09DdaCd6As1A00Ev3YNOoTNoF16Gl2OCKUxjBl1Cl/EKvBI/gh9FzSiGWcxh + HsXxKvwYfhyvxmvwE1jAIpawjJ/ET6EL6A/8NH4Gr8Xr8Hq8AW/Ez+Ln8PP4BbwJN+LNeAveii6i + z3EDXoC34e14B96Jm7CCLXgX3o1VrGErtqHj6Gtsxw78In4JJ2EnXohfxq/gV/Ee/Bp+HbuwG21C + jdiDvfgN/CZOxik4Fafht/Db6E/0F/oGfYt92I8DOIjfwe/i9/D7+AP8If4If4xDOB1n4DDei/fh + T/CneD/+DO3GmTgLZ+McdAJ9hz9nG9gF7EL2fvYBdhG7mF3CPsg+xD7MLmWXscvZFUw6u5J9BK1l + H2VXsY+xj7Or2TXsE+yT7FPs0+wz7Fp2HT2evoFdz25gN7LPss+xz7MvsJvYRnYzu4Xdym6jJ9A3 + stvZHexOtondxe5mX2RfYl9mX2FfZfewr7Gvs2+wb7JvsW+z77Dvsu+x77MfsB+yH7Efs3vZffRl + upmO0XEGMZghDMXQDMOwDMfwjMCIjMR+wn7K7mc/Zw+wX7AH2UPsl+xh9gj7FXuUPcYeZ79mv2G/ + ZU+w37HfsyfZH9gf2VPsafYMe5b9CR/AX+CD+BD+Eh+WbJzGWTkbZ+ccXBLn5Fycm/NwyVwKl8ql + cT7OzwW4oGSXHFKSpErHpOPS19I30rfSCek76XvppPSD/Lt8Qf5Dvij/Kf8lX5Ivy81yTI4rSMEK + 4UJcOpfBhblMLovL5nK4CJMhOSUXN5O7h7uXu4+bxc3m5nBzuXncfK6BW8At5O7nHuAWcYu5JdyD + 3EPcw9xSdAAd45ahg9xybgW3EjDtUcC2x7jHudXcGu4J7knuKe5pdAh9iQ6jo+gL9BX3DLeWW8et + 5zZwG7lnuee457kXuE1cI7eZ28Jt5bZx2yW35JG8UrKUIqVKaZJP8ksBKSiFpHQpQwpLmVIW/SD9 + EN+JvpPvzFfwXfhKvit9K9+N78734HvyvfjefB++iq/m+/L9+P78AH4gP4gfzNfwtfwQfih/LV/H + X8cP4+vppVK2lCNFpFypldRaypPypR+lU9Jp6Yx0VmojFUiF/P38A/wifjG/hH+Qf4h/mF/KL+OX + 8yv4lfwj/KP8KlVXO6qd1M78Y/zjaoXahV+tUAqtMChNuxv/jM/hX/AR/Cv+DZ/HF/Af+CL+E/+F + I/gSvoybcQzngrWGCCaEUIQmDGEJR3giEBG3IhKRiUIsRCUasRIbsRMHbk2SiBPn4XziIm7iIV6S + TFJIKkkjPrD6FoLFEsRtcAEJ4UKSTjJImGSSLJJNckhErZSiUpF0WDoifSX9JP0snZN+4d8huaQV + aU3ySD5pQwpIIYmSIlJMSvh3+ffIneQucjeZRqaTGWQmuYfcS+4js8hs/n0yh8zlP+A/5D/iP+b3 + 8vv4T/hP+f38Z/zn/AH+C/4gf4j/kj/MH+G/4o/yx/jj/Nf8N/y3/An+O/57/iT/A3+KP82f4c/y + P/E/8+f4X/hflU78b/x5/nf+Av8Hf5H/k/+LzCPzGY2x8pf4y4yNsfPNfIxxMEmMk3HxcQEJWCCM + m/EIlEALjMAKnMALgiAKkiAzXiaZSWFSmTTGJyiCRVAFjfEzASbIhASrYBPsgkNIEpyCS3ALHsEr + JAspQqqQJvgEvxAQgkJIYYUMISxkCllCtpAjRIRcJp3JEFoJrYU8IV9oIxQIhUJUKBKKhRKhrVAq + tGPCTKbQXigTrhE6COWCLnQUOgmdhQqhi1Ap/Sr9JnQVuimcwiuCIiqSIgvdhR5CT6GX0FvoI1QJ + 1UJfoZ/QXxggDBQGCYOFGkVRLIqqaGpPtZfaW+2jVqnVSmelQumiVKp91X5qf3WAOlAdpA5Wa9Ra + dYg2TZuuzdBmavdo92r3abOEWmGIMFS4VqgTrhOGCfXCcOF6YYQwUhgljBbGCGOFcdJ5YbxwgzBB + uFG4SbhZmChMEiYLtwi3CrcJt5P7yQNkEVlMlpAHyUPkYbKULJN+J8vJCrKSPEIeJavIY+RxslqY + Il2Q/pAuSk9IT0pPSU+r3bTRljcsb1resrxteUf6k5yR1krPSOuk9dIGaaP0rPQcU6gG1ZCarmao + YXJWGyX9RX5SM8nP1D3UfdRsai41n7qfWkQ9RC2lVlKPgefyDLWBepZ6ntpEbaa2U7uol6nXqLeo + 96iP1IiapxaqJWp7co76hPqcOkR9RX1NfUf9SJ2lfqZ+Ib+QX8lv5Dz5nVwgf5CLTFumlGknPS+9 + IG2SLkmXpWYpJsVlpJaTP8lf5BK5TJpJjMQpRGGKUBRFa4himCwml2nPlDEdGB3u78RUMJVMN6YH + 04fpB77UEMrHXMdcz4xmxjM3MZOZ26lM5k5mOjOTuZeZxcxh5oGntZB5gFnMPMg8zCxjVjCPMKuo + CPM4s4Z5mlnPPMc0MtvAotvNvMi8yrwBPtkHzF7mE6oVs5/5gjnMHGO+pdowJ5nTzM/Mb8wfzCUm + zlIsx0qsylpZO+uiTrMeNpX1sX42wAbZdDbMZrE5bC7bms2nitgCNsq2ZduxHVid7cRWUDzbha1k + u7Ld2O5sD7Yn24vtzfZhq9hqti/bj+3PDmAHsoPYwWwNW8sO0Wh2qLRZ2nqFPpRISZScoA97LVvP + jmTHsuOk7TKRWVkES84mO2WvnCYH5bCcJefIuXK+HAW7sEzW5Qq5m9xLrpYHyDXytXK9PFIeK4+X + J1iOWb61nLSctpy1/GL5zfK75U9Ls4pVSmVUThVURbWqSepabay6UX1B3aLuUHerr6ivq2+r76sf + qh9rE7QbtZu1W7Qp2h3a/doS6yjrOOuN1knWW6xTrHdZZ1jnWOda51nnWxusC6wLrfdbH7Ausi62 + LrE+aH3I+rC2VN2nfqJ+qu5XP1M/Vw+oX6gH1UPql+ph9Yj6lXpUPaYeV79Wv1G/VU+o36nfqyfV + H9Qf1VPaXdJRxa148Ff4KD6Gj+Ov8TdCXEQiFolIibTIiKzIibwoiKIoibKoiBZRFTXRKtpEu+hQ + h6rXKl3VOvwtPkFfoP+gL9J/0n/Rl9Tr1GFqvTpcvV4dISaJTtElukWP6BWTxRQxVUwTfaJfDIhB + MSSmixliWMwUs8RsMUf6WNor7ZM+kT6V9kufSZ9LB6QvpIPSIfID+ZGcIqelt9BmtIU0sG/hKNqO + dqA38HdoK9qG3pTeRvei19Bcqg9VRfUDT7ev9AV6C9+PH5DewUVqV/w9NZAaRA2maqj+1ADLCMsr + llctwy17LK9ZrhdjYlxC6Hd8UsISwSUSJdFkDz0dvSSB8SNxkiZZ5Y/lvfI++RO1u9pDGabUqw9p + s7U52khtoXUEWSB9iVais+h19Ax6EJejRbgjvh0vwQ/ih/AU1ITvlgQlVUlTfIpfCShBJaSkKxlK + WMlUspRspbs6Uh2ljlZ6KD2VXkqOElFylVbqGHWsOk4dr96gTlBvVG9SWit5Sr7SRumr9FP6KwOU + gUqBUqgMUnorfZQqpVq7rDVjrMW0uBVZsZVYKSttZayslbPyVsEqWmEKVsVqsapWzWq12qx2q8Oa + ZHVaXVa31WP1WpOtI7W56FW0R5unzdcatAXsrext7BTytrQL/KkXpZekl6VXpFelPdJr5B3yLnmP + vE8+IB+Sj8jHZC/ZRz4hn5L95Cg5Ro6Tr8k35FtygnxHvicnAXGuAYTpD17fQMpH+akAFQScGcGM + ZEYB9lQx1UxfQJ5hTD0zHNCoJ9OL6Q348SbzFvM2YMiHzEfMx4BHtzC3MrcBMt3MTGQmUZlUFpVN + 5QBC3cXczUwDdJoPGGVEgxYAZs2gIlQuINUSqhXVmsqj8qk2VAFVSEUBec4zvzMXAIXOMGeZnwB7 + NEAfm/FOwJ40djzgzw3sBOo0dQrOM4A1HQFtOqvzmVZqA9NaXcDkqQuZfPV+pkB9QF3EtFEXq0vU + BwHdjjNfM98AYmUDbmUCbkWYSjafbQM4lgEY1gqQqz1bxl7DZDPZ6sPqUnWZulxdoa5UH1EfVVep + j6mPq6vVNeoT6pPqU+rT6jNUEVVM/Uadp7pS3ajuVA+qpzJYnareQd1NTVPTVL/0kRpQZ6gz1XvU + e9X71FnqbHWOOledB542+Mu4xWUEgwwh8j+cUGikaIbleEGUZMWialab3ZHkdLk93uSU1DSfPxAM + pWeEM7OycyK5rVrn5bcpKIwWFZe0LW3XvuyaDuV6x06dK7pUdu3WvUfPXr37VFX37dd/wMBBg2tq + hwy9tu66YfXD0fUjRo4aPWbsuPE3TLjxppsnTpp8y6233T5l6h133nX3tOkzZt5z732zZs+ZO29+ + w4KF9z+waPGSBx96eOmy5StWPoJWPfb46jVPPPnU08+sXbd+w8Znqeeef2FT4+YtW7dt37Gzadfu + F196+ZVX97yG3njzrbffefe99z/48KOP9+5Dn3y6/7PPD3yBDn15+MhXR4/9G0v8N5b4byzRuOff + WOK/sUSj9G8s8d9Y4r+xxH9jif/GEv+NJf4bS/w3lvhvLPHfWOK/scR/Y4n/xhL/jSX+91gisxul + mOc6lEKHUQpC8RNXzti4+AmjzUjJKfDKUxNny7EFfMQvwGfxo634L+RCF8EXaoO6Ixr9Ad7nJvDU + liIHGoCWgS+VjpxoIOoO3pwHR9BC/Gj89viP6Br0IHoyvhPfG98I7YvA37wIIzhKY1SC+kD/geBz + /kh9h2rjjyAezUUSao/6YScaDrb3AWTsNXwIPYxewXfHL8JbHSDTD6Iy1BF1jL8Wv4xy0EJ6MXNQ + 2A6+6YuYjY+Ij0NpKIgaSCR+IH4MhVEt+MjPwZgieA/dDQXAX52NVmAP9TbkloKnHMMyqaM6M6/C + m7qjQeDJTkEN4CO/j224mjnInIvfFT+JWGRHWTCmcehHXIR7k2doOd4h/iUainahd2G+xm8PPZRe + xwyNlccfi7+OktBO8FZfwq8xBcwDzffEn4i/gGQYTxugSB94z/Xgnb8GvvYv6FcyIz4DdUP94c1v + gX/pB68xCx8AG3g6mU7tR61htnUw2tvQatQIK7IbvYheBtocBu/1O/Bdk3EPfD1gy69gVY8ke6lH + qW3UZzSmNwC9QygDaHQroNAO06Pfixl4fj6uxuPxzeB9P4aPk0ZyhvxB8/R99CW6mQnHjscuxfvE + f0du5EW9wH+fAbR9ysTUj9Hn6Ff0G7oA3nNbPBY88kbQEGfAqg+SKjKRLCPPkOcBb5dQr9FFdCf6 + Bvoj+kuQwgXccC52eW3sodjzsU/iO+OfAO9Y4PlhVAkUvQe44hnAmf3w9EPoK/SNwT/w/PZ4CL4O + 3nILnocfBs/+LfCjT8EskfkLkvakAt56M5kMdLrXtOSeAdwxkOdL8hU5TX6nGCoIMjMJLK1Gqona + R31Pa3SYbk23oavoIeDdFsCvK+DQeuZZ5nXmHEjjSHYi+wN4h7P4D5tzmo/GUGxsrDG2FXiXB066 + EyjxOHoS+H4brMH7QNGPYcTH0XlYBS8OgHcfwaW4EvfEvfFgfC0ehe/FcwHzV+BH8ZP4BZgBzAH8 + oCCJkI6kPxlORoHXMRcs0m3w2w0IeoAcJGdh5C4qBIjVBuR8CDWUugnmcCs1nZoFlF1CbaT2Uvup + k9QP1FlYNRedRt9G30mvpNfR2+hPALduhN+TYHHtYT5hLjOXWcJ62RQ2D5BsPfsNx3LFXDV4vJ9x + v/ETcQrOgZH7/x6RIh6QwTSykTjoGfgsVKRiGqkw8wisQ3+Qit9QORWDdbEY7TC2JOKh7cadrE43 + wv234hdREX4LzWAJhRGij6Mt+Ag5Tr9BrkGf43rsoddRNzHvkwB6FtBoMXmJvIg7oW2kjAwiqyiE + v8Pr0XfA71PRw/gGfAt6Fp/F7fA0XIJnoM+Ik+qPZ6Gy+JOExgLujs8hGAG6hx6Jrvu/o3G4FB1B + P8YepxX6bsCnJrQMVvQ5dAxvQH9hJn4G0I0CNBoOKLMQ+H02MlCvDuRsBsijBxBkArsXbTO+y3Al + bAf6TnQO/Yl+ZHYDR3UCJD0ZG0c/Tn8bL4m3AgkDKUPrQe7Goq4gMd8Bl7wMZaN0LUi6CFhSAFJd + jYagkWgaoN6SeGN8Vfy++B3xm9EHcO9f4D//hdeARDTBHWXoXfgtQofwApDDruj/6YiNRHvQKezG + GbgA5OEsczvow41gob/CfMS2AWrPQo8CR38D3CzCDEagT9Ap9AfmYW08KBdFYbxtYew1aAKppV5G + nbEXTQSZzQIc79Qyk1vgKfcC9VaBPL8MsnEOcOJa9Ao6iAl2wYxGwPt5eE5PoPMw6L0WVvA+vBVq + RgJq56DTMG8Lbktuhffp8KRlgFp7YExH0PdA7bg5rlzAhQo8CJ71BxqMRsIbilE13gwrsAOVArJW + UB8CvdOxhjrhIH4a7qsHCbWgVFTKfIsJyo31ibcl46iXQcfEoX4NaK9kdA2eBKNQYR7NKAlXoaJY + PxjDfkzRjfhTcxQryaj4XGpKbAL6AG2ANdHp27kKejI9m76kdxo4QC/vcE1Z+3albUuKooUFbfLz + WrfKjeRkZ2WGM9JDwYDfl5aakuz1uF3OJIfdZtVUiyJLosBzLENTBKPcLqHKen9juL6RDoe6dWtl + lEPDoWL43yrqG/1QVfnPPo3+erOb/589deg5+n/01BM99as9seYvQ2Wtcv1dQv7GjypC/iY8pG8N + 5O+vCNX6G8+a+d5mfrGZVyAfCMAN/i7usRX+Rlzv79JYefvYhi71FfC4zZLYOdR5lNgqF20WJchK + kGt0hSZuxq4O2MwQV5d2mwniFRhUozdU0aXRE6owRtBIZXQZPrKxum9Nl4rkQKC2VW4j7jwidH0j + CnVqVCNmF9TZfE0j27mRM1/jH2fMBi3wb87d07CwSUPX10fkkaGRw6+taaSG1xrvsEbgvRWNrjtP + uP9ThIfbOtfM/XtrMtXQxT3ObxQbGub6G/f0rfl7a8C41tbCM+BeklFZ31AJr14IROzZ3w9vI7Nr + axrxbHil35iJMavE/EaFuhg19eP9jUKoU2hsw/h6WBpvQyPqd0dgi9er74ofR94u/oYBNaFAY3ly + qHZ4RcpmB2rod8dWj+73/LOlVe5mzZog7GaL2pKRlb9nRl1tM3NmdyPXs99VymJjRKHuwBCN/hF+ + GElNCObU1riMaosaRrSFbnDUYrircSSsyLhGoXN9g9bOqDfub2QytJC/4XcEHBA6e+afNcNbatgM + 7XdkZA0+ucpq0H4l3xiJNObkGCzCdYY1hTF2MMtFrXJvbyLFoYmaHxIgH6oG2g6vbZcH5A8EjAVe + 0KSj66HQOLNvTaLsR9cnb0F6XqS2kdQbLXuutCQNNFpmXmm5ent9CDh5m/mZPamRD1/9UzWnvcvY + do3Y+X80j0q09+wf6tl3SI2/S0N9C217DvhHKdHe9mpbS67R3rmGSiYtOZJMma3AlNde7WwUauRG + OgP+WJOpRzZSwJRmBfZXNmr13RLXWjEQ+K/3NHH8325qip8z7jKT/9zWMsrGdpF/ltv/o/yP0ckN + FIyXDpOeA4Y0NIj/aKsEAGpoqAz5KxvqG4Y3xWdeH/JroYZdZB1Z1zCxS/2VBW2K716Q3Fi5sBYm + MRa3A2YlqNPmEJ7Xd7OO5/UfUrNLQ8g/b0DNFoJJ5/pOtZvToa1mF9grullLjFqj0ij4jQLqiYHP + txDe7J+8S0doptlKmxVmeUQTRmYdf6UOoxFNJFGnJV4UNl+kg6U5oolOtOhXetNQxyfqZiZ6Z7X0 + 5qFFM1p2I8B0ZDYmDgM0Og+o+Ts7mDJW28owuQweY+AHFgiHOm0jOMZyTaRctyOGjlFI5OgYRh6e + ZWKEegmHkQCGtxu5I9qFsuayPtr5st7NZagc8tpluLTJD1gD1gy4YBjrZT+157JufGDz03uMNwyJ + f8msZfaDl9QatcVEnypZxTyv1ZNX4ivJfyx9rWWD5xn/hvS1rWWBZkMe2hXKoHJSw4G2+Q+HzlLf + e6WUFG9qquLxuEMhf15eftu2ilKQF/JQuW1TvBQd9qdiClwPim2bF/Knpng9ilCUPdyOi7qyEpaQ + t134Uc2Z5yTOJjxLV8TcR1XNpy3W1mi01oTTdLXgUVX0ifkiJXpKe9/tjsD86no3N9ed1eDso32P + yst7ny0/a3WV2kpLsdUGqavULM3V+DIOTiPdzBr03noihENN8eNbBUvUC+lOSCkNLigSidTVtslH + dbgugwtnsmzInxkuihaXhI1rYQHoaZazF5e4WJZzOnFJcVE0HAqySQ4XxcLVWVhQXMKs3Tjtltp3 + G2I/Ndywfl3PXp+/9cqB8U98mO6Nhdv685Y2h3sN6Nulcy89e3j9lJGd7uy29dA1N1T3emTKo/d/ + 3b/2iW6zd72+sHbNqNhv+ph2c6fl5I6j5HYd9eJenXOjPWIz2jR0G3pLtAwM13hz/CRpDytGobZ6 + KsK4O6EcxncVDDUiPk28DHUaeeiHJpjE6g1EutD7LPBDedlcpnVkmvZmm3wOF2IK37A/tsTDnPnL + YewnGhQ/SVuYPWAD+dFDes+p4jxxHd7IbRTWWXYK7wr8IGuts9Y7yDfGOtY51jvGx5eSUrZYKFa6 + k+5sF6FSWSd8QN5j3xTeVA6Rw+xnwmeKVXP73cTdFN+jZ9icUfdaXvGpeSpRdSipaxGTerAKPFNv + 0HFQ8gT2v/6f8U4yBnw2Msk42+TjOlRXhwtcTqvGsaEgsmolxa4gy7FWzWlSvtiqhcOk4POpixZP + +fxA7C+4FlY7U6NVhYmE2bNiW2xYrH7HMnAR1uLHdyz7seOAG2NwvKZ3HDAB7FHyWkcQ+ydBIMJA + AwEN0oUbyF1kgfG5qglnbx3GYKaJXLeTFxiMZAG9iGuAZpjU6QqDaB/tpxtpmvaIu/E6sNMTXFrW + 25BHk/Dn686WGtwVCFhZrqg4vaSQCsdOPvLJTZjkn6BDi7vE09+bY+ziKgQPSYYRpOJyfdh29w7v + ruT36Xfc+9z7PPu8fOfkzimdUwd5HqWXujfSa1N41utHWWyJtxvd2d3Z09nLp7vTPeleyhmmB9Hz + 3KuSV6WsSt2YsjGVt6FULdWf2ib19tRZqYtTD6Tyqca6OB1J0VSiyWqqButO/CgfTG0KQdNWWCPU + RJ7YSrCsNuFBesgn58lENtZOXmtnhIMgB1UwZK9PPahNIZ60Kwt43lzBsrLeGixic2TSCYCiSN2k + MqsN5LMwUgc6aRdKje/ZYi01xrBFNRPdopXSvFbK8FZIraUR86hNCK4uCcmeZJJsx4ZvCQ+CP0Ne + cV3PvjUvo2SwmVLgTI0fb9u2bS2eVAf8Yg0U20qKr0gql1Gc3iLGLM1ytHw5U1tz5pVIu1G1NWP5 + 2A8ezL996GLX3oWxC12dmIldehgLhzeXDx543ajxd6X88P6pF0Zsvb7j+eqwsUq9QVaSYZWy0SG9 + YG7Se0nkrpQFKWQttYFZ59hB7WZ2OL50f+XhnQ58v/N+FwmICqKxy+4M+BRNFptwui5XKVhXFilE + UTBAH9FVnz3PTuwGee1rkxkMJN+uAV8B/wFxCqCaXpupNMp7YA1kp3Zwhm+Rb7Vvk+9VH+M7zh2s + Ssfp3ojzoGsKPog8OVeF6XyLOAEHWkvz6loWxLgYxUlnsUHM0haSGlQFogL5UJ09w5Qtk3pcifMq + GTuQwgLDbQEYTHKgUDC9N9aUyX0HT5ncr7inb/LUmu7dRkux5uQb37hj77Qx+6cvj33/6Tuxv/Ds + wNibZk0cf3fSd9S4wT1qRtbnzl49dNaEea/dkvzS7Ndi574DeQLi0hVAVxEp6JheKvuVUkH2yBG5 + v3yD/I3MnlUwSzvpDDpL6aYMVdYpO5W3FQETHsmswjGipHBIlhWlCb+gg+5xUBR4UzKtUAqhRcTp + yh5lHxRexFmgmwnetgPRtLEXpwnXbGMWiVg0FsKmcau5VzmK86rlZAYYFR7LbtwLdzOl+sQk7UJd + b5BtQ7DLQdU215UZJATdg8zEgFgaMFZV1Sus20q+Ru4tfyR/JTMowbRA3gjo4yJcaC1MClmxFZPp + zevJ3Wd27Iidi23CmReopy5f90fsEEnDv8ck4LihwHFFzFrABU3P5i1+ucTWxdbds1J53LLc9qVF + sFnttoA1ZJttAzjCighUsFmtTWSN7rQoDotFsYkOI9KnY6oaLwbA+wd77TS5K1mRm8gQXfGJeSIR + DUYU1zoM5pMczqjfke/QHZSjCT+rO6xWn5ankTytXKvSKM3oqhnvsquqhVY1YMd9Lqy7sMvrszTh + gG5TpuCX9iGso9VoE8ALYMUu3LUFJg3mPAFMamYMuNRMtICKyFVerZtkTZDWAqTFV/nV5NV/MGqm + HejKgcJGwKGgK9KHYrd8e++aO+8Yfkf9icXkZPNPuddd/yKmxy2KfRBH+I7UYTcvWjx37g0Bcin2 + 5595sXOHtj/w+pfAi4OB4jnAiy4UQi/r7cdLt/Fz+eWedcw6foNlo32XZYf1Zfse6167ksQUWyu0 + O53byafaPgf3ItoLt9OYc9u0ZD+AlkHCNCBR8lpV8QXyAiRgECywtlzAurBPiAuU0ISrtm7CGBvE + CvroPFgW3VyTJAbEeUrawSoZy94M90GbJ/1/6MnzCZA9XwcEbNGYBkOiFlkGVsNM2BRdoIrNFFlQ + oAiwEDuu0o2l1dg5cUDn2ru0casaL8Uu7j0a+wbn/LTucPMT0/v2GTtxQN+JdP+0AdVrmu+Onf/s + 69g5XIvn44fwyBcv/zh/6Z0LFs2eAVw6GOTXDVwqoTm7EB0/rrdRrVFR8krt6LZiN2aQtFF6RfpI + OiSJAbD9KA75pDyJ5EnlUpVEScaMpd1kDaLwczsJwTTHyzyI5tY8DoP9W69bSBWFKa8Cxq/cQoUy + Q9OAPDabalY7a7IOvjL3iN0aSGIJcQVstpLB1GtTLtyDY79wZ9+mn8DMh7fFesTsr+N8MvVP4Mn+ + 8e9pF6y3G6WjfKxsz+dTfdFwU/yiPgEy71jfsX/BfMHRt2m3O2ZpVBjlyMWovVyJesk30SN4sIqS + pmTOzVyurHA/rWxwb/CuTVuXuTZ3Q/4u78401xT7HPscx9xMejms43KgVErrFZCLCEY+g2ptTL28 + dVVr0no3eQBU2R5dc7qjE1NmppA1KTglhbVlGVwkQLf8LD2LZDWRB3TFppQHq4IkaNwdNGq8LOM7 + KEyJHKxSseot8BykpmQcdHra/G9tYJpXdeXNdRHN1AORs3URk2zGafJOiyZAk+oiEfx3K9jAfToU + NM1j+99YiPpbHne7ccR3+z85Ob7+zhmx5i/enf3Y7buGVVXXD+vTt947pXbw5Ftrx4yiXK2fqH/6 + wIGnR6/OafPSXR/Ext19cMo7uO+A64YNqBpW33zNrfdOu33MtAcM67QjrI6jRRr36TXtrT2to6Q7 + +fn8BmYDv9ay1r4d7aK2W5qs2+xvofete+zWqH2QVKsMs/az19tZDzPFudL1lXbMwYy144Rw+pLz + QDj1hGAyWsAPgmkQWTOFM1/AVcIx4VyLcK5JCOffNHJyQj4V98EqG7Z5MxJyKv9NPs9ftWT/i3xe + IXALgpUAXpGiKIimIaChYBi3+BhGYx3WxAFdBt9pHb/6+UtY+OgYTosd+Pm5z8h10/r1GQPyeTPu + n9a/es3lu7B04Bi2xtbFbovdFFu1k0qZt+yuhQ/Mnpn4nwHmVWY3eJUi7rgLcfGDulBSGmWz4MKZ + DJZVFGV1uEDpoF4dyIQ2uGSjHMDCLDFPbotKmHJ5PBpPRlGjmbH8GPEHSu3BggoWMCUKAs0JGPsR + By4Fxwo07WdYB8OwvKh7UzuIpjLxpkbFDEJRLA2UfUm3sBxhaBojXna5vGBxDtclHzY/S80EH6WJ + pOuCT8D5wkyBCLtJOqKhh+AHe9wjXTfiij/oAeqCKnE39+kyqgJ8wrIyDfCg91mgch5YnxHT9Zk7 + 7c25rd1GwmllZXPffDOhobcJUUEBF9BQzT0bpf49G9PAKd+FqHhsC0+Lu+MxoNTlzSzdtm2LdZmw + TQMBCn44YKco5tXYKzObd9wRe5u0x6U577+Ne8e2MrsvNxB/83HDYhweP8lcBz6bFx3Q+8wR5jvm + O1ejFew7wmfUZ9LvlJAhZMlZSrYj23kbc5swh+E5O+dy2V2ubJJDZTBcFrOSWS68R70lMeW4CvR3 + Pw3h4+gcLKphq1vdUTMVYR5NeIjucreieYtusUUtPYep2IADPckdBTs+Sw/aWomU+rNlEPoZmY/y + 5gPEJGWu4bDK+bh8sHyayMKtydP7X9XPfTTg3hZVcx4Q9kTESI1MXcJnBnObYemQ32DcgN/ldCVU + DvhnwLp0OfZ1in10JnYkNg/fiaNYWT+yIHbY+8ztT33w7prbN5Lkoed+xIvwEHwTXrr6usbKybNO + xf6KnTqzzJD8h4FnhwPPasiHZuiFWcCGXV2j6FEyk+MqdXVz1jrHOplSV3Hy3OSVzDKJ8VkzMCJ2 + W4aq8Z7MTYbqAMIIUtSYlW6fGcD+QD6IutXmR34tXyNguSzY6m/T/4rT1gyOS92kCxFTcsHOKzdj + KKhuEq6zB8D0ddoM08L4hQLgzxSUdAChDYczw6GHSerO+nua6luVjO593/VPN+/HWV/dXdJtWFnZ + hP4dtjO7U8Kvx05+vP2+NSN65vjo1y8XWWyD3tq4ccdom8XgkeWgPWfBTAU0WS/nGZplMjg/n8+/ + yh/j6Tx+MU94HlF0BnirAuK5craKJWw/ythW6fVL+RKRaMGPDRcOmALmJP59TuYSGpoy4ZA2l9kM + 2IeUYkAW2uQXgqYMmOdy6mxzezKyeRWz+2LsmYvNS4yxwQVAdDeSiVuXJCrMhyWwrTHVFJ+pCynt + oqK/XfuoYIRWWlL96ZTWUAsXVuDFb4UzIk0LomgnKbQm+MQQyaX9Qp44hoylRwnjxSlkKv20sFHc + LuwWLwh/ic7V9GJhtfi28J74BTlIHxAOiSfJD/R3wilRmSJMFe8jC+n7hIXiYsLVSKPIeHqMMFa8 + ndxBcxWkJ10h9BQH84OFGpFzi3mWKGlHR4X2YrmFM9wBVhDEJOKlXQLXYqL7CA3gxcgcV8Ba5AKE + KI0ifDWvRCXjYs7SIilRXrdkRiXjAlWrdM3ISDxlKBTCieBTAO6UlxkxqARC1OG8s9pnZ40KsALb + 663gLX6aF4SChHNCJFEsoAhkCTyGkmlCZBFQlON9FgyWs7LV+CC0m7RFDPDw0LooYyCoq/+AKFPA + 6dwMHvMvz4BVeFnySzJpIm11G0ZIh45Ih06owAdGhvEYpc1t7oh2HhRQRCv7SSvzerTmSc2Tyrxu + MLYjUAGOjWF5m6gJo/0nWrYgo70/gCIfP75Z8hswWGcekyYbE0WRSXXAQRgboUYMYrEEv4hFzOGX + YmdjX8W+jR0FMHRTP/xVSd97abpxAk+tAMkOGfyOP9YtAsXyHsrF0zYedENTHG21SeVUU2LaRqrn + wIyoAo53cBxP8YRwlAD0AlpRtDFj2pgxXcDuNSM1C3SPLlVL9RI1UZopkTXSHokkZIQXWh4qmEGH + /v2jQoEpNHuMuIcpNrddFRtQHAAGMMkLLSVTeAz9XYrgnNvamDxQKMFHhso4rgvAFbw/wSN7dgoG + 15jqxYhmtMnvbPaauUMq4mdKRebErvG2jvL94cJQTqqA0im6kpoN4r6G38KfoNg3qb38lzzlp/L4 + KNWer+IfpFbza6hNfCP1Ki8l1HZhUZTohabaPq4reQVR4jcunKMIapbrQqB1lAyAi9m7Ms0PJbjw + hOPchHJxuSSTa08KuT5E564lgzjBQZK53qQL9wj3LPcBMbbXneT+JFImyeJ6cFO5edxzhMVAlsmR + Kwe6wgq1yOQEqxFvtq7AflKD7bEvmjcDA7Si9v9VSb10ucLA9VrQiCdBI6ooGT2pD1zOLOdXyCss + NI85C69y7kz3VGGKjZtinZo0h57Pz5fnWGbb5jvmJc1zzXPP8cqcDTjBm2TzOrzuJC9nb6UInlYc + 5czcJGIkaqJfpEQD8f35qXpqferE1Jmpa1JZf+q5VJKqZa5BWAWFkm+u+cKtKdPfuKrsTPSvS0Qg + y8+a7vokVGePlhQXlxQXtqg4hB22q9ZubeeC58fM34or8OzY9NjLsV2x6bjN95s3f/vVzp3HyWfH + V0zcEmkHxtgjscdiN4OiG/tnLB6PX754yaDDUkD9iyAFBh2m6Bkss8uxy011ZfAY5gBDbNYMxWJB + yZqB+irinf9Lozl9qfkt82NSNfXvCiDln0rtqk5rgf//6DVYMFDahnVvaLWQh8DUjLmBTluKD2NL + v+kbr1/eZ/x7rz256fbO13UrWsPsdga+2jS3aZw1qfkL+vVYfevrO1aPVUSQ6h5gqf8K65qL9+nX + 7LI2pe7IejuXBnMmCcyZJHdkFDMq61Z2qnJr1iH5QEiuFQdaBgZrQ2Pl0bYxgXFZY3KnpM5JXRaQ + bWagPs0XNVJ9lMcb7RvsG3ot+FqInhScFLoneE/o6+DXITYi5ijpwfRQqRIN9RR7KhXBzqHxyqjQ + HcqdwflKQ3CtuE5ZH7QLoqCwQTbkET2KM8gFQ6JCY9cgt+7xR29245vdq93EvZuMQskgIbK31JeM + k1s5KNQNGyLT3euPGsGTalyPF+M1uBHvwTz+ida9pRqN6VY5gvvnuAu7dLsr6urJZYa9rX2Za7RG + sC564p+tiSXxtPq0ZT169q/ZjPS2tWZYzgzPn49MNoyrSZHzdZETiXRy5AQgcUKszJBpEOiRnNoB + 6LGvJf12i700COSBBErvbbEZpX26aitV/LZS0TxVo+4H3SJDnVIquo3TXhr5+3ElyJrUTmynFAWL + gI7dlc7BytBacUNQRIkPI4b5czXSkmn+wAEEgaATxh5nfAxx0iYXGZZgD+z3rp67aMk1vaK7fqqf + O+PnDdiBXVzsoH3atHu65+W2xY17b1sYR6/GTsUO4K9Slsy7o2+0e7KtdftBd7ww8Y3Rv76vTBpR + FCyNZuSNvvHlBdOP3ICNfxNEuSAvu0wfZrIeyhPy6XymWpgI3sFigWMxQzJoinCIF8CZoGcYugC3 + 0kWWA38CzTDkAopWylJNJpKZZDGhiYdvfq5lVfrWbCawKmWJ+B5cwJc40SIvho2E64ygnWEj4WOx + 3vT9sT706xcvXuoAj+0e/4FuTXcA77QAT9LHcl4+hUl1enskd0vpnnFYO2YVij2VnsHh0Z4x4Tnh + Bz0Pedd6dyW/4303WWZZJcnJepyZbHZSrWcKmUPWstvZt1n51eghjaSmF7Sx5irpeqR1NF0PZsHF + kxq9Of1yOkmvNOPm+RY1ek0qNuL7jal/ptKpqbm4EOlQayAcQQMDeoq1PKAna3Bxe6OBJnLrdpqT + FTHXwBFoM1NoNlPokQs9dN0hpbUJ89lCllLrk1fLBGyJOJgTusUZlb1VURyth9V4IB8c48LswDAX + PubCVa5hrptdlMtTOK5jC55OBt6edLbOMD8jidIJI3QKhkgECAsq1eR40xiNJNhwS14qnlR79opK + TQclmpwaHZA+Mp3URWoN3wvUL2XREksCDjSwZmaxEZ1wJlEOpytg8CYLvrTJnyXFJS0hCQPbTF/a + /CiAR8Ujn+59qaknlZwROyVpHNXt6bqnXx706INv9aq+uecAfF3xqfSSmopeXQo1iXzT+pGHa+fv + jDUtnN0rpcTDV1ZumTfk/p4pGf6Uvl3axz61Fbgzy9oPKgiXpI8Cks8FbnjYxPQU9NguZItf1NtI + pSXJXZOJbRA7SBzkHOSuTfmDY4vo9kp7e1FyF7qn0tPeJflhbqUgyhZwypAXFmELwzmMtbBLkopE + V4D3TkzDaVo2ocLgymXrMp6IDL/ek1qeoPckcHmby77vA1ifQHrQYOUGyk8CJ61zjS6NZkeLo52j + 3eNSmDrQ1BFAfqsRF0wEHDKT7CDDV/XaXOy5d8vrsVjzrqGbdVu0+x11980aM2oOs7v53MOxk7E/ + Y+diXw6tXUVynqmauPrZHU88ZsjnQJh7OUiCB32t961Ra23goKnjbOOc09x3eJaT5fLb2tvuL7QD + 7h/ZH/kf7T8mXWTtbe1tk3rYejgr3bXyOJlrZytxlripKcwUdS4zR53vWW9b59xl2+EULCaHJkeN + dLvNEbUUKkaNJy1qpqo1quzGNBKBZjarhHToinTohwoXA5/uBgShocnv4rBRiwMoTzEySqAK7G1v + MhdweLw1Hf8TXwWnN3L+bMRwe+tORBJeL6QJPJx0JbJ65fsvy16NrdJtYqctI6rGTZtxQ/XoJOyI + nP/ox9hp7Dz7+nfkTEH/AUs2vrxq6M15r7yOw5gGOzljnWELDADaDW/hm8V6K1stWyvW2hLcsgJY + 46IgTEybmUbaUVG5XVLU04OqkHskVXhWCoLDZBfJ4BpwVTiLCkshurItShgbnKKqyLvI4J0A70mt + Kbs6w0kXEhxjolzC3gF/fpLBK8o4dpw4zpbgFrauNhAoapkgWD4usO7+zir08NiljpuH7Ixdir2+ + 5V7sabblVdw5fN6sMSPnrhpaizNBW1qw52GiXZ64sddNzzy984nVZlTvBzoTeMWBUvBTu5AGclIp + la4UHlGWaeuZdeKLwotKk5fnHbgb6cpWilVp65Ud7A7vO+K78gHxoHyR+0NRUtSUJB0QIkm3WKNq + 0qtJe5OoJJMb0srN1OKClNyvy6rFVm2ptxCL22Zo9R2e5CgutJmBk1R/IoASzE6kkVaJ1J1iproK + cLrG2PyjwbCH2WxA5q20ZHMb5E6XOBTAeUkJJspLG5Z2c9rqNDpNDfC6okaB4C1oGPlHJOUsKHXd + 4dazHOVuPU2FC0Cw28BqUyeXN5tK3waDgB42YzDQydYC1Ua65UpXgFlTj5s3IGiwlRqD3uIyksat + gtjBLHYMlEcMN6T2hIGgdebrLTpQyWK81GK83qIDsRKuihk2A9MDvJ1CQ/WBDRzBTMvGCIPHERUw + zQF7Qvu7yF/YXfzjptjp2eOwY/9ZbGObdere4Z2GZFJTB11bVoZxv7xHnti+5CvghUjsndjL0xZ0 + wxPunNG58y0GbrhBAL4Hu9GJmvSCYhrn0H7Nb62lZ7oZnn7VTZKcVuKwOa0Wu4o0ix0jjTgEXpXw + MCkObp2xECKLraoTx53YaRTTNHjuOXg0a3eIQmG5+Y+yFJ+l5VmHWYm1CdO6YrGHiWMYWuPcY+xA + AZ4Q5KjT45q6i4xLfJ6KAKQau2gu14FB4DmB3CAmRtwEznK4lBaocLToIXuhaREVuDgTFZKMb3sB + a8i9qnTlbVNvCXfucE3Rp5/GTq6iw9VzZvVPf1Mr7dvzq8s7qe7G/B8Eu6YWZN+JtugRFftwKS4k + hVon3Ml6FP+JBY5xMumkxjrWymBM7A6rzU45CFaNmaZSnCCKjiTRiZAkhnlB96dHNwk4LmDBa+6/ + cAbTo4vda9xkovucm/zsxm7kCDuTTNaGvmuS8LkknORxlSegAWzOlqAR5C60lEyMMCIEZ0uNDTaG + CubLWj4xGUokjSTBdKMmJLJGFj877+Xhq6pSYyf9fa+pvKkwdhJUx3eru02ct6h5CWmzbkhRxfw5 + zWdg0iBUDwERnoOssedpyi4kwMjKrWK5LlQLZKbQKOwR9gk/C4xPqBdmCGuggqFYDjE0pRrfFfeh + 43BnHehNlmE5WiQc4KrpGgfSo7SHb5nXf+ZRbi6hGfzSWgyJycbnIqvhuT6EPbGT2EPvwHTs8qUe + dPjSl7BC/xlh/11GQEbPNsbHVDNkJtPI7GH2MT8zjI+pZ2Ywa6CCSWzIAV2N0ZWRIA/9v0bS8u7C + xHuZ3X9VwrumI8SuAGTMxO13oWy4uw7eBdInJ7FOOUpF+ag7GqogXfgu7oqQ7KfysvsL9dkzs1dn + P82u49bK29ntcmP2vuzj2RaUnZddDQ2vZh/LZrN1b0q0HMozzUaGC9CcN9UQly0iFzClhuY0qzUz + OSUlnAmeNKtqYZtVH1JUb8U3A3GaSKWuepPDqSlQd3MKrk/BKVC3LSMczjQ0zRaEMk3wFcqNVC+G + cWdC10y9I5xlcKZnRjP1dtdE8zL3Zh7LpNRMX+bMTApl+jPzM+OZdKYn69uyK8Zji4NibCXRmsvA + K4+AKF6YVBcp+w87mkEr0Fx/+6oyOWKII47YA0mGXegyrUOX02TPzKvs+R9OnY6pBXtGL8uvfPLa + 257MAn5Nzezbfmzr2Mm08uKOY1vFTtLhJRsGDBw4YNi1FSuaa8mwx1uXdVuwLEZI5aNDcitnrWy+ + nIiR0rWwZk60Wndzdpd9CD+Wp5toDKulVfAV6o8aw5riauUsCitLEqhogsNOZIorwnFjN81/EVdR + CssWg76KIl+VWhmfA4v8n1JrUup/Ca4Z2Luq3QP/EFOTSCC8dG3sZHrf0u63RoD5mQX76x6p8pG0 + 50a1rZ61Jeajw6u2dR476y5DVvuB3n4EZqqAlbdc7/YDPsn/Yf8jiX6H/MAQm4fxCKRWG2Qf5Kx1 + Lycr2BX8crlJ+JwcZo4In8snmZPsD4q2jv+AfMi+wb8tM7fx89lZPGU1uVByGSRy0JyjlPPWJ09M + JsmWAPqHWZYwbhPGimHYTgJrRRinjQZbZZybxoZhC85q1JbYBmDsUQln/O3jZL+G5lW/4GjsvTMP + xv5owP5lN920dOlNNy0jwYWYbYi98/MvsTdmxdc/vn79mlXr1xvzXRCbQC+H+Wpglz2it25r72Yn + tihVqpTao8kVVHelu70i+c9kwbDtr9hrF7g/k3mQn7/b8U5J0lTLFTvemm2xqGFNMw006X9a8r3P + lsFCaif+ly1v4q1hnxm2/N/sM9A/sJLFV78eZhom2n9mvQCzhS+M34VJ7PKumkVVsMTOB0Zff++c + EWPmwdJWj4wdjTXHLsQOVQ5s/pHatfXZx7aue9Kw0YbC3K+HuVtRKnpML7GVkagSdZSl9CAVSoWj + Rwo/0YdT+SRXtJapFQcrg+y1rlrvoNS14tqUi8IF5Q+HbEWWZIMItJSUcGY4VWPdYIim2bLBIg9b + raYzIyzSsOb1JYzTC3+b//n/Mf3IpBYCjGPGiaPt41zjPKNTgQDYatinmeGEBe4qAiz/2wdUqnvJ + 08O239aAqT3jHy3DVOzc7JGj588aPvzB2ATi7Np/3mqsYYR9Q4Y+9lclte2p1U82bnr0BUMzz0WI + KjFXf72etZzBggX3Z0YztzFUnq3GMtYy0UaLgir7ZLJIjsukXK6SidxEpujZHAcSThFWzEKCJuQL + EwVa8M6wrbaRYbYZtk22fTbapqEwpkwOIGQmXgOun8davgunoCsO3VWBvlDn6Z0wQIAYIN+lBQlm + mIR6Nrr692ws6jukZrNY0LbW3GeY4IWEKcJa8RpDpjvfUFFfO7jrNe375dHh5TdUFP3euuPG2C8w + x3yQaA3mmENe1/ewVjbEZ7qsrtAK2wrH8sylOQLnqHQQ24vKLss7ge9CF5ULQTZbGaiMUpZKy23r + grtkrmNIT68IjwmODM+1zXXMCd6XLpSEu7CVUg+lSq0MdApywfTMcIlcFDAiTEXpHCsyViHgVjLl + YDAY4tKDeu4t8lTHHUm3Z9+WMy9pVs4jSUtztgW3hZSZeJFroXtlzoacxlzWFXDqgVDUqaf4oj4n + PgbGXiEfqM5YlEEydHdqNMOba34kAb1TnYvzc3FeLs5NC+QDcxWCw9eimxJfTcXyhGY24vOeyNQm + g+SXQd+YMYsWDDVipgayRs6iljBZEYsxi504HCwOVAYG4FrXSDzOdQGL2EVobyBIsuyKTLK8w2hM + V2ZJ1V7srbRzYC3Cn/Ep6MpZNynZCOp9sDUrJxpoSqRBM+iZbpSPb/WlJ8oer1nWkyFzg4KLg5XB + FcrDwTeDnwXZQFBWaNprzGM7+DOo0PBstrpaleMW098sBzOiZhwzFbQ/wolIJl2PZ+JzmELA90Zc + kzZ72p3QE2O9N6LxMPocTYwpOHV4tLPQpcNzXTo81KUXlURdRkzKpWdkwwWeq7p8ZviHdg306qC/ + VC+u9sa9pGXyZmjTPIyvx3WTjO/IkxPFBDFaYpEtmyLgqEvsFE2Pv6cLkq1czYIL0OHMDqVUdsil + RnaLbEQ3T22WSk2nBRufH67spzB2fmaGM9MzW/au/CNMaexgNEJE+dhru2nEjSUZjqTuseeGTv/y + uy8/y4r9YR1Wc3O+PyWMX6utOf/zoWacF+k3MCslz5/ksPbsMGhlw0sPLGjToZPPGUpLShndo+ec + Bz9tBCnyxX8gS5jHQCt+pGf7kR+HxGy1naWHpVblPEnITTmTkMtmd2CXjTiwmxI4kZPdBrlV5Frj + anRR9ZDscVEucE62JGFDaWxFScbuf/DqZUnIE/MQysPDzA18tJ7lpsIu28CkcsdqxyYHVe+Y6Vjs + 2Oc452CQQ3MYW/Zoh8c7dc0Vc6pnYwngRHtzd4MjvscIdV5ORDq186Zvc9b8rwHoesLYYFfY4tvU + YXBkHCZNXQbRjNCvNVRUWJRhJXfukTJTMnu4r7+7152lknDPPdhLh4/HBtwbSUn+Mqewb5c2S/He + 4/ufjs0H+twPKNOfDoOFtEp3DbaOsS5jKIH1sGWkzNqT9LSeJJzpz1hpyYnEJAe4beC7hZOSkAGQ + FqdpJyUcvP/DThL4qwYSj8/xmP/vbk1CyfwP+6guEegIwyQDiWkXFxtZqk+7l8fdsLEX9vj6lXeb + nIM9qwdef93GZWRNzH18VPuq207gPeAowDwlsASHwDwlnKwnMVnevChnXFjjwhsXqil+cCukpovi + 97aLPkJjlpJ4XpQl8MOIjfIKXjGIWknvSDLI9jndmeqPioiRHMgjZaAcKYraSXOR0LKDRcSKbD5L + ElxRGiMBs0hE5ca36FJzX1dpsm6TkEhLoiAQglnIC6VGzEx3p2RFJcWn5Cu6Qisul1cTy8Uq8+NZ + vi7RpFSiy+kqmqJ3k3wwUWfqqlyEsN/YSYo98pvAWx6DuSLu3mfN/8nwmDtwzHJiTx78bKUYhmCK + dsTY+4oT+2dwwO4yArT2AMY7YwNw5rvtXKxFex8HYkC95m+2d3G2akXSEjQVwCNqCzSV8Vd6G6Cs + iFgicoyQjJwkjbYyXs4hpIlWWbZFqAgbkkqpUrYb1Y1dQa1gzbihPiW3K5BQommGFiSRlpORl3Yy + DsEjJslyCGXRmUwrIUvMlNugEqaDUIm6kq5MN667MAVNpacwU4Wp4hR5LppHz2XmCfPEufIhdIj+ + nPlcOCR+Lp9Cp+gTzAnhlHhC/hP9SV9gLnIXhD/FC3KrljXiMRj95pe7QOKDdhJkJN0oSSygMAcs + 8P+19yXgURXZ/ucufW8nkIUQQhagG0ICIYkJIRBZJB02xYgECJgACiLoqDPCGIKKT0RGR3YBFVkE + Iz4Zhoh0OqhhcYyjM7ghjDM4yFMnijIqOiqgo0By/79Tt25omiU4M+/7f9/7OvrrU9upOlV1qurU + 0k0E9xpva+QbArvrtv2+le7y1lkjao3ICNCrfHkatfaCS2tNqqK31lyRrcwIt+E2TZdL17mDxTsC + isyJLoxWo9Gr7qIIhb/aYai/oFaAjzQleptXSYp6dbuSbBsbyUkjGpMTGxuTkxoT7V5sfhMQK/8T + AuH/Nn3tJ89CSvGm+ZeZxPP1tla+qL6o5g+BqL6o5Q+YrFv5WnPIN5isNZsYfGfVin0NztQt5n62 + Zlgr2vL/SmdNU8qb/Eqb3S8oMTVvKu2aqpuOvrANmnGFWsc4eVCtbhwL3YhuGqWPhm60VfK3xXV3 + KW15tUxsHZPvToiKyTf5w+APVwLCVG57D8YcttN6VKtoI1altobeVtVRHh8WTYapUKdsxYCJicqJ + 7k7edrntJrfT+IBErKXp+eLcJK5Dp/x2fMvUV/MlJuXzO4w6pZsvQhU+VVHZF6f0JV+HPvnyBjD+ + VTkXZ45oTMInjxv7yVpm5i9vHxF7/BPsa67NsdtbcV7mi/Y2o2P5IF+OnWuL/bGYyvthKg/osbTD + +gZj85saLVYRb9TEwunia7+oNoVtY9sm4SMusdCF5q+Fh2kAfjuvcru5zWgN1nM3cZQdrWQ2/aCk + Ni0YnDb4mntLRl2dNKj3lOuS0PTR6tFT6vZrp1zWpc37URXl4qv0xL/ISx++f6B+UsyA79xJbvEN + 8w2HBohfDnn3/k9TTpw41RhL7tvFOFbkTxnzD/kObLqaBsfSiRMnZsee/olj+ddmpSGD1L4Sm6lO + e5Nm6BUUBwwzO1K5azeNV/5OExF3KzBY60gd9GdoLNJXwl8B+rDa12pE+nHABqAXMAJIByYA10iM + AYrA8zqwGXlM4nwEPUS3mHvoMpRFwErgeuAR1zh6FHGPGX1pCoejrMXIIxXu1QhfZ2ym5XCvQnw5 + pxWU+cfRlYjPgvth1zjLMpeQiTCCuxHhCSh/BcsMmo7yK/QK6yu4eyDv4Yh/EHQsaKmUN1G4DzGP + qCvXcQG70T5zEL4cGA0sAiagfZg/F3we+JfA3QpyRYC2BqJ1oi5IM0C9jPyg2Sh/sKw3iXqjHs11 + gvxCpnNjLMsXDMjE9foc2APsC5ItFEvOQAUN0XqJ/uM6RwH91T00CO3SxPVyfWr9kwHNO4B67QRc + +lTq6SZrM+QsdG2jVfDnAQMEKkjRH6fp2nH0wTaabaykJxFOak/ge0pTv6RkI40K0H5lyP8aYBry + fEXow1SWwfoS1KN/ijWkgiYDt6Ds15124raB/wr0axnSnuIRgXa9H7gZbbAKuJ3lQ/k53Obo938q + 45p+i7QNKKeYgTI9Aqi73a9UCf5fIi9FlGP3g00BxN+CNn0WeAl4mWVwIPRMQuS1mTR1s3UMtC2Q + DOwBlrO+AZOBvpwG5UcifaTQV+gM6ybrB+uGa7fQ1TEsu10HMRYWyTHzC/BPAJKA7sYzNFGiO9Jy + +0xhneXx4uTNusU641Ch07cKvX+N68k6FUQfcdXTKJZBlAvdciiPO+R7F1OtnZBpjbZf1H0V65tD + uV1Y13g88piQtCSorllyjGSBv5PQdeiiQ522aKZ7aQ3yHGcsh54eoav1g3S19hZd7boLdAXqtx1h + qI++H3NYJo1011MG+nIkeFeH0FUMc79yC8p6SK9GW+yndaJd96td9P2Ky1Vtfe4i5XVXtTpHuM+i + oVDq7TimjOC4nxr+r0B911VNN8L9hWu/ZaE+K3hMmEeUXMDrUIQHgLlAD3emssp9q1JnjqVYg+g4 + MF33UT+Xjwr0eirU25EP7ZSG8LHG5WLeXYb8dytHaAn669dmO0rVPsfciLLUd7E+AJw/6IggPTpD + 50J1yaGOvoZS1hmed0FdoEkYdzuAncBBiY+Aj6GPVwCX89rA87NYHzBHA0ukvs5t1s/X6XHQpY5+ + hujp3SH6aYbqZSjltYXnd7G2YJyirCVO/Xl+5DmO50ie53jtc9KH0iD+RzF3/FXMw3tovBzXGUAu + kIM8dsl5ZCcsvOMYo58Zf7Z2moXWTu0Na6ex2tpo3mq9ZmyzHkdbZDSvqfX2XMbjyVlLuZ14XXTW + UVc63SjnszUiLcoX6+g4MQ+QcRfG3y00Bfm+xesqj0PtcYw7tCfym6dvop/rH9MyyB6jbbXD9TF0 + Nc+J+iy4EY45neNbactE/Gj9GM3SM+DeBLqW2hgmzTJ+zzzWHhF2yI7jMNd4egx6l6MvoP921VAZ + 9xXXQ+1tvcF9jzGf7J5L62AuFUCONfoJ1Lkeddwt6FqhT8xba53g+pn9qb1LQ/04DcA8rnXkle2x + UrRFvWijR4UOoy04T+Mvwt4g1wGkf4LucUfSGnc3zE/fUbKJuUSUVUPXuH2i3XWxXn+L8XEEOjaW + 5rvirR+F/j9jWdoJjKEjGF8MBXHtKMl1hNZiLM0X7WPTRTx+tCPUjnUE9SsV9sQR6PjTdLtRTYuN + eujdfqwF+9FvR1CXW+lSuJfr1dZJpB2KPIjLRvgoYZ/wOuWz9vF4Mesp0fShfP6tfcgg7D+Uq30K + eR+m+ZhLitxH6CmD7eyL+rOesSk/KrPeRh73gBao0+g1SKHCrfBY0H+LsbeWirTfYO98I+yHL2ie + msO/Igm9+wprhkb3sF/Pou7aV1Ss/SDWnwddkVQg0iVgHf+MSvRy8NfTVD1AUzUL7kTgUegj+Fx1 + NN51A+ys65CPhNoHPBFUYiyCOwdjHelEGT9Ywxn6XZQn+IIgZHXAMm8IkvlR1Oo+6APLyy9Og+Rl + WZvllDKeSz5RT84XfCLN/1AR2ul9IM2mTaPUJVQNVKkHYYfX0xxlpbUDjTwsBFcE+/U5ynygBND1 + ObQeNBv0C2A/8Dj/zibwD703PYC860FreV/AUH+HuQsU8U8DLwIfOnHB4HLOFR4M/bC1I9jvyqO+ + DDULc3rWmXEi/XrK1+9E3+RaOxjaLIpkGNGUYbopQ/0Y4ePAF+J3dafH9OlIO5q0lmS6EPDXM6gd + fcF1dPoDNOEi8H4Q9TLF+Mrm9fnfke9fAfq3DZAr2r+KLhE69BkZqmntVXbRdUqDdQLzucGw/ZQs + 2nM9+GQ/IXy+CA/pP+hKH27z0PBQf2i/tuRHvjcHw9EDB2Ye+Rj6h0gPhPqxHvgYButY1tn+5nLP + h1LKRzsN00shy8dn+41YymGoM+BfhfjD1I3R7C+lDAanZaBtUxlo6x0M9WPqzNBGI260SD+QEdSu + ZdyuWj3zCn7RP46eh/YPeGP1VylW+wQ2cyklh9LgMRs6bkPDnLnkXGlCxkbP8+X5fwkYO28Au4E/ + /q+WAz1XCLoKxBJsuj/D3vDDVn0K+6w3aQlR43yiky8TnZqEeQjz1KktCBsLdzrot0Aiwm4GxWp0 + sgHuGYj7C7AHqNJT6E5pVybBP9Tmbdwo80uz+ZnvBKydk31s/pMPAmvhfhsohfsV0EdAv0N6P/jK + QecgbB5oPvwlAPTh1J/gHwhg3T/VD/gcgJynYMacygH/emAW2yPn2If+Z+l59h8XS+0zALpW2JyQ + N3QPcdHU6c8WaOhew+n/lqizlziLynaAzfcGI2jvc8E9jkPRnz9KHAe+1hdYjbApTWFHw5YVNjfb + j5IKe3u/sCcVeaYoKNvObL+y7cz2K+jjYp+3F/JU0FW8zxdyOetG0NyqZtE0IEEC8x4NRpp3IM83 + mHtisL5+B9tyGUMssSR+qxSw3sTaFYM59yVll/Ud6B74O2Iti3DWNGduPWuObWFN+0/7f+oa+S+s + qSMlbg6BE36jRGh8jkQXRuha/FPR0tr9L6/l51mjg9fpf9fvrPMOIgZSHsP0QW7f2XZpqB3Qkr8l + O/en+kPtjiB/DeMC8cIfapc4/lCcFX+27tn2TDLGm4OQcfdTgXE6SJ9uveeMV0eG0HHcPN6k37iX + hgBDHapsou6YRzKAxQD2qlYqKNZAazavb+5TlOfeQnnwY/21tgKFQLm99lntlG1E6j/ZDGp6AH5T + 3yPSlkmUt6TPoXrL9rmwD9FmQvZl6IvjlAP0B+KAGuAXzX2dw6+pmho0rLy8z9U+sb5DXt+dzxY8 + H8U+73be78EfA38M5uIUo4Y68bmG2H/XY/96CPPibrr59Bmf1WjUijQTxdnyQboa8/yN2BNP1w9Z + z4g7nERSzdudexRxtrZa3qWk8NmQ+TXf/Vhb5PncODMR6+AxGmsUUSdxD2GfxU9F2hv4bEr9iH87 + W5whJ0qazedTvF4ZGWKNiQ46R+4HlOt9qAfQV95TTdBOIO8NgneRuJM5SX59C43ju7DIzfRIxG56 + xI36RIyjdWYHWqffTg9H9qNVbj5D7kDLeb1y1lW0fdM5zv74LLNr0JmmqHOoTSDk64N5ta+1Ibhc + h889GG0z2r4bkufsF7RtkE8BkA0cBw6f+7zT2iPPPefKNf6m5jU/9Jx+PV2iZ4jy7DNZrNmu1sin + tZBdtHGoLE5ZaJfG89lCjm0iz6j4nm2evIPLB+JlWKmwC4roKvTXSD4zcz1IifpCGq1utl5tTgOb + SZwxvi10diHLqdv3dinArdpAGqLyk9P3KF6cSf5F3OE9IDEHerpR3JkdEWdho41qgM8dLRqNtjp8 + GhhbzbAO69UoiyHu/axXJdbqo4R+JkndTNF/oGJ9k9CZOHknGKMvB7jtZkBH+0hU8N2buN8TVLTV + EbT7Qhop6shnc9XQW7SPtl6cD05w0roLqdRcAH3dCt2Zh3KHkcdYBRynRKM37MOFqPdQ8M6j+eq3 + lMdQllofqzrcEIShEeXpsMwx9xDf/fKdsLxXqwQeQX34busYpxNp7btcRg+GulnpLO8JHXdb2y3C + 3pA4JrExCEhnfQScVL9C2Z2Rvwq5/mHLpMVCV0MAnikSGtCR7wD1a9BWZ2JwKMDLNCcUCGeaFgoZ + nhwKhDMdFAqEDzqHHOdLdz45zheeHgqEp/8H5DhfvqmhQHjqBeQrDgXCi3+CHOdr566hQHjXC8hx + dSgQfnWoHJifsJY3vYQ96nNy3b8TlH/n/jLQ6cCzfI4N3Cj9r8l0PzsNce7tkRgC8F4a67H1JfA4 + MOo0uCyrnc3jlGPdCvdR0Mvtspi3aaddtoAss2mjlPUF0N8F+Vl2lN30sV2eKBtyNO2w7RhrDdJs + h7+/LPc3ttxN7UFnyvLIrqPg+81pWBh+FubxRq7bmNNg2Zuw97eelDZTnWzLDXa5jdgnWklAtoyf + f3peoNewT7wJ82Ekr9VuFZs1UJ5rxZx7M8UHrVV3yDvrx3i+MyCNPoA6GrDhkEck2w08h4v9JOZ9 + sZ/8q7hXnyrQFevIX+D/CHlUQQ+jMW/eT925DHEvU8HvWawNbHNof6FRDGFr1Iu1uojXg8jLqNzo + B5mOUzLyTzHfpsXGdfy+RKx5rcyfwX8T7A6+IzNplns9LTYPIF6jYVivBjvhzt7WeMCyXFnUyqHu + 76ncfBPh91OqK5lSuTyzN/GZToFTdvPd/TO8zxX9zrqzxMapTOAqITPkBW0DmuK8GxBt8jr25Bpl + iTunjxGvUJTRHuPqFHU3I2BfPE/zI1RabU4Se/f++hOUH/ReIJvvn4x3KMv1K2rn7N2Ng2jXX6AP + JeWzEec8wLWO1uivIa915BX3WvI8oJk6efB92xFay28lQu0ax45qtm/kGUFzGbI+THntDKq/oEH2 + hn2mUEPX8N0Y3+MJuyOEOjLxPR7fpSGf64T9NZCuM2djbd1Cw4xXabBrMOz0K2mwO5m85tOUxPaZ + eSN0k+01PsPxUrZrLWGMW4MBaLZ1i30vxvsFC1pjVaD//gpMlOcT42wQrHf+B9GaxkpexFuVwFSZ + BnHWQukeLDHVTsO8jR/I9Fv4jEai0T63EWP2B3YHtfNKYdOfTZ27+0ek3XphepFnaDyG+U3VOe74 + QynfD/d3/Bif79hgW85627GjQ6m873/YptYRST+Q9E3WNbb1Qmno+5XzvWc5vx0rx5lDz3z3EkrL + m9/ltED1oHcy56IXe3Yn7usxTzn07PcH8kyumUq7PPQdzmm6Anbah9KOjbbPFWmJeJtzATS/4Tpm + HTWOBVPMkQC/6TkXjE5I14nIfNY6aj57moo3BheA8RD4HsL64rGOuj3BlOIZci/K7/qeB14FPgS+ + BGqBek2xjop/WWm5dVRfHkyxdiwX+5Nzva8bbaxDuetQzliUh5Fsvg55Xwcfv2m4AGCzk4ll2D1F + 1PEYr4UXxNsoB9aC+9co59fgOYFyTgh6jOG0u9OOTrugbn8X/eXI7JQv8/13+xF5Lr4Qzt8v1jHG + f6reF5Ldtdv6E/ABuzGW3pf7kvftt3vI40yZlwq5D6OOgHmNDfGWZrN1VOIY2vVT4H94jpL4vXyz + 9BnrlgYdYKAcCZQTqgfHJKTffn9jNRqHrQPmldYHPA747Q+DbalztY85zfoTdPADcyXo2+C5ReyR + 2Pbi+2c+u+E3ttfLua9zxB6sX0vEmYyX13q3H7pNmH9ephvPtPmsMXIO5new/KYozqilUq2JrsF+ + ebneGnPSu9ZhBsq6X+J1ieW27Wf9AXhFvpHk8N8GQ7uEOjHg7mevk9a60+dx1u02mv5uh5+Wq/mN + JCxh7HUJdbse/R0j7JfVkG019uAKLWZ7QawRMTSc3yXBpowWb27kvl+cPXwLaqMz2qVUXyHejI4R + +Bzp+F0NIN7k2O+URhldaZTeIN7X2G9++a3v34Cj4P0SNufY029rOA+2B9ku0g6hHTGnaBuwx+V/ + JeEp0LE2dA30v7BHvx026odw+4FOCO8CegdwJ9zpoLOBCcAzMvxuynPFIy8X3AzspfXnbarJfbXY + W++1oXlRBsLVN5DufspXjyLsCiASGC7BaXbBxuO4QSJdnvo5yriKIrUU6R6MuIOA296/i3OFozLO + STPodBrzHhoWuYqGqb8BvZOGuYqsHcrn1InvsdGnUQB6son3Q7zfwcixMFqtkcB6vvM5612Ac08u + qes16utaQXlGAs1zJVEx9gJFRgzW4TLqjvmH31+PDX65xO+J+S2xtt8+95bn48Jt7KNLImCfI57k + m2NB1WoSP/+rjBVrp3hLr2C3RdV2nuL9NMaaY+eak2mJ+SRsySdpgpyLrpdnXW14XYe7rzgTyqBB + 8g0VaBPsOYvHwxjMDc1nr0z5TRvrlrQF2cZ8RkvgN1eQZRXa4TLqJHmvAIYDc2QbXol81wfdPz3P + +P99vxV6P3W++6KW3ma09FbjLP9PvFMJfbvR0luOlvxn3cG0cF+mH7JeZhua51GzI7ut/cAfNLgZ + 0GULcQehS52R7lfqNxiz72N9OEkeeSaagvB4zF/x+g9C/x6084N9nibOXPlsfkbQ9xwWwXa9ke1S + bYf1Ks9z4h0iiTPL4UFntUXN57QDaZSYazGnyrPaJbxPE3NQpIDB8wzPQco3FAkQzzPiXHIm/J3t + eYnd6iyMhqVwlyB+uD1P8RykTQLPJISdsOcsMWfy3MbjEPOV5gOug/8LCcxB6ieggPY7Ww71M76r + aVphQ+zNnuC1Scydqp2vOIeEW34fhdc+frd+PdIVtWQvSfvSsTFfDfW3ZBcizevBCI1vvsP5G7/1 + h72wmxLs77zIfZd8G230EvsVMe+gL1OCzt/z5ZlzvuivBdQGc0rKWfsCjaZz3zp7erTTH+XbEodO + siHWaW7Hv4u5UqFrRRmY46TeGcKu4f0d7x0223cRcu/n7OUSpG51R91WYh2cz+/85Xq/i+9bJP6b + Id6QvE6Pi7fMoHwXhnS5Uq79QD2wDzhwJhr/KPdxE5r3Q9v5F0ea1hopCH+PDPcEhH9IhtCJDjSW + z8UZ/L0CBt8XBUGTb6H6yHeEvK8fIinmXDFWeJ7P1J+iidpdVKjPpyv0MZgPHqSe+iTQRci7F8Y6 + f2/qIbin0zjtPuqv30cDgHH6Wuj5fVSCfpqi94d9wekWYr/+FJW4+P3Ie7QyogetBF2MtaC/axWt + lnUsVTvSPH0GzVPvEHctpWqJvC+pEGdhUzg9xwk9QGvp/8AeeDfivgX9NZCB9r2MJrriaBV4V2n7 + KEM/jvAsWmV0R1xr4EqkXww6BvR7xN2N/WwS0h2hZbClIo1RmG82wBbaSG7k5zHegs22HWmz6FLX + Faj/EvB8S11dMbC7WYZzgWX6tZRJQi2xfoRMy0D/CnzoyBIKIUcwWI7QvAGup6g3ZAktiyHa4TKZ + Fu0B9EG5+4BPgW8hyzXcRq4DZ7ZTMISMDuhMeUXbOeA2DAa3ZzBC6yTBbR0MUVcHaPtmoN7cD6L9 + nX5vD7Db7nePqONwmsh1EnWZbZ10+lzvR1cJufk7Nuh7vRP2gSwXynH9iq7i/nZNR5qJqJfMU+rQ + MlFXTjeR87Y+FLJx/H7wswxvIB515nI5ntvSzCLNLEaahUhzN9KMpST9lJT3K1BH/o+g38jLWA3b + bRxsTNnWguc5UoT8cbLdHdm5/1l25OlaL2U3Ef4STcX+apXxLtLXw4YMIGwn8CYNNz4S/RShTYWM + m6l38He0gDigiwzvBfD5TY70CyrG7sWCx/jF4j0xDwRjcUvgOUCir6Q9g8IE9BHWgmC/mDPuQP1N + mqels9v6saV8eF5qthsuALWjtcuZs0LLgE7ogBt7oJjmuSwY72K+5fEix3NQX4h+4LfQ0Jd1DGMt + 9cD+7AHXIXpAzaOngJXA1YAXuAnoqbItm4f9qY1BQAcgDbgEaA+0ippGw6LzeA2wdsRMEXSqfQdj + beP7mZZs4FBbz7EBQ9Mpu6y3YCv+DPQw6LzzvXU5nz/0LU3om5iW5DqHTX7mu6YR1pv609Zb+kDY + phusPeZ27Eu/pjwzFbQ99W71YdNXWGez0CansC7eClQwDZXzYt/9X2y9+Z2gsClqxVuWLP1Zihff + 9Wlrfy8KYbdE3khD9FmY88ZRB3c6eY3PKcm4kx41bqVF5o+kG59bJ0XaWbTU/T55zUcoKcJFK80x + sFP4/sG+43jcPisVb1QS+V0M1rnFejJs43isxwdpDMZzd9elzd/D0mFzrHOtgQ3Nbwv4PEKh4eKO + /nNhz/F3mxP4+27mw/Rlq8usze53iFpdTpdCz4bwd0Ka0UCqsgn28iYaJvybKFkdRf1AM4LCrpA0 + Q1In/DZBj9M0IEGijXLceke9hJbAPVhZjX37SzQCGKu/grb9AfkD+g2kMVxTYONdAPrP0faMfujD + IHeL+8UQtPQGv6U396Fv6EP9Wl9KEnDGya2Uw4AOdZJ76k7yPGqkvGd5zr4vFXe5wW6y7+2YirOs + rsA1EitCkGPfD1n5QE/Hvhd7+6DvS/F3h+Sev4fz/SD9LqyDLYHbB+m1bpgHcylemU2XII9ZfMbh + Oow14nfAMZoK93jhfhfjYjZVsdu8nB4VcYtR1iaqMudTlZFFN7k2I00ODYDuzxN8h2mR0QW8P8L/ + KXR3I90p8lpDtxlvUonRjVaKeA7j9DOQ5zw7vV6EPL/AWpsMW3Es6GoaL9+fVCpvWUtUxXpZnUY3 + qrnWZr0DDTLzMaY+xfiZhnyuxV71C+AojddfQFiMuL8RcZxG7U/Lzd6IPwg/p0OYvhT2N7v/RrPh + X6z2tzbqX1jVehraGfFae0oUZayg22BfMA+Xt9jMAf0E/n/SeG0Z8mU/xql+ksYbT2GvWCjOPF/X + ulIXt04/Z6B+JRF7aXEwWieL79jGu09/h25E6DhQxtF850wk9O3gWWcTW6iv8jnWXLlu8JsCXfx2 + Auq031rXap11ImKN9aPRGf1iAHI/Z96EuflS2BddUN9xwAjMU70pEbZNrvEYPXiOM5Yz5ntxPvxz + ulM5SFPRP3dChqnOvs74M9baP8DOnIs9DOMK7OsAV6wN3lfwOh2xFXNhEw2PWEBk3kzD3X8G7UXD + Td4jTDybIv9K1K0YlH9jISnoTlD4jVa0TisX92A8b7rMnti3T6B4MwK20SIaHfkolbtjxR1eW6SJ + Mt6HzqUhfg3s5YNApdwbfkrlRjZN4DMTbSfy6EFFAiF3avoW1O1ajAM7vzgnX+z1FmN/vkh7gUoY + +kzUmbES+3MAfZZtDKNS7RF6GH07B+7lfGdoDIC9qWPMd6IByD9anEETPS5+a6IO+XwicYgGiu8l + /Bp74HzopEzjmgo9/yXGBfdDGXUy4tHOp3itsRogtynv91egryONOeh7UF6rMF7H6zvQLg1iHI12 + /JAhXj9knUB+kfIuge/hmMajvHjUl39XIcXYRp2wBmbxHtq4RJyVtBdrLdrf6Ec5Qp6PaZk7CWOF + 33x8DP411reuztBB+8xpGvKawusivyuIuIlU/Yj1d9NFZbpOI1GGS7w5kL/RgTmyu5ZFA9ST1N2c + BP4fxJnVcn0NXSNwiG7i34wAyhnc5wy9Bn0F2x5r14P6HUA76ON09EsvzFGXU0nzudUhSmG5xJ1J + BtpgLbXBfBevfwDsha7tsi51JVqXgnbTr6Jo8dsP/MZuGcWr41C3xdCl/bAfKulhlP9Lc7fIs5T3 + PHKMZF3sWaqWhHUp6bRdGLpmXcT30s44e8Rasxf43j4vafwC7l/I8+Q2gGmj8VqiU734nQncA5AG + Kta4Vn4n5CbtFP0jYh4N4lNr+ffzlqF2ugjMJNLuBPgb3VUY9T8QueOIIu4niqyD9YP4KPijyy6M + mHdstGkNfG8jbsX5EX+YKOETovZfEiXuOo2UDkDgp6NjPVEn8Hsgv/czoi7HiVIlugJpK08jXSXq + 9jxRd9Q3YxlRj8VEmUuJsm4nykGdcw8Q9UR+veKJeufa6PNsGGGEEUYYYYQRRhhhhBFGGGGEEUYY + YYQRRhhhhBFGGGGEEUYYYYQRRhhhhBFGGGGEEUYYYYQRRhhhhBFGGGGEEUYYYYQRRhhhhBFGGGGE + EUYYYYQRxv86FKI2j6nv0AB6hAxSKZZy+Nd1zWL19+Qitag1lWpb+T+1N3Ukj/astgVpPdqWWqOj + Z25RlPYMbQXAiE8vUAVo5NOeqTWj8nx1oHHxggYSMvO2W/Vw9OslwrMfyZu7S6umSdQLwdWBsRxc + Xesbkidor/42zekpaMBtR5vxeZ6iZLDlACrFSNdI4CHgCeAlwIBA1fQ3wAI0bZO2ITDMgxyeRkYx + RfHa06i6D597AQvQIP3TqMvT9LUM0SHVU7URrbn4pwRXivYUuGLwGQvMBbYCewEXTcfnE4AFaHBt + QNwGUrUN2pOBWE9sUaS2nu4FVG0NxSgKeZD7qtpY0Tara2Pa5vmKYrVHqQRQya+NoHpARbbLwbac + VCQvDmT3FE1YXBsZnReL9Isg9CIIsghFVuFTEX4fwOkX1bZN4Ox/FYhpI/juDuTm247a2MS8ErTC + naRo07TbKBVdOge0E+gNoNzVU7SpFCXk9NXGxObNRXmFSF6otaMMRBdpCZQHOkRLphSRrDIQbZdT + GejeIw81HqwliiQxWhTlg7o1M5Dn8e7UfKLx59dGtGL55gdi2+W9qD2gmRSPVHORqr0n5kUtEj0b + KWpSWhsRlbesqLVWimqWolk8kFFBK98mMrotgIyK2mhDtQ6UgLhbtY7UDnSY1knQ32hP0jDQdbXp + HTz1O7WHBdcKzhTFD7RVa2BtVHRefVGENhCxfm0pOmCpKHxZbfqleVSUrnWnXEBFG98L171C6RfC + tRC9thA9tRA9tRBCLeR/L1tbgJgFSJOjzaYZ2h20DHgCblardgE06Hbh6No9b7uWpCWiYWJ3oikV + hCbXRkSzZImBuLYiWWJt6+i8whe1Cuh5BfL0aTNr2yfmTd+p9RBVyapNTGGGGQGo64tae7trwJjA + XfKi1gENwQ3TUesUaOfxF3ngZ0X2kKK+oe7jRlL/rO7n7lb3ws/0TUn3SPq2Ta16dZ89KNR3mDYU + dVA/RWaT1A/oCbhUdaf6CuWC4aBax1Ko76nbqRD0APxTQbeD9gLdEej8mqdOrasFgexrA1EJXFn1 + lUBmjnR40qSjfYp0xCXkFaWpv1dfpg7I4q+gXUFfVuupC+hLoImg9epMeg30Ocxa/UG3SfqquotV + XH1BfZ4uBa0NRLMI/oDJZGvAYPJsgGxfSY5nl/qsWk3JSLolkJ6M0E216V09MTuRn6I+rc4MdPTE + FUWqTyplynEkqqIDTClO3RAo4EyWBXZ5PdvVZeoyX2KBL82X7duo5ablZudu1Lxp3mxvgXejtyhW + XYoJ5AkV41ddhM8C8qrQHsAHLFMXBPQCf1Ej6sT1UmkuPquEazI+ZwgX/7ZXbHPsN8JVqD5AIwEV + ecwB7gXmAveRjs/ZwN3AfwH3iJCZQCVwB2aTGeCYAY4Z4JghOGaAYwY4ZoBjhuCYIUqvBJhjMjgm + g2MyOCYLjsngmAyOyeCYLDhY3sngmCw4SsBRAo4ScJQIjhJwlICjBBwlgqMEHCXgKBEcPnD4wOED + h09w+MDhA4cPHD7B4QOHDxw+wZELjlxw5IIjV3DkgiMXHLngyBUcueDIBUeu4PCCwwsOLzi8gsML + Di84vODwCg4vOLzg8AqOWHDEgiMWHLGCIxYcseCIBUes4IgV/VMJMEcDOBrA0QCOBsHRAI4GcDSA + o0FwNICjARwN6h012r6iP4BlH1j2gWWfYNkHln1g2QeWfYJlH1j2gWWfrPpM0Rgq1GYOcC8wF2De + evDWg7cevPWCt16oVyXAvH5w+MHhB4dfcPjB4QeHHxx+weEHhx8cfsFRBY4qcFSBo0pwVIGjChxV + 4KgSHFVCcSsB5vjpSvmTu0a9TylzY61V5yoZgt5LXwo6hw4Ieg/VCPpftFHQu2meoLOpQNA7KF1Q + 5CfoTPK4lYCnIKYoAVPASGASMB14AmAj6SXAFK69wN8AS+3t66LHmCPNJ8yt5kuma6vZYKoxxkjj + CWOr8ZLh2mo0GKq3KEWNEvMophZ6SHzei8+vASwi+CwUrkI1H+XmY57tjf/y1Xxfm6+8X/dQ9vZQ + XuqhbO2hPNRDKYpQL1d0MdN5qUCF4EqZr3X6QM8BoCC920DMTEuf/7K9J5Dex1On7LJJhi8T9Eug + BtgIzAMKgDwgG0gDPCKsB9KX+brILHcB3YDOgJeLoIQEIopr4/ZtV6OUjbV/iKIILqdbd/DtDHTL + BakLdBsJ8kKg2xRPUYTyPHVjq0h5Dj1XDbo14PkE0Vts8kzAsxNkU8CTD3JtoNslIBMC3fZ4iqKU + seTRmbVU0jGoN9PRAc84JBsV8GSAZAa6pXPqHigoDbEZShl9ApomubraJaUGPP1BugQ8fTm1m7px + xysGZQvxXABTrRYCfb1dKdMVXyvPV56HPV+C/QgaFurxnrdOB9mbVqeM80V6dmWvR+IiT6AoktNj + faiR1M/0Oc/GtAWetchLSXves9pziWdpdp0bwUsg9wJRRMAzz1unVvvaeuZ6cj0zsz/xVHiu9Fzv + Ge25Ng3hAc9Ezy4Wk8qVMrX6eU8JMhyOWqQFPJen1QkRh3nu8vg83Tx9vbu4felSO9+C7F3cApRn + l56F9u2RVsc6PragTmnj62F+Yy4zJ5iDzP5mqtnF7GR2NOPdce5Yd7S7tTvS7XYbbt2tuskdX2c1 + +DIJahtvxDIxdP7UhTtW5U/xrzthqVLcKl1J/rZasVo8ZpBS7K+/gYqneP3fj0mtUyJHjfe7Ugcp + /rhiKi4d5L80s7jOtEb7CzKL/WbJhLIaRVlajlC/Or9OodKyOsXioAdS/HGDEUkPLEnZToqS9MCS + 8nJKTJhVmFgYN7BN32FDzvExWX5mnv5LDHZ29K8sHlPm39yx3J/HDqtjebH/vjHeiWXb1Rg1auiQ + 7Wo0k/Ky7foMNWboaA7XZwwpR7JPRDJoczSSUTcmSOYeRF5OhvlkECdDH9np0sGOdJ2ZIF1kFKWL + dOmRUSKdrnC6mgPeoUNqvF6RJo3ogEhzII2C0kBjwDukJj1dpEr1KmWcSilL9QrBMkRGHg+SZHtE + EgV2ncjIo4jC/Dmnk6TJJL2bk/QWZWnK6TQeO018dydNfHekyfw3/6YNylRqe1bOeWXotNShk1OH + TgMm+xfN+lmif+4Ur7dmTiVHeP1a+uQpN/yM6fXT/JWp04b456QO8db0fOUc0a9wdM/UITX0ytDS + sppXfNOGBHr6eg5NvX5IeW3hgLKiM8pa0FxW2YBzZDaAMyvjsgqLzhFdxNGFXFYRl1XEZRX6CkVZ + Q29mvS8pq3HToPLBE21aq7aKhA5PTulcPighdsZAVujt/TsnzknZoZOyiVpllvtbpw7yRwEclV2U + XcRRGGccFY3gGBmVOKd/55QdyiYZFYvgNqmDyGla4kTF/t6jiv2dx4wvY1Xx+64/d59V8J+ITqSh + Nw/B//DPFMB/wSmp4px/M8/1V1lZWcEflZkVRMX+HmOK/X1GQRLTRFGTh5Qj7BInTNNEWE1ExNA6 + qx6RmRBCmcnFsStTyUQL+iKx6zLVKqPKVHmrMLM2uWPe9Bexgt8LYB+n3hHIEdtn9Y7aLmm8f5lZ + m9PbptiuMg0kd85DCbUFYGWaZlNfm2w4lqUty15WUJVWlV1VYCD0+Y0I9GzkpTSQs1GjmZkVTkPA + ObMcjQ2xuLwnAx06ioKr2JGZWZ5ZoYj2OruxFafRmxu2QuZaIbKf6XSIHV4hM0FP2KVXOmyVkklE + VgomOxPb1/xx+m9mJWfF7YlZ+v8BYpx4mAplbmRzdHJlYW0KZW5kb2JqCnhyZWYKMCA5NgowMDAw + MDAwMDAwIDY1NTM1IGYgCjAwMDAwMDAwMTUgMDAwMDAgbiAKMDAwMDAwMDE4NyAwMDAwMCBuIAow + MDAwMDAwMjc0IDAwMDAwIG4gCjAwMDAwMDA0NzAgMDAwMDAgbiAKMDAwMDAwMDc2MiAwMDAwMCBu + IAowMDAwMDAxMTc4IDAwMDAwIG4gCjAwMDAwMDEyMjEgMDAwMDAgbiAKMDAwMDEwOTcwNSAwMDAw + MCBuIAowMDAwMTA5NzQ4IDAwMDAwIG4gCjAwMDAxMDk5NjggMDAwMDAgbiAKMDAwMDExMTE3MyAw + MDAwMCBuIAowMDAwMTExMzc1IDAwMDAwIG4gCjAwMDAxMTI1NjUgMDAwMDAgbiAKMDAwMDExMzAw + MCAwMDAwMCBuIAowMDAwMTE0MDY1IDAwMDAwIG4gCjAwMDAxMTQxMjMgMDAwMDAgbiAKMDAwMDEx + NDIzOSAwMDAwMCBuIAowMDAwMTE0NDQ2IDAwMDAwIG4gCjAwMDAxMTU2NDAgMDAwMDAgbiAKMDAw + MDExNTg2NCAwMDAwMCBuIAowMDAwMTE2MDg4IDAwMDAwIG4gCjAwMDAxMTYzMTIgMDAwMDAgbiAK + MDAwMDExNjUzMiAwMDAwMCBuIAowMDAwMTE2NzUyIDAwMDAwIG4gCjAwMDAxMTY5NzYgMDAwMDAg + biAKMDAwMDExNzIwMCAwMDAwMCBuIAowMDAwMTE3NDI0IDAwMDAwIG4gCjAwMDAxMTc2NDggMDAw + MDAgbiAKMDAwMDExNzg3MSAwMDAwMCBuIAowMDAwMTE4MDk0IDAwMDAwIG4gCjAwMDAxMTgzMTgg + MDAwMDAgbiAKMDAwMDExODU0MiAwMDAwMCBuIAowMDAwMTE4NzY2IDAwMDAwIG4gCjAwMDAxMTg5 + OTAgMDAwMDAgbiAKMDAwMDExOTIxNCAwMDAwMCBuIAowMDAwMTE5NDM3IDAwMDAwIG4gCjAwMDAx + MTk2NjAgMDAwMDAgbiAKMDAwMDExOTg4NCAwMDAwMCBuIAowMDAwMTIwMTA4IDAwMDAwIG4gCjAw + MDAxMjAzMzIgMDAwMDAgbiAKMDAwMDEyMDU1NiAwMDAwMCBuIAowMDAwMTIwNzc5IDAwMDAwIG4g + CjAwMDAxMjEwMDAgMDAwMDAgbiAKMDAwMDEyMTMyOCAwMDAwMCBuIAowMDAwMTI0MDgwIDAwMDAw + IG4gCjAwMDAxMjQzNzMgMDAwMDAgbiAKMDAwMDEyNDkwNSAwMDAwMCBuIAowMDAwMTI1OTMwIDAw + MDAwIG4gCjAwMDAxMjYyMjMgMDAwMDAgbiAKMDAwMDEyNjc1NSAwMDAwMCBuIAowMDAwMTI3NzQ3 + IDAwMDAwIG4gCjAwMDAxMjgwNDAgMDAwMDAgbiAKMDAwMDEyODU3MiAwMDAwMCBuIAowMDAwMTI5 + Mjc3IDAwMDAwIG4gCjAwMDAxMjk1NzAgMDAwMDAgbiAKMDAwMDEzMDEwMiAwMDAwMCBuIAowMDAw + MTMxMTg1IDAwMDAwIG4gCjAwMDAxMzE1MTMgMDAwMDAgbiAKMDAwMDEzNDMyNCAwMDAwMCBuIAow + MDAwMTM0NTkzIDAwMDAwIG4gCjAwMDAxMzczOTkgMDAwMDAgbiAKMDAwMDEzNzY2OCAwMDAwMCBu + IAowMDAwMTQwMDk5IDAwMDAwIG4gCjAwMDAxNDAzNjggMDAwMDAgbiAKMDAwMDE0Mjc1MyAwMDAw + MCBuIAowMDAwMTQzMDIyIDAwMDAwIG4gCjAwMDAxNDUyODggMDAwMDAgbiAKMDAwMDE0NTU1NyAw + MDAwMCBuIAowMDAwMTQ3OTU2IDAwMDAwIG4gCjAwMDAxNDgyMjUgMDAwMDAgbiAKMDAwMDE1MDc2 + NCAwMDAwMCBuIAowMDAwMTUxMDMzIDAwMDAwIG4gCjAwMDAxNTMwODEgMDAwMDAgbiAKMDAwMDE1 + MzM1MCAwMDAwMCBuIAowMDAwMTU1ODE5IDAwMDAwIG4gCjAwMDAxNTYwODggMDAwMDAgbiAKMDAw + MDE1ODQ2NSAwMDAwMCBuIAowMDAwMTU4NzM0IDAwMDAwIG4gCjAwMDAxNjEzNjggMDAwMDAgbiAK + MDAwMDE2MTYzNyAwMDAwMCBuIAowMDAwMTY0MjUzIDAwMDAwIG4gCjAwMDAxNjQ1MjIgMDAwMDAg + biAKMDAwMDE2NjY2OSAwMDAwMCBuIAowMDAwMTY2OTM4IDAwMDAwIG4gCjAwMDAxNjkxNzcgMDAw + MDAgbiAKMDAwMDE2OTQ0NiAwMDAwMCBuIAowMDAwMTcxODM5IDAwMDAwIG4gCjAwMDAxNzIxMDgg + MDAwMDAgbiAKMDAwMDE3NDc1NiAwMDAwMCBuIAowMDAwMTc1MDI1IDAwMDAwIG4gCjAwMDAxNzc0 + OTUgMDAwMDAgbiAKMDAwMDE3Nzc2NCAwMDAwMCBuIAowMDAwMTc4MzE5IDAwMDAwIG4gCjAwMDAx + OTczMjAgMDAwMDAgbiAKMDAwMDIzODQ2OSAwMDAwMCBuIAp0cmFpbGVyCjw8Ci9JRFs8NDQxODA2 + QTMzNEYwMDU0MUFBMUFGQkIxRUE0NTY0M0Y+PDQ0MTgwNkEzMzRGMDA1NDFBQTFBRkJCMUVBNDU2 + NDNGPl0KL0luZm8gMSAwIFIKL1Jvb3QgMiAwIFIKL1NpemUgOTYKPj4Kc3RhcnR4cmVmCjI2Njkx + NwolJUVPRgo= + headers: + accept-ranges: + - bytes + connection: + - close + content-length: + - '268991' + content-md5: + - ZZ1XMoqpMaa286CbhLAX7g== + content-type: + - application/octet-stream + date: + - Tue, 18 Jun 2024 06:22:15 GMT + etag: + - '"0x8DC8F501D543273"' + last-modified: + - Tue, 18 Jun 2024 04:35:43 GMT + vary: + - Origin + x-azure-ref: + - 20240618T062214Z-168779fcbd6hdg5qk309gcmb7n000000053g000000005196 + x-cache: + - CONFIG_NOCACHE + x-ms-blob-type: + - BlockBlob + x-ms-creation-time: + - Tue, 18 Jun 2024 04:35:43 GMT + x-ms-group: + - $superuser + x-ms-lease-state: + - available + x-ms-lease-status: + - unlocked + x-ms-owner: + - f7cca650-916d-40c2-9d2c-9e72fa7509b4 + x-ms-permissions: + - rw-r----- + x-ms-resource-type: + - file + x-ms-server-encrypted: + - 'true' + x-ms-version: + - '2021-08-06' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report show + Connection: + - keep-alive + ParameterSetName: + - --report-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351","name":"crstatustest-prod-20240617200351","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-17T20:06:17.8922461Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-17T20:06:17.8922461Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-18T23:00:00Z","lastTriggerTime":"2024-06-17T23:03:14.127Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CRStatusRG-prod-20240617200351/providers/Microsoft.Storage/storageAccounts/appprod20240617200351","resourceType":"Microsoft.Storage/storageAccounts","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1174' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:22:17 GMT + mise-correlation-id: + - 8963776b-0626-4375-9acc-070ee3156f90 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062216Z-168779fcbd6wl7k9h0z4vysryw00000001g000000000qqpc + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 8606e19ecb3be4c0e94502ab71880050 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 231F49C1EA624B78AF5CC1721DF76B8D Ref B: TYO201100117009 Ref C: 2024-06-18T06:22:16Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report download + Connection: + - keep-alive + ParameterSetName: + - --report-name --download-type + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots?$skipToken=0&$top=1&api-version=2024-06-27 + response: + body: + string: "{\"value\":[{\"id\":\"/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots/crstatustest-prod-20240617200351-20240617T230307-487Z\",\"name\":\"crstatustest-prod-20240617200351-20240617T230307-487Z\",\"type\":\"Microsoft.AppComplianceAutomation/reports/snapshots\",\"properties\":{\"snapshotName\":\"crstatustest-prod-20240617200351-20240617T230307-487Z\",\"createdAt\":\"2024-06-17T23:03:08.288Z\",\"provisioningState\":\"Succeeded\",\"reportProperties\":{\"timeZone\":\"China + Standard Time\",\"triggerTime\":\"2023-01-08T23:00:00Z\",\"resources\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CRStatusRG-prod-20240617200351/providers/Microsoft.Storage/storageAccounts/appprod20240617200351\",\"resourceType\":\"Microsoft.Storage/storageAccounts\",\"resourceOrigin\":null,\"accountId\":null}],\"status\":\"Active\",\"errors\":[],\"tenantId\":\"72f988bf-86f1-41af-91ab-2d7cd011db47\",\"offerGuid\":\"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf\",\"nextTriggerTime\":\"2024-06-18T23:00:00Z\",\"lastTriggerTime\":\"2024-06-17T23:03:08.194Z\",\"subscriptions\":[\"120b982f-6bd3-4b60-98d2-a7b7ecd6c78e\"],\"complianceStatus\":{\"m365\":{\"passedCount\":1,\"failedCount\":37,\"manualCount\":0,\"notApplicableCount\":6,\"pendingCount\":1}},\"provisioningState\":\"Succeeded\"},\"reportSystemData\":{\"createdBy\":\"\",\"createdByType\":\"User\",\"createdAt\":\"2024-06-17T20:06:17.8922461Z\",\"lastModifiedBy\":\"\",\"lastModifiedByType\":\"User\",\"lastModifiedAt\":\"2024-06-17T20:06:17.8922461Z\"},\"complianceResults\":[{\"complianceName\":\"M365\",\"categories\":[{\"categoryName\":\"Operational + Security\",\"categoryStatus\":\"Failed\",\"controlFamilies\":[{\"controlFamilyName\":\"Awareness + Training\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_1\",\"controlName\":\"Provide + evidence of established security awareness training, frequency and records + monitoring for all information system users\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The organization provides established security awareness + training to information system users (including managers, senior executives, + and contractors) :
(i) As part of initial training for new users
OR
(ii) + When required by information system changes

B) You have organization-defined + frequency of awareness training

C) You document and monitor individual + information system security awareness activites and retain individual training + records over an organization-defined frequency

\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control1\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that you have established security awareness training + to information system users\",\"responsibilityDescription\":\"Provide evidence + that:

A) The organization provides established security awareness training + to information system users (including managers, senior executives, and contractors):
+ (i) As part of initial training for new users
OR
(ii) When required + by information system changes

B) Organization-defined frequency of + awareness training.

C) Documents and monitors individual information + system security awareness activities and retains individual training records + over an organization-defined frequency.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-awareness-training\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Malware + Protection - Anti-Malware\",\"controlFamilyStatus\":\"NotApplicable\",\"controls\":[{\"controlId\":\"Operational_Security_2\",\"controlName\":\"Provide + evidence of active anti-malware solution meeting specific criteria including + on-access scanning and blocking capabilities\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that your anti-malware solution is active and enabled across all + the sampled system components and configured to meet the following criteria:

A) + If Anti Virus, then on-access scanning is enabled and that signatures are + up-to-date within 1-day

B) If Anti Virus, then it automatically blocks + malware or alerts and quarantines when malware is detected

OR

C) + If Endpoint Detection and Threat Response(EDTR)/Endpoint Detection and Protection + Response(EDPR)/Hueristic based scanning using AI then:
(i) periodic scanning + is being performed
(ii) it is generating audit logs
(iii) it is kept + up-to date continually and has self-learning capabilities

D) If EDTR/EDPR/Hueristic + based scanning using AI then:
(i) it blocks known malware
(ii) it identifies + and blocks new malware variants based on macro behaviours as well as having + full safelist capabilities\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control2\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"antivirus_software_or_ms_defender_should_be_enabled\",\"responsibilityTitle\":\"Antivirus + software or Microsoft Defender should be enabled\",\"responsibilityDescription\":\"This + control monitors if Antivirus software or Microsoft Defender is be enabled.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op2_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-antivirus-software\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Malware + Protection - Application Control\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_3\",\"controlName\":\"Provide + evidence of approved software list and active application control technology + with configuration documentation\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that the following controls are in place:

A) You have an approved + list of software/applications with business justification that:

(i) + exists and is kept up to date
(ii) each application undergoes an approval + process and sign off prior to its deployment

B) That application control + technology is active, enabled, and configured across all the sampled system + components as documented\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control3\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_3_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence of approved software list and active application control + technology with configuration documentation\",\"responsibilityDescription\":\"Provide + evidence that the following controls are in place:

A) You have an approved + list of software/applications with business justification that:
(i) exists + and is kept up to date
(ii) each application undergoes an approval process + and sign off prior to its deployment

B) That application control technology + is active, enabled, and configured across all the sampled system components + as documented\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-approval-process-for-applications\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Patch + Management - Patching & Risk Ranking\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_4\",\"controlName\":\"Provide + evidence of comprehensive patch management documentation including patch windows, + decommissioning of unsupported OS/software, and vulnerability identification\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:
A) Patch management policy and procedure documentation defines + all of the following:

i) suitable minimal patching window/s from vendor + patch release or from when coding vulnerabilities are first identified for + Critical/High and Medium risks vulnerabilities.
ii) decommissioning of + unsupported operating systems and software
(ii) details on how new security + vulnerabilities are identified and assigned a risk score\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control4\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_4_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence of comprehensive patch management documentation including + patch windows, decommissioning, and vulnerability identification\",\"responsibilityDescription\":\"Provide + evidence that:

A) Patch management policy and procedure documentation + defines all of the following:
(i) suitable minimal patching window/s from + vendor patch release or from when coding vulnerabilities are first identified + for Critical/High and Medium risks vulnerabilities.
(ii) decommissioning + of unsupported operating systems and software
(iii) details on how new + security vulnerabilities are identified and assigned a risk score\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-minimal-patching-windows\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_5\",\"controlName\":\"Provide + demonstratable evidence that all sampled system components are being patched + and unsupported OS and software components are not in use\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) All sampled system components are being patched
B) + Unsupported operating systems and software components are not in use

Where + applicable this should include code base if serverless technology or PaaS + is used, or both infrastructure and code base if IaaS is used\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control5\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_5_3_manual_cr_aws\",\"responsibilityTitle\":\"Provide + demonstratable evidence that historical patching operations of AWS EC2 instances + are within the minimum patching window\",\"responsibilityDescription\":\"Provide + demonstratable evidence that historical patching operation of AWS EC2 instances + are within the minimum patching window.
The minimal patching timeframe + is:
- Critical severity (14 days),
- High severity (30 days),
+ - Medium severity (60 days).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-unsupported-operating-systems-and-software\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_5_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that unsupported operating systems and software components + are not in use for Azure Virtual Machines\",\"responsibilityDescription\":\"Provide + demonstratable evidence that unsupported operating systems and software components + are not in use for Azure Virtual Machines.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-unsupported-operating-systems-and-software\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_5_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence to show all the software are being patched\",\"responsibilityDescription\":\"Provide + demonstratable evidence to show all sampled system components are being patched.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-software-list-and-patching\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Vulnerability + Scanning\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_6\",\"controlName\":\"Provide + evidence of quarterly infrastructure and web vulnerability scanning is carried + out against public and internal IPs/URLs\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Quarterly infrastructure and web application vulnerability + scanning is carried out.

(If Hybrid, On-prem or IaaS: This needs + to be carried out against the public footprint (IPs/URLs) and internal IP + ranges OR
If PaaS: This needs to be carried out on external infratructure + and web assessment only).

(Must include the full scope of the environment)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control6\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"azure_defender_for_app_service_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for App Service should be enabled\",\"responsibilityDescription\":\"Azure + Defender for App Service leverages the scale of the cloud, and the visibility + that Azure has as a cloud provider, to monitor for common web app attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-app-service\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_azure_sql_database_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Azure SQL Database servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-database-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Key Vault should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Key Vault provides an additional layer of protection and security + intelligence by detecting unusual and potentially harmful attempts to access + or exploit key vault accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_resource_manager_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Resource Manager should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Resource Manager automatically monitors the resource management + operations in your organization. Azure Defender detects threats and alerts + you about suspicious activity. Learn more about the capabilities of Azure + Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling + this Azure Defender plan results in charges. Learn about the pricing details + per region on Security Center's pricing page: https://aka.ms/pricing-security-center .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-resource-manager\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for servers provides real-time threat protection for server workloads + and generates hardening recommendations as well as alerts about suspicious + activities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_servers_on_machines_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for SQL servers on machines should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-on-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_should_be_enabled_for_unprotected_sql_managed_instances\",\"responsibilityTitle\":\"Azure + Defender for SQL should be enabled for unprotected SQL Managed Instances\",\"responsibilityDescription\":\"Audit + each SQL Managed Instance without advanced data security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"microsoft_defender_for_containers_should_be_enabled\",\"responsibilityTitle\":\"Microsoft + Defender for Containers should be enabled\",\"responsibilityDescription\":\"Microsoft + Defender for Containers provides hardening, vulnerability assessment and run-time + protections for your Azure, hybrid, and multi-cloud Kubernetes environments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-containers\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_7\",\"controlName\":\"Provide + evidence that remediation of all vulnerabilities identified in Control 6 are + patched in line with the minimal patching window defined in your policy\",\"controlFullName\":\"\",\"controlDescription\":\" + Provide rescan evidence that:

A) Remediation of all vulnerabilities + identified in control 6 are patched inline with the minimal patching window + defined in your policy\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control7\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"validate_that_vulnerabilities_remediation_are_patched_inline_with_the_minimal_patching_window\",\"responsibilityTitle\":\"Validate + that vulnerabilities remediation for Azure resources are patched inline with + the minimal patching window\",\"responsibilityDescription\":\"This policy + validates that vulnerabilities remediation for Azure resources are patched + inline with the minimal patching window. The minimal patching timeframe is: + Critical severity(3 business days), High severity(7 business days), Medium + severity(28 business days), Low severity(60 business days), other severity(90 + business days).\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":1,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"Microsoft.Resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Unhealthy\",\"resourceStatusChangeDate\":\"2023-12-25T08:09:12.7230376Z\",\"recommendationIds\":[\"validate-that-vulnerabilities-remediation-are-patched-inline-with-the-minimal-patching-window\"]}],\"recommendationList\":[{\"recommendationId\":\"validate-that-vulnerabilities-remediation-are-patched-inline-with-the-minimal-patching-window\",\"recommendationShortName\":\"Vulnerabilities + not patch in time\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op7_1\",\"recommendationSolutionContent\":\"1. + Go to the https://portal.azure.com/#view/HubsExtension/ArgQueryBlade/resourceType/Microsoft.Resources%2FResources +
2. Run query 'securityresources| where type == 'microsoft.security/assessments' + and properties.status.code != 'Healthy' '.
3. Please fix your vulnerabilities + in the specified period following the specific remediation steps. The patching + timeframe is: Critical severity (14 days), High severity (30 days), Medium + severity (60 days)\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-vulnerabilities-patching-validation-azure\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Network + Security Controls (NSC)\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_8\",\"controlName\":\"Provide + evidence of NSC installation on the in-scope boundary and public access termination + at perimeter network\",\"controlFullName\":\"\",\"controlDescription\":\"
Provide + evidence that:

A) Network Secuirtiy Controls (NSC) are installed + on the boundary of the in-scope environment, and installed between the perimeter + network and internal networks

AND if Hybrid, On-prem, IaaS also provide + evidence that:

B) all public access terminates at the perimeter network\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control8\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"preview_all_internet_traffic_should_be_routed_via_your_deployed_azure_firewall\",\"responsibilityTitle\":\"[Preview]: + All Internet traffic should be routed via your deployed Azure Firewall\",\"responsibilityDescription\":\"Azure + Security Center has identified that some of your subnets aren't protected + with a next generation firewall. Protect your subnets from potential threats + by restricting access to them with Azure Firewall or a supported next generation + firewall.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-firewall-internet-traffic-routing\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_azure_key_vault_should_disable_public_network_access\",\"responsibilityTitle\":\"[Preview]: + Azure Key Vault should disable public network access\",\"responsibilityDescription\":\"Disable + public network access for your key vault so that it's not accessible over + the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-key-vault-disable-public-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"adaptive_network_hardening_recommendations_should_be_applied_on_internet_facing_virtual_machines\",\"responsibilityTitle\":\"Adaptive + network hardening recommendations should be applied on internet facing virtual + machines\",\"responsibilityDescription\":\"Azure Security Center analyzes + the traffic patterns of Internet facing virtual machines and provides Network + Security Group rule recommendations that reduce the potential attack surface.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-network-harden-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"api_management_services_should_use_a_virtual_network\",\"responsibilityTitle\":\"API + Management services should use a virtual network\",\"responsibilityDescription\":\"Azure + Virtual Network deployment provides enhanced security, isolation and allows + you to place your API Management service in a non-internet routable network + that you control access to. These networks can then be connected to your on-premises + networks using various VPN technologies, which enables access to your backend + services within the network and/or on-premises. The developer portal and API + gateway, can be configured to be accessible either from the Internet or only + within the virtual network.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-api-mgmt-vnet\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"authorized_ip_ranges_should_be_defined_on_kubernetes_services\",\"responsibilityTitle\":\"Authorized + IP ranges should be defined on Kubernetes Services\",\"responsibilityDescription\":\"Restrict + access to the Kubernetes Service Management API by granting API access only + to IP addresses in specific ranges. It is recommended to limit access to authorized + IP ranges to ensure that only applications from allowed networks can access + the cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-kubernetes-authorized-ip-ranges\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_cosmos_db_accounts_should_have_firewall_rules\",\"responsibilityTitle\":\"Azure + Cosmos DB accounts should have firewall rules\",\"responsibilityDescription\":\"Firewall + rules should be defined on your Azure Cosmos DB accounts to prevent traffic + from unauthorized sources. Accounts that have at least one IP rule defined + with the virtual network filter enabled are deemed compliant. Accounts disabling + public access are also deemed compliant.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmos-db-firewall-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_ddos_protection_standard_should_be_enabled\",\"responsibilityTitle\":\"Azure + DDoS Protection Standard should be enabled\",\"responsibilityDescription\":\"DDoS + protection standard should be enabled for all virtual networks with a subnet + that is part of an application gateway with a public IP.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-ddos-protection\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_web_application_firewall_should_be_enabled_for_azure_front_door_entry_points\",\"responsibilityTitle\":\"Azure + Web Application Firewall should be enabled for Azure Front Door entry-points\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-front-door-entry-points\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_disable_public_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should disable public network access\",\"responsibilityDescription\":\"Disabling + public network access improves security by ensuring that Cognitive Services + account isn't exposed on the public internet. Creating private endpoints can + limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-disable-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_restrict_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should restrict network access\",\"responsibilityDescription\":\"Network + access to Cognitive Services accounts should be restricted. Configure network + rules so only applications from allowed networks can access the Cognitive + Services account. To allow connections from specific internet or on-premises + clients, access can be granted to traffic from specific Azure virtual networks + or to public internet IP address ranges.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_registries_should_not_allow_unrestricted_network_access\",\"responsibilityTitle\":\"Container + registries should not allow unrestricted network access\",\"responsibilityDescription\":\"Azure + container registries by default accept connections over the internet from + hosts on any network. To protect your registries from potential threats, allow + access from only specific public IP addresses or address ranges. If your registry + doesn't have an IP/firewall rule or a configured virtual network, it will + appear in the unhealthy resources. Learn more about Container Registry network + rules here: https://aka.ms/acr/portal/public-network + and here https://aka.ms/acr/vnet + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-container-registry-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"internet_facing_virtual_machines_should_be_protected_with_network_security_groups\",\"responsibilityTitle\":\"Internet-facing + virtual machines should be protected with network security groups\",\"responsibilityDescription\":\"Protect + your virtual machines from potential threats by restricting access to them + with network security groups (NSG). Learn more about controlling traffic with + NSGs at https://aka.ms/nsg-doc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-vm-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ip_forwarding_on_your_virtual_machine_should_be_disabled\",\"responsibilityTitle\":\"IP + Forwarding on your virtual machine should be disabled\",\"responsibilityDescription\":\"Enabling + IP forwarding on a virtual machine's NIC allows the machine to receive traffic + addressed to other destinations. IP forwarding is rarely required (e.g., when + using the VM as a network virtual appliance), and therefore, this should be + reviewed by the network security team.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-ip-forwarding-disable-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_of_virtual_machines_should_be_protected_with_just_in_time_network_access_control\",\"responsibilityTitle\":\"Management + ports of virtual machines should be protected with just-in-time network access + control\",\"responsibilityDescription\":\"Possible network Just In Time (JIT) + access will be monitored by Azure Security Center as recommendations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-jit-network-access-control\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_should_be_closed_on_your_virtual_machines\",\"responsibilityTitle\":\"Management + ports should be closed on your virtual machines\",\"responsibilityDescription\":\"Open + remote management ports are exposing your VM to a high level of risk from + Internet-based attacks. These attacks attempt to brute force credentials to + gain admin access to the machine.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-close-vm-management-ports\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_on_azure_sql_database_should_be_disabled\",\"responsibilityTitle\":\"Public + network access on Azure SQL Database should be disabled\",\"responsibilityDescription\":\"Disabling + the public network access property improves security by ensuring your Azure + SQL Database can only be accessed from a private endpoint. This configuration + denies all logins that match IP or virtual network based firewall rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-db-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mariadb_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MariaDB servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MariaDB can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mariadb-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mysql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MySQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MySQL can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_postgresql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for PostgreSQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for PostgreSQL can only be accessed from a private endpoint. This + configuration disables access from any public address space outside of Azure + IP range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_restrict_network_access_using_virtual_network_rules\",\"responsibilityTitle\":\"Storage + accounts should restrict network access using virtual network rules\",\"responsibilityDescription\":\"Protect + your storage accounts from potential threats using virtual network rules as + a preferred method instead of IP-based filtering. Disabling IP-based filtering + prevents public IPs from accessing your storage accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-accounts-vnet-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"subnets_should_be_associated_with_a_network_security_group\",\"responsibilityTitle\":\"Subnets + should be associated with a Network Security Group\",\"responsibilityDescription\":\"Protect + your subnet from potential threats by restricting access to it with a Network + Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules + that allow or deny network traffic to your subnet.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-subnets-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"web_application_firewall_waf_should_be_enabled_for_application_gateway\",\"responsibilityTitle\":\"Web + Application Firewall (WAF) should be enabled for Application Gateway\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-application-gateway\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_9\",\"controlName\":\"Provide + evidence of proper configuration and regular review of Network Security Control + rules\",\"controlFullName\":\"\",\"controlDescription\":\"Validate that:

A) + all Network Security Controls (NSC) are configured to drop traffic not explicitly + defined within the rule base

B) Network Security Controls (NSC) rule + reviews are carried out at least every 6 months\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control9\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_9_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that you are performing firewall rule reviews at least + every 6 months\",\"responsibilityDescription\":\"Any evidence provided needs + to be able to demonstrate that rule review meetings have been occurring. This + can be done by sharing meeting minutes of the NSC review and any additional + change control evidence that shows any actions taken from the review. Please + ensure that dates are present as the certification analyst reviewing your + submission would need to see a minimum of two of these meetings review documents + (i.e., every six months).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-configuration-creep\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_all_internet_traffic_should_be_routed_via_your_deployed_azure_firewall\",\"responsibilityTitle\":\"[Preview]: + All Internet traffic should be routed via your deployed Azure Firewall\",\"responsibilityDescription\":\"Azure + Security Center has identified that some of your subnets aren't protected + with a next generation firewall. Protect your subnets from potential threats + by restricting access to them with Azure Firewall or a supported next generation + firewall.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-firewall-internet-traffic-routing\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_azure_key_vault_should_disable_public_network_access\",\"responsibilityTitle\":\"[Preview]: + Azure Key Vault should disable public network access\",\"responsibilityDescription\":\"Disable + public network access for your key vault so that it's not accessible over + the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-key-vault-disable-public-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"adaptive_network_hardening_recommendations_should_be_applied_on_internet_facing_virtual_machines\",\"responsibilityTitle\":\"Adaptive + network hardening recommendations should be applied on internet facing virtual + machines\",\"responsibilityDescription\":\"Azure Security Center analyzes + the traffic patterns of Internet facing virtual machines and provides Network + Security Group rule recommendations that reduce the potential attack surface.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-network-harden-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"api_management_services_should_use_a_virtual_network\",\"responsibilityTitle\":\"API + Management services should use a virtual network\",\"responsibilityDescription\":\"Azure + Virtual Network deployment provides enhanced security, isolation and allows + you to place your API Management service in a non-internet routable network + that you control access to. These networks can then be connected to your on-premises + networks using various VPN technologies, which enables access to your backend + services within the network and/or on-premises. The developer portal and API + gateway, can be configured to be accessible either from the Internet or only + within the virtual network.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-api-mgmt-vnet\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"authorized_ip_ranges_should_be_defined_on_kubernetes_services\",\"responsibilityTitle\":\"Authorized + IP ranges should be defined on Kubernetes Services\",\"responsibilityDescription\":\"Restrict + access to the Kubernetes Service Management API by granting API access only + to IP addresses in specific ranges. It is recommended to limit access to authorized + IP ranges to ensure that only applications from allowed networks can access + the cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-kubernetes-authorized-ip-ranges\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_cosmos_db_accounts_should_have_firewall_rules\",\"responsibilityTitle\":\"Azure + Cosmos DB accounts should have firewall rules\",\"responsibilityDescription\":\"Firewall + rules should be defined on your Azure Cosmos DB accounts to prevent traffic + from unauthorized sources. Accounts that have at least one IP rule defined + with the virtual network filter enabled are deemed compliant. Accounts disabling + public access are also deemed compliant.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmos-db-firewall-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_ddos_protection_standard_should_be_enabled\",\"responsibilityTitle\":\"Azure + DDoS Protection Standard should be enabled\",\"responsibilityDescription\":\"DDoS + protection standard should be enabled for all virtual networks with a subnet + that is part of an application gateway with a public IP.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-ddos-protection\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_web_application_firewall_should_be_enabled_for_azure_front_door_entry_points\",\"responsibilityTitle\":\"Azure + Web Application Firewall should be enabled for Azure Front Door entry-points\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-front-door-entry-points\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_disable_public_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should disable public network access\",\"responsibilityDescription\":\"Disabling + public network access improves security by ensuring that Cognitive Services + account isn't exposed on the public internet. Creating private endpoints can + limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-disable-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_restrict_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should restrict network access\",\"responsibilityDescription\":\"Network + access to Cognitive Services accounts should be restricted. Configure network + rules so only applications from allowed networks can access the Cognitive + Services account. To allow connections from specific internet or on-premises + clients, access can be granted to traffic from specific Azure virtual networks + or to public internet IP address ranges.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_registries_should_not_allow_unrestricted_network_access\",\"responsibilityTitle\":\"Container + registries should not allow unrestricted network access\",\"responsibilityDescription\":\"Azure + container registries by default accept connections over the internet from + hosts on any network. To protect your registries from potential threats, allow + access from only specific public IP addresses or address ranges. If your registry + doesn't have an IP/firewall rule or a configured virtual network, it will + appear in the unhealthy resources. Learn more about Container Registry network + rules here: https://aka.ms/acr/portal/public-network + and here https://aka.ms/acr/vnet + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-container-registry-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"internet_facing_virtual_machines_should_be_protected_with_network_security_groups\",\"responsibilityTitle\":\"Internet-facing + virtual machines should be protected with network security groups\",\"responsibilityDescription\":\"Protect + your virtual machines from potential threats by restricting access to them + with network security groups (NSG). Learn more about controlling traffic with + NSGs at https://aka.ms/nsg-doc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-vm-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ip_forwarding_on_your_virtual_machine_should_be_disabled\",\"responsibilityTitle\":\"IP + Forwarding on your virtual machine should be disabled\",\"responsibilityDescription\":\"Enabling + IP forwarding on a virtual machine's NIC allows the machine to receive traffic + addressed to other destinations. IP forwarding is rarely required (e.g., when + using the VM as a network virtual appliance), and therefore, this should be + reviewed by the network security team.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-ip-forwarding-disable-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_of_virtual_machines_should_be_protected_with_just_in_time_network_access_control\",\"responsibilityTitle\":\"Management + ports of virtual machines should be protected with just-in-time network access + control\",\"responsibilityDescription\":\"Possible network Just In Time (JIT) + access will be monitored by Azure Security Center as recommendations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-jit-network-access-control\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_should_be_closed_on_your_virtual_machines\",\"responsibilityTitle\":\"Management + ports should be closed on your virtual machines\",\"responsibilityDescription\":\"Open + remote management ports are exposing your VM to a high level of risk from + Internet-based attacks. These attacks attempt to brute force credentials to + gain admin access to the machine.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-close-vm-management-ports\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_on_azure_sql_database_should_be_disabled\",\"responsibilityTitle\":\"Public + network access on Azure SQL Database should be disabled\",\"responsibilityDescription\":\"Disabling + the public network access property improves security by ensuring your Azure + SQL Database can only be accessed from a private endpoint. This configuration + denies all logins that match IP or virtual network based firewall rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-db-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mariadb_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MariaDB servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MariaDB can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mariadb-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mysql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MySQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MySQL can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_postgresql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for PostgreSQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for PostgreSQL can only be accessed from a private endpoint. This + configuration disables access from any public address space outside of Azure + IP range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_restrict_network_access_using_virtual_network_rules\",\"responsibilityTitle\":\"Storage + accounts should restrict network access using virtual network rules\",\"responsibilityDescription\":\"Protect + your storage accounts from potential threats using virtual network rules as + a preferred method instead of IP-based filtering. Disabling IP-based filtering + prevents public IPs from accessing your storage accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-accounts-vnet-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"subnets_should_be_associated_with_a_network_security_group\",\"responsibilityTitle\":\"Subnets + should be associated with a Network Security Group\",\"responsibilityDescription\":\"Protect + your subnet from potential threats by restricting access to it with a Network + Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules + that allow or deny network traffic to your subnet.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-subnets-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"web_application_firewall_waf_should_be_enabled_for_application_gateway\",\"responsibilityTitle\":\"Web + Application Firewall (WAF) should be enabled for Application Gateway\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-application-gateway\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Change + Control\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_10\",\"controlName\":\"Provide + evidence of documented change requests with impact, back-out procedures, testing, + and approvers\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Any changes introduced to production environments + are implemented through documented change requests which contain:
(i) + impact of the change
(ii) details of back-out procedures
(iii) testing + to be carried out
(iv) review and approval by authorised personnel


\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control10\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_10_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that any changes introduced to production environments + are implemented through documented change requests\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Any changes introduced to production + environments are implemented through documented change requests which contain:
(i) + Impact of the change.
(ii) Details of back-out procedures.
(iii) Testing + to be carried out.
(iv) eview and approval by authorized personnel.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-change-control-policies\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_11\",\"controlName\":\"Provide + evidence of separate environments and access controls enforcing separation + of duties and data protection\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Separate environments exist so that:

(i) development + and test/staging environments enforce separation of duties from the production + environment
(ii) separation of duties is enforced via access controls
(iii) + sensitive production data is not in use within the development or test/staging + environments\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control11\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_11_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that development and test environments enforce separation + of duties and sensitive data from the production environment\",\"responsibilityDescription\":\"Please + provide evidence:

Separate environments exist so that:
(i) Development + and test/staging environments enforce separation of duties from the production + environment.
(ii) Sensitive production data is not in use within the development + or test/staging environments.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-separation-of-environments\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_11_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that separation of duties is enforced via environment + access controls\",\"responsibilityDescription\":\"Please provide evidence + that:

Separate environments exist so that separation of duties is enforced + via access controls.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-avoid-sensitive-data\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Secure + Software Development/Deployment\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_12\",\"controlName\":\"Provide + evidence of secure software development documentation and developer training + on secure coding annually\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists and is maintained that:

(i) + supports the development of secure software and includes industry standards + and/or best practices for secure coding, such asOpen Web Application Security + Project (OWASP) Top 10 or SysAdmin, Audit, Network and Security (SANS) Top + 25 Common Weakness Enumeration (CWE)
(ii) developers undergo relevant secure + coding and secure software development training annually
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control12\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_12_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that support secure software development and deployment, + and developers undergo secure software development training annually\",\"responsibilityDescription\":\"Please + provide evidence demonstrating documentation exists and is maintained that:

(i) + Supports the development of secure software and includes industry standards + and/or best practices for secure coding, such as OWASP Top 10 or SANS Top + 25 CWE.
(ii) Developers undergo relevant secure coding and secure software + development training annually.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-software-development\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_13\",\"controlName\":\"Provide + evidence of secure code repository with code review, access controls, MFA + and reviewed production deployment\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Code repositories are secured so that:

(i) + all code changes undergo a review and approval process by a second reviewer + prior to being merged with main branch
(ii) appropriate access controls + are in place
(iii) all access is enforced through multi-factor authentication + (MFA)

B) All releases made into the production environment(s) are reviewed + and approved prior to their deployment\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control13\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"github_has_force_push_disabled\",\"responsibilityTitle\":\"GitHub + repositories should have force pushes to default branch disabled\",\"responsibilityDescription\":\"As + part of evidence for code change should undergo review process, GitHub should + have force push for default branch disabled. This auto checkpoint needs to + establish a GitHub connector created by GitHub Enterprise Cloud account.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"github_has_default_branch_protection_policy\",\"responsibilityTitle\":\"GitHub + repositories should have protection policies for default branch enabled\",\"responsibilityDescription\":\"As + part of evidence for code change should undergo review process, GitHub should + have default branch protection policy enabled. This auto checkpoint needs + to establish a GitHub connector created by GitHub Enterprise Cloud account.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"github_has_auto_mfa_enforcement\",\"responsibilityTitle\":\"MFA + is enforced by GitHub for accounts with contributions\",\"responsibilityDescription\":\"Since + end of 2023, MFA is mandatory for accounts identified as contributors to GitHub.com + according to this announcement .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op13_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-github-mfa-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_13_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that code changes and releases undergo a review, access + controls are inplace, access is enforced through MFA\",\"responsibilityDescription\":\"Please + provide evidence that code repositories are secured so that:

(i) All + code changes undergo a review and approval process by a second reviewer prior + to being merged with main branch.
(ii) Appropriate access controls are + in place.
(iii) All access is enforced through multi-factor authentication + (MFA).
(iv) All releases made into the production environment(s) are reviewed + and approved prior to their deployment.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Account + Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_14\",\"controlName\":\"Provide + evidence of disabled, removed, or changed default credentials and hardened + service accounts processes\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) default credentials are either disabled, removed, + or changed across the sampled system components

B) a process is in + place to secure (harden) service accounts and that this process has been followed\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control14\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_14_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a process is in place to secure (harden) service + accounts and that this process has been followed\",\"responsibilityDescription\":\"Provide + evidence that:

A process is in place to secure (harden) service accounts + and that this process has been followed.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-service-accounts-will-often-be-targeted\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"there_is_no_default_credential_in_azure\",\"responsibilityTitle\":\"There + is no default credential in Azure\",\"responsibilityDescription\":\"It is + mandatory on Azure to create username and set password for Azure accounts. + There is no default credential which can be used to login to Azure directly. + If ISV uses Azure's service, this policy will pass directly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op14_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op14_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-default-credential\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_15\",\"controlName\":\"Provide + evidence of user account management, password policy, and regular account + disabling/deletion process\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Unique user accounts are issued to all users

B) + User least privilege principles are being followed within the environment

C) + A strong password/ pass phrase policy or other suitable mitigations are in + place

D) A process is in place and followed at least every three months + to either disabled or deleted accounts not used within three months\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control15\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"azure_password_policy_can_fulfill_this_requirement\",\"responsibilityTitle\":\"Azure + password policy can fulfill this requirement\",\"responsibilityDescription\":\"It + is mandatory on Azure to set strong password for Azure accounts. If ISV uses + Azure's service, this policy will pass directly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op15_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op15_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-password-policy-can-fulfill-this-requirement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_15_manual_cr\",\"responsibilityTitle\":\"Provide + evidence of user account management, privilege principles are being followed, + password policy, and regular account disabling/deletion process\",\"responsibilityDescription\":\"Provide + evidence that:

(i) Unique user accounts are issued to all users.
(ii) + User least privilege principles are being followed within the environment.
(iii) + A process is in place and followed at least every three months to either disable + or delete accounts not used within 3 months.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-provide-evidence-of-user-account-management\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_16\",\"controlName\":\"Provide + evidence of MFA configuration for all remote access and administrative interfaces\",\"controlFullName\":\"\",\"controlDescription\":\"Validate + that MFA is configured for all remote access connections and all non-console + administrative interfaces, including access to any code repositories and Cloud + management interfaces\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control16\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_16_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that remote access, non-console administrative interface, + code repo are secured with multi-factor authentication (MFA)\",\"responsibilityDescription\":\"Validate + that multi-factor authentication (MFA) is configured for all remote access + connections and all non-console administrative interfaces, including access + to any code repositories and Cloud management interfaces.

Meaning of + these terms:
(i) Remote Access \u2013 This refers to technologies used + to access the supporting environment. For example, Remote Access IPSec VPN, + SSL VPN or Jumpbox/Bastian Host.
(ii) Non-console Administrative Interfaces + \u2013 This refers to the network administrative connections to system components. + This could be over Remote Desktop, SSH or a web interface.
(iii) Code + Repositories \u2013 The code base of the app needs to be protected against + malicious modification which could introduce malware into the app. MFA needs + to be configured on the code repositories.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_on_accounts_with_owner_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with owner permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + owner permissions to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_accounts_with_write_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with read permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + write privileges to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_on_accounts_with_read_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with write permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + write privileges to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Security + Event Logging, Reviewing and Alerting\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_17\",\"controlName\":\"Provide + evidence of properly set up security event logging for user and system activity\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that security event logging is setup across the inscope environment + to log events where applicable such as:

A) User/s access to system + components and the application
B) All actions taken by a high-privileged + user
C) Invalid logical access attempts
D) Privileged account creation + / modification
E) Event log tampering
F) Disabling of security tools + (example: event logging)
G) Anti-Malware logging (example: updates, malware + detection, scan failures)
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control17\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"preview_azure_arc_enabled_kubernetes_clusters_should_have_azure_defender_extension_installed\",\"responsibilityTitle\":\"[Preview]: + Azure Arc enabled Kubernetes clusters should have Azure Defender's extension + installed\",\"responsibilityDescription\":\"Azure Defender's extension for + Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. + The extension collects data from nodes in the cluster and sends it to the + Azure Defender for Kubernetes backend in the cloud for further analysis. Learn + more in https://docs.microsoft.com/azure/security-center/defender-for-kubernetes-azure-arc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-defender-extension\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_logs_in_app_services_should_be_enabled\",\"responsibilityTitle\":\"App + Service logs in App Services should be enabled\",\"responsibilityDescription\":\"Audit + enabling of app service logs on the app. This enables you to recreate activity + trails for investigation purposes if a security incident occurs or your network + is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-app-service-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"auditing_on_sql_server_should_be_enabled\",\"responsibilityTitle\":\"Auditing + on SQL server should be enabled\",\"responsibilityDescription\":\"Auditing + on your SQL Server should be enabled to track database activities across all + databases on the server and save them in an audit log.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-auditing-on-sql-server\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_application_gateway_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Application Gateway should have Resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Application Gateway (plus WAF) and stream to a Log + Analytics workspace. Get detailed visibility into inbound web traffic and + actions taken to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-gateway-enable-resource-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_app_service_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for App Service should be enabled\",\"responsibilityDescription\":\"Azure + Defender for App Service leverages the scale of the cloud, and the visibility + that Azure has as a cloud provider, to monitor for common web app attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-app-service\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_azure_sql_database_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Azure SQL Database servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-database-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Key Vault should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Key Vault provides an additional layer of protection and security + intelligence by detecting unusual and potentially harmful attempts to access + or exploit key vault accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_resource_manager_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Resource Manager should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Resource Manager automatically monitors the resource management + operations in your organization. Azure Defender detects threats and alerts + you about suspicious activity. Learn more about the capabilities of Azure + Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling + this Azure Defender plan results in charges. Learn about the pricing details + per region on Security Center's pricing page: https://aka.ms/pricing-security-center .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-resource-manager\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for servers provides real-time threat protection for server workloads + and generates hardening recommendations as well as alerts about suspicious + activities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_servers_on_machines_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for SQL servers on machines should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-on-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_should_be_enabled_for_unprotected_sql_managed_instances\",\"responsibilityTitle\":\"Azure + Defender for SQL should be enabled for unprotected SQL Managed Instances\",\"responsibilityDescription\":\"Audit + each SQL Managed Instance without advanced data security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_front_door_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Front Door should have Resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Front Door (plus WAF) and stream to a Log Analytics + workspace. Get detailed visibility into inbound web traffic and actions taken + to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-frontdoor-should-enable-resource-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_front_door_standard_or_premium_plus_waf_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Front Door Standard or Premium (Plus WAF) should have resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Front Door Standard or Premium (plus WAF) and stream + to a Log Analytics workspace. Get detailed visibility into inbound web traffic + and actions taken to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-frontdoor-stand-premium-enable-log\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"data_collection_rule_should_collect_system_logs\",\"responsibilityTitle\":\"Data + Collection Rule should collect system logs\",\"responsibilityDescription\":\"This + policy enables you check whether data collection rules collect system logs.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-collection-of-system-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"linux_virtual_machines_should_have_azure_monitor_agent_installed\",\"responsibilityTitle\":\"Linux + virtual machines should have Azure Monitor Agent installed\",\"responsibilityDescription\":\"Linux + virtual machines should be monitored and secured through the deployed Azure + Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest + OS. This policy will audit virtual machines with supported OS images in supported + regions. Learn more: https://aka.ms/AMAOverview + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-monitor-agent-on-linux-virtual-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"microsoft_defender_for_containers_should_be_enabled\",\"responsibilityTitle\":\"Microsoft + Defender for Containers should be enabled\",\"responsibilityDescription\":\"Microsoft + Defender for Containers provides hardening, vulnerability assessment and run-time + protections for your Azure, hybrid, and multi-cloud Kubernetes environments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-containers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_azure_data_lake_store_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Azure Data Lake Store should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-data-lake-store\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_azure_stream_analytics_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Azure Stream Analytics should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-azure-stream-analytics\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_batch_accounts_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Batch accounts should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-batch-accounts\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_data_lake_analytics_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Data Lake Analytics should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-data-lake-analytics\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_event_hub_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Event Hub should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-event-hub\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_iot_hub_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in IoT Hub should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-iot-hub\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Key Vault should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_logic_apps_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Logic Apps should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-logic-apps\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_search_services_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Search services should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-search-services\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_service_bus_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Service Bus should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-service-bus\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"virtual_machines_should_be_associated_with_a_data_collection_rule\",\"responsibilityTitle\":\"Virtual + Machines should be associated with a Data Collection Rule\",\"responsibilityDescription\":\"This + policy enables you check whether virtual machines associated with a Data Collection + Rule.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-associate-virtual-machines-with-data-collection-rule\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"windows_virtual_machines_should_have_azure_monitor_agent_installed\",\"responsibilityTitle\":\"Windows + virtual machines should have Azure Monitor Agent installed\",\"responsibilityDescription\":\"Windows + virtual machines should be monitored and secured through the deployed Azure + Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest + OS. Windows virtual machines with supported OS and in supported regions are + monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-monitor-agent-on-windows-virtual-machines\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_18\",\"controlName\":\"Provide + evidence of 30-day immediate availability and 90-day retention of security + event logs\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that a minimum of 30 days worth of security event logging data is immediately + available, with 90 days of security event logs being retained\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control18\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"log_analytics_workspace_should_be_configured_with_90_days_retention_or_longer\",\"responsibilityTitle\":\"Log + Analytics Workspace should be configured with 90 days retention or longer\",\"responsibilityDescription\":\"For + incident investigation purposes, it is recommend to configure the data retention + of Log Analytics Workspace to at least 90 days.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op18_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-configure-log-analytics-workspace-retention\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_19\",\"controlName\":\"Provide + evidence of periodic log review and investigation of identified security events/anomalies\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evdience that:

\_A) Logs are being reviewed periodically and any potential + security events/anomalies identified during the reveiw process are investiagted + and addressed\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control19\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_19_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that logs are being reviewed periodically and any + potential security events/anomalies identified are investiagted and addressed\",\"responsibilityDescription\":\"Provide + demonstratable evidence that Logs are being reviewed periodically and any + potential security events/anomalies identified during the reveiw process are + investiagted and addressed.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-log-review-and-investigation\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_20\",\"controlName\":\"Provide + evidence of configured alert rules for investigating security events including + privileged accounts, malware, and log tampering\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Alert rules are configured so that alerts are triggered + for investigation for the following \_security events where applicable:

i) + privileged account creation/ modifications
ii) privileged/High risk activities + or operations\_
iii) malware events
iv) event log tampering
v) IDPS + /WAF events (if configured)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control20\",\"controlStatus\":\"PendingApproval\",\"responsibilities\":[{\"responsibilityId\":\"activity_log_alert_should_exist_for_privileged_operations\",\"responsibilityTitle\":\"Activity + log alert should exist for high privileged operations\",\"responsibilityDescription\":\"This + policy audits specific high privileged operations with no activity log alerts + configured.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"account_operation_activity_log_alert_should_exist\",\"responsibilityTitle\":\"Activity + log alert should exist for write or delete Account operations\",\"responsibilityDescription\":\"This + policy audits write or delete Account operations with no activity log alerts + configured.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":null,\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":null,\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"alert_rule_should_set_up_for_diagnostic_logs\",\"responsibilityTitle\":\"Alert + ruleCollections must exist for Log Analytics Workspace Monitoring\",\"responsibilityDescription\":\"Customer + must set up for Log Analytics Workspace Monitoring.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"waf_should_export_logs_to_log_analytic_workspaces\",\"responsibilityTitle\":\"Diagnostic + settings should be set for WAF to export logs to Log Analytics workspace\",\"responsibilityDescription\":\"This + policy audit if the diagnostic settings for WAF to stream resource logs to + a Log Analytics workspace when any WAF which is missing this diagnostic settings + is created or updated.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"log_analytics_workspace_should_have_read_only_lock\",\"responsibilityTitle\":\"Log + Analytics workspace should have read-only lock to block all activities that + could delete data\",\"responsibilityDescription\":\"Set a lock on your Log + Analytics workspace to block all activities that could delete data: purge, + table delete, and table- or workspace-level data retention changes. To learn + more about Log Analytics workspace immutability, visit https://aka.ms/monitor/lock .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Information + Security Risk Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_21\",\"controlName\":\"Provide + evidence that a ratified formal information security risk management policy/process + is documented and established\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that a ratified formal information security risk management policy/process + is documented and established\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control21\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_21_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a ratified formal information security risk management + policy/process is documented and established\",\"responsibilityDescription\":\"A + robust information security risk management process is important to help organizations + manage risks effectively. This will help organizations plan effective mitigations + against threats to the environment. The intent of this control is to confirm + that the organization has a formally ratified information security risk management + policy or process that is comprehensively documented. The policy should outline + how the organization identifies, assesses, and manages information security + risks. It should include roles and responsibilities, methodologies for risk + assessment, criteria for risk acceptance, and procedures for risk mitigation.

Note: + The risk assessment must focus on information-security risks, not just general + business risks.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-information-security-risk-management-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_22\",\"controlName\":\"Provide + evidence of a formal company-wide information security risk assessment is + carried out at least annually or a targeted risk analysis is documented and + performed\",\"controlFullName\":\"\",\"controlDescription\":\"
Provide + evidence that:

A) A formal company-wide information security risk assessment + is carried out at least annually.

\_OR

\_For Targeted Risk Analysis:

\_B) + A targeted risk analysis is documented and performed:

(i) at a minimum + every 12 months for every instance where a traditional control or industry + best practice is not in place\_
(ii) where a design/technological limitation + creates a risk of introducing a vulnerability into the environment/puts users + and data at risk,\_
(iii) upon suspicion or confirmation of compromise\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control22\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_22_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a formal company-wide information security risk + assessment is carried out at least annually or a targeted risk analysis is + documented and performed\",\"responsibilityDescription\":\"Please provide + evidence demonstrating that:

(A) Formal company-wide information security + risk assessment is carried out at least annually.

OR For targeted risk + analysis:

(B) A targeted risk analysis is documented and performed:
+ (i) At a minimum every 12 months for every instance where a traditional control + or industry best practice is not in place.
(ii) Where a design/technological + limitation creates a risk of introducing a vulnerability into the environment/puts + users and data at risk.
(iii) Upon suspicion or confirmation of compromise.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-formal-risk-assessment-occurs-annually\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_23\",\"controlName\":\"Provide + evidence that information security risk assessment includes relevant system + components, matrix, and risk treatment plan\",\"controlFullName\":\"\",\"controlDescription\":\"Validate + that the information security risk assessment includes:

A) System component + or resource affected
B) Threats and vulnerabilities, or equivalent
C) + Impact and likelihood matrices or equivalent
D) The creation of a risk + register / risk treatment plan\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control23\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_23_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the information security risk assessment includes + affected resources, threats and vulnerabilities, impact, and risk treatment + plan\",\"responsibilityDescription\":\"Validate that the information security + risk assessment includes:

(i) System component or resource affected.
+ (ii) Threats and vulnerabilities, or equivale.
(iii) Impact and likelihood + matrices or equivalent.
(iv) The creation of a risk register / risk treatment + plan.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-information-security-risk-assessment\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_24\",\"controlName\":\"Provide + evidence of risk management processes are in place, and ability to identify + changes and risks that could impact your system of internal controls\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) You have risk management processes in place that + assesses and manages risks associated with vendors and business partners
B) + You can identify and assess changes and risks that could impact your system + of internal controls
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control24\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_24_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that risk management processes are in place, and ability + to identify changes and risks that could impact your system of internal controls\",\"responsibilityDescription\":\"Please + provide evidence that:

(i) You (ISV) have risk management processes + in place that assesses and manages risks associated with vendors and business + partners.
(ii) You (ISV) can identify and assess changes and risks that + could impact your system of internal controls.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-risk-management-processes\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Security + Incident Response\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_25\",\"controlName\":\"Provide + evidence of a ratified incident response plan/procedure (IRP) with contact + information, communication plan, and recovery steps\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + your ratified security incident response plan/procedure (IRP) outlining how + your organization responds to incidents, showing how it is maintained, and + that it includes:\_

A) Details of the incident response team including + contact information
B) An internal communication plan during the incident + and external communication to relevant parties such as key stakeholders, payment + brands and acquirers, regulatory bodies (for example 72 hours for GDPR), supervisory + authorities, directors, customers
C) Steps for activities such as incident + classification, containment, mitigation, recovery and returning to normal + business operations depending on the type of incident\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control25\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_25_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that a ratified incident response plan/procedure (IRP) + with contact information, communication plan, and recovery steps\",\"responsibilityDescription\":\"Please + provide your ratified security incident response plan/procedure (IRP) outlining + how your organization responds to incidents, showing how it is maintained, + and that it includes:

(i) Details of the incident response team including + contact information,
(ii) An internal communication plan during the incident + and external communication to relevant parties such as key stakeholders, payment + brands and acquirers, regulatory bodies (for example 72 hours for GDPR), supervisory + authorities, directors, customers,
(iii) Steps for activities such as + incident classification, containment, mitigation, recovery and returning to + normal business operations depending on the type of incident.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-incident-response-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_26\",\"controlName\":\"Provide + evidence of all members of the incident response team have received annual + training that enables them to respond to incidents\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + \ evidence that:

A) All members of the incident response team have + received annual training which enables them to respond to incidents\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control26\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_26_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that all members of the incident response team have + received annual training that enables them to respond to incidents\",\"responsibilityDescription\":\"Please + provide evidence which shows that:

All members of the incident response + team have received annual training that enables them to respond to incidents.

Evidence + should be provided which demonstrates training has been carried out by means + of sharing the training content, and records showing who attended (which should + include all the incident response team). Alternatively, or as well as, records + showing that a tabletop exercise has been carried out. All this must have + been completed within a 12-month period from when the evidence is submitted.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-incident-response-team-annual-training\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_27\",\"controlName\":\"Provide + evidence of reviewing and updating the incident response strategy and documentation + based on the lessons learned from exercise or incident\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The incident response strategy and supporting documentation + is reviewed and updated based on either:

(i) lessons learned from a + table top exercise
(ii) lessons learned from responding to an incident
(iii) + organizational changes\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control27\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_27_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence to show the incident response strategy and supporting + documentation is reviewed and updated based on the lessons learned from exercise + or incident\",\"responsibilityDescription\":\"Please provide evidence that:

The + incident response strategy and supporting documentation is reviewed and updated + based on either:

(i) Lessons learned from a tabletop exercise
+ (ii) Lessons learned from responding to an incident
(iii) Organizational + changes\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-irp-updated-lessons-learned\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Business + Continuity Plan (BCP) and Disaster Recovery Plan\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_28\",\"controlName\":\"Provide + evidence of maintained Business Continuity plan documenting personnel, contingency + requirements, recovery procedures, and system restoration\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists, and is maintained, which outlines + the Business Continuity plan and includes:

i) details of relevant personnel + including their roles and responsibilities\_
ii) business functions with + associated contingency requirements and objectives
iii) system and data + backup procedures, configuration, and schedueling/retention
iv) recovery + priority and timeframe targets
v) a contingency plan detailing actions, + steps, and procedures to be followed to return critical information systems, + business functions and services to operation in the event of an unexpected + and unscheduled interruption
vi) an established process that covers the + eventual full system restoration and return to the original state\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control28\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_28_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that documentaion exists, and is maintained, which + outlines the business continuity plan\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Documentation exists, and is maintained, + which outlines the business continuity plan and includes:
(i) Details + of relevant personnel including their roles and responsibilities
(ii) + Business functions with associated contingency requirements and objectives
+ (iii) System and data backup procedures, configuration, and scheduling/retention
+ (iv) Recovery priority and timeframe targets
(v) A contingency plan detailing + actions, steps, and procedures to be followed to return critical information + systems, business functions and services to operation in the event of an unexpected + and unscheduled interruption
(vi) An established process that covers the + eventual full system restoration and return to the original state\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-business-continuity-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_29\",\"controlName\":\"Provide + evidence of documented Disaster Recovery plan with personnel roles, inventory, + backup procedures, and recovery plan\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists, and is maintained, which outlines + the Disaster Recovery plan and includes at a minimum:

(i) personnel + \ their roles, responsibilities, and escalation process
(ii) inventory + of the information systems used to support critical business functions and + services
(iii) system and data backup procedures and configuration
(iv) + a recovery plan detailing actions and procedures to be followed to restore + critical information systems and data to operation
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control29\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_29_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that documentation exists, and is maintained, which + outlines the disaster recovery plan\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Documentation exists, and is maintained, + which outlines the disaster recovery plan and includes at a minimum:
(i) + Details of relevant personnel including their roles and responsibilities
+ (ii) Business functions with associated contingency requirements and objectives
+ (iii) System and data backup procedures, configuration, and scheduling/retention
+ (iv) Recovery priority and timeframe targets
(v) A contingency plan detailing + actions, steps, and procedures to be followed to return critical information + systems, business functions and services to operation in the event of an unexpected + and unscheduled interruption
(vi) An established process that covers the + eventual full system restoration and return to the original state\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-disaster-recovery-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_30\",\"controlName\":\"Provide + evidence of annual review, personnel training, exercise testing, and documentation + of BCP and DRP\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The Business Continuity plan and the Disaster Recovery + Plan are being reviewed at least every 12 months to ensure that it remains + valid and effective during adverse situations, and is updated based on:

i) + annual reveiw of the plan
ii) all relevant personnel receiving training + on their roles and responsibilitties assigned in the contingency plans
iii) + the plan/s are being tested through business continuity or Disaster Recovery + exercises\_
iv) test results are documented including lessons learned from + the excercise or organizational changes\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control30\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_30_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the business continuity plan and the disaster + recovery plan are being reviewed and updated at least every 12 months to ensure + that it remains valid and effective\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

The business continuity plan and + the disaster recovery plan are being reviewed at least every 12 months to + ensure that it remains valid and effective during adverse situations, and + is updated based on:
(i) Annual review of the plan.
(ii) All relevant + personnel receive training on their roles and responsibilities assigned in + the contingency plans.
(iii) The plan/s are tested through business continuity + or disaster recovery exercises.
(iv) Test results are documented including + lessons learned from exercises or organizational changes.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-bcp-drp-annual-review\",\"justification\":\"\",\"evidenceFiles\":[]}]}]}]},{\"categoryName\":\"Data + Security & Privacy\",\"categoryStatus\":\"Failed\",\"controlFamilies\":[{\"controlFamilyName\":\"Data + in Transit\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_1\",\"controlName\":\"Please + provide evidence demonstrating that your TLS configuration is TLS1.2 or higher + and an inventory of trusted keys and certificates is kept and maintained\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence for all of the following which:

A) Validates that your TLS + Configuration is TLS1.2 or higher within the TLS Profile Configuration Requirements
B) + Shows that an inventory of trusted keys and certificates is kept and maintained
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control1\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"app_service_app_slots_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"App + Service app slots should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_app_slots_should_require_ftps_only\",\"responsibilityTitle\":\"App + Service app slots should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_app_slots_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"App + Service app slots should use the latest TLS version\",\"responsibilityDescription\":\"Periodically, + newer versions are released for TLS either due to security flaws, include + additional functionality, and enhance speed. Upgrade to the latest TLS version + for App Service apps to take advantage of security fixes, if any, and/or new + functionalities of the latest version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"App + Service apps should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_require_ftps_only\",\"responsibilityTitle\":\"App + Service apps should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"App + Service apps should use the latest TLS version\",\"responsibilityDescription\":\"Upgrade + to the latest TLS version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_environment_should_disable_tls_1_dot_0_and_1_dot_1\",\"responsibilityTitle\":\"App + Service Environment should disable TLS 1.0 and 1.1\",\"responsibilityDescription\":\"TLS + 1.0 and 1.1 are out-of-date protocols that do not support modern cryptographic + algorithms. Disabling inbound TLS 1.0 and 1.1 traffic helps secure apps in + an App Service Environment.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-tls-1.0-and-1.1-are-out-of-date-protocols\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"aad_domain_services_managed_domains_should_use_tls_1_dot_2_only_mode\",\"responsibilityTitle\":\"Azure + Active Directory Domain Services managed domains should use TLS 1.2 only mode\",\"responsibilityDescription\":\"Use + TLS 1.2 only mode for your managed domains. By default, Azure AD Domain Services + enables the use of ciphers such as NTLM v1 and TLS v1. These ciphers may be + required for some legacy applications, but are considered weak and can be + disabled if you don't need them. When TLS 1.2 only mode is enabled, any client + making a request that is not using TLS 1.2 will fail. Learn more at https://docs.microsoft.com/azure/active-directory-domain-services/secure-your-domain + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_aad_domains\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"front_door_standard_and_premium_should_be_running_minimun_tls_version_1_dot_2\",\"responsibilityTitle\":\"Azure + Front Door Standard and Premium should be running minimum TLS version of 1.2\",\"responsibilityDescription\":\"Setting + minimal TLS version to 1.2 improves security by ensuring your custom domains + are accessed from clients using TLS 1.2 or newer. Using versions of TLS less + than 1.2 is not recommended since they are weak and do not support modern + cryptographic algorithms.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_front_door\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"sql_database_should_be_running_tls_version_1_dot_2_or_newer\",\"responsibilityTitle\":\"Azure + SQL Database should be running TLS version 1.2 or newer\",\"responsibilityDescription\":\"Setting + TLS version to 1.2 or newer improves security by ensuring your Azure SQL Database + can only be accessed from clients using TLS 1.2 or newer. Using versions of + TLS less than 1.2 is not recommended since they have well documented security + vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_sql_database\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"synapse_workspace_sql_server_should_be_running_tls_version_1_dot_2_or_newer\",\"responsibilityTitle\":\"Azure + Synapse Workspace SQL Server should be running TLS version 1.2 or newer\",\"responsibilityDescription\":\"Setting + TLS version to 1.2 or newer improves security by ensuring your Azure Synapse + workspace SQL server can only be accessed from clients using TLS 1.2 or newer. + Using versions of TLS less than 1.2 is not recommended since they have well + documented security vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_synapse_sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_apps_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"Container + Apps should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks. Disabling 'allowInsecure' will result + in the automatic redirection of requests from HTTP to HTTPS connections for + container apps.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-use-container-apps-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"enforce_ssl_connection_should_be_enabled_for_mysql_database_servers\",\"responsibilityTitle\":\"Enforce + SSL connection should be enabled for MySQL database servers\",\"responsibilityDescription\":\"Azure + Database for MySQL supports connecting your Azure Database for MySQL server + to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections + between your database server and your client applications helps protect against + 'man in the middle' attacks by encrypting the data stream between the server + and your application. This configuration enforces that SSL is always enabled + for accessing your database server.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enforcing-my_sql_ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"enforce_ssl_connection_should_be_enabled_for_postgresql_database_servers\",\"responsibilityTitle\":\"Enforce + SSL connection should be enabled for PostgreSQL database servers\",\"responsibilityDescription\":\"Azure + Database for PostgreSQL supports connecting your Azure Database for PostgreSQL + server to client applications using Secure Sockets Layer (SSL). Enforcing + SSL connections between your database server and your client applications + helps protect against 'man in the middle' attacks by encrypting the data stream + between the server and your application. This configuration enforces that + SSL is always enabled for accessing your database server.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enforcing-postgresql-ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ftps_only_should_be_required_in_your_function_app\",\"responsibilityTitle\":\"FTPS + only should be required in your Function App\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-app-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"Function + App should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_only_accessible_over_https\",\"responsibilityTitle\":\"Function + app slots should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-slots-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_require_ftps_only\",\"responsibilityTitle\":\"Function + app slots should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-app-slots-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"Function + app slots should use the latest TLS version\",\"responsibilityDescription\":\"Periodically, + newer versions are released for TLS either due to security flaws, include + additional functionality, and enhance speed. Upgrade to the latest TLS version + for Function apps to take advantage of security fixes, if any, and/or new + functionalities of the latest version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-slot-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"hdinsight_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"HDInsight + should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your HSInsight cluster is public facing, then TLS latest version should be + used to secure your cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure-your-hdinsight-cluster\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"iot_hub_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Iot + Hub should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your Iot Hub is public facing, then TLS latest version should be used to secure + your resource.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-if-your-iot-hub-is-public-facing-then-use-tls-latest-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"kubernetes_clusters_should_be_accessible_only_over_https\",\"responsibilityTitle\":\"Kubernetes + clusters should be accessible only over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures authentication and protects data in transit from network + layer eavesdropping attacks. This capability is currently generally available + for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc + enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-use-of-k8s-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"latest_tls_version_should_be_used_in_your_function_app\",\"responsibilityTitle\":\"Latest + TLS version should be used in your Function App\",\"responsibilityDescription\":\"Upgrade + to the latest TLS version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mariadb_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"MariaDB + should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your MariaDB is public facing, then TLS latest version should be used to secure + your DB.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure-your-db-with-tls-latest-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"only_secure_connections_to_your_azure_cache_for_redis_should_be_enabled\",\"responsibilityTitle\":\"Only + secure connections to your Azure Cache for Redis should be enabled\",\"responsibilityDescription\":\"Audit + enabling of only connections via SSL to Azure Cache for Redis. Use of secure + connections ensures authentication between the server and the service and + protects data in transit from network layer attacks such as man-in-the-middle, + eavesdropping, and session-hijacking.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-audit-enabling-of-ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_cache_for_redis_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible cache for Redis should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"This + policy enables you to check if the Redis instance's TLS version is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-check-redis-instance-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_mysql_database_should_enable_ssl_enforcement_and_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible MySQL Database should enable SSL enforcement and should have the + minimal TLS version of 1.2\",\"responsibilityDescription\":\"This policy enables + you to check if the MySQL instance's sslEnforcement enabled and TLS version + is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-this-policy-enables-you-to-check-if-the-mysql-instance-ssl-enforcement-enabled\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_postgresql_server_should_enable_ssl_enforcement_and_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible PostgreSQL server should enable SSL enforcement and should have + the minimal TLS version of 1.2\",\"responsibilityDescription\":\"This policy + enables you to check if the PostgreSQL instance's sslEnforcement enabled and + TLS version is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-check-postgresql-instance-ssl-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"secure_transfer_to_storage_accounts_should_be_enabled\",\"responsibilityTitle\":\"Secure + transfer to storage accounts should be enabled\",\"responsibilityDescription\":\"Audit + requirement of Secure transfer in your storage account. Secure transfer is + an option that forces your storage account to accept requests only from secure + connections (HTTPS). Use of HTTPS ensures authentication between the server + and the service and protects data in transit from network layer attacks such + as man-in-the-middle, eavesdropping, and session-hijacking.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-audit-requirement-of-secure-transfer\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"sql_managed_instance_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"SQL + Managed Instance should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"Setting + minimal TLS version to 1.2 improves security by ensuring your SQL Managed + Instance can only be accessed from clients using TLS 1.2. Using versions of + TLS less than 1.2 is not recommended since they have well documented security + vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-setting-minimal-tls-version-for-sql-managed-instance\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ssl_policy_of_application_gateway_listener_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"SSL + Policy of Application gateway listener should have the minimal TLS version + of 1.2\",\"responsibilityDescription\":\"This policy enables you to check + if the TLS version of the listener's SSL policy is the latest, designed for + the application gateway.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-this-policy-enables-you-to-check-if-the-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_have_the_specified_minimum_tls_version\",\"responsibilityTitle\":\"Storage + accounts should have the specified minimum TLS version\",\"responsibilityDescription\":\"Configure + a minimum TLS version for secure communication between the client application + and the storage account. To minimize security risk, the recommended minimum + TLS version is the latest released version, which is currently TLS 1.2.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-configure-minimum-tls-version-for-storage-accounts\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"tls_protocol_1_dot_2_must_be_used_for_arc_sql_managed_instances\",\"responsibilityTitle\":\"TLS + protocol 1.2 must be used for Arc SQL managed instances\",\"responsibilityDescription\":\"As + a part of network settings, Microsoft recommends allowing only TLS 1.2 for + TLS protocols in SQL Servers. Learn more on network settings for SQL Server + at https://aka.ms/TlsSettingsSQLServer + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_arc_sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"windows_web_servers_should_be_configured_to_use_secure_communication_protocols\",\"responsibilityTitle\":\"Windows + web servers should be configured to use secure communication protocols\",\"responsibilityDescription\":\"To + protect the privacy of information communicated over the Internet, your web + servers should use the latest version of the industry-standard cryptographic + protocol, Transport Layer Security (TLS). TLS secures communications over + a network by using security certificates to encrypt a connection between machines.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-the-privacy\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_2\",\"controlName\":\"Provide + evidence demonstrating TLS compression is disabled for public web services + to avoid CRIME, and TLS HSTS is enabled for 180-days site-wide\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence for all of the following which:

A) Shows TLS compression is + diasbled for all public facing services handling web requests to prevent Compression + Ratio Info-leak Made Easy (CRIME)
B) Validates that TLS HSTS is enabled + and configured to 180-days across all sites\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control2\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"validate-that-TLS-compression-is-disabled\",\"responsibilityTitle\":\"Provide + demonstrable evidence that TLS compression is disabled across all public-facing + services that handle web requests\",\"responsibilityDescription\":\"There + is a specific TLS vulnerability, CRIME (CVE-2012-4929), which affects TLS Compression. For this + reason, industry recommendations are to turn this functionality off. ACAT + will leverage the python module sslyze(https://pypi.org/project/sslyze/) to check the TLS compression + status.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"validate-that-TLS-compression-is-disabled\",\"recommendationShortName\":\"hostname + is missing\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds2_1\",\"recommendationSolutionContent\":\"1.Go + to the ACAT portal and click your report.

2. Click 'Edit Microsoft + 365 Certification configuration' under Settings on the top menues of the report + detail page.

3. Input your public facing service's hostname and save.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-disable-tls-compression\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"validate-that-HSTS-header-is-configured-and-greater-than-180-days\",\"responsibilityTitle\":\"Validate + that TLS HSTS is enabled and configured to >= 15552000 across all sites\",\"responsibilityDescription\":\"HTTP + Strict Transport Security (HSTS) is a security mechanism designed to protect + websites against man-in-the-middle attacks by forcing TLS connections by way + of an HTTPS response header field named \\\"Strict-Transport-Security\\\". + ACAT will call the hostname which ISVs provide to check the response headers + whether enable the HSTS header correctly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"validate-that-HSTS-header-is-configured-and-greater-than-180-days\",\"recommendationShortName\":\"hostname + is missing\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds2_1\",\"recommendationSolutionContent\":\"1.Go + to the ACAT portal and click your report.

2. Click 'Edit Microsoft + 365 Certification configuration' under Settings on the top menues of the report + detail page.

3. Input your public facing service's hostname and save.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-tls-hsts\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + At Rest\",\"controlFamilyStatus\":\"Passed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_3\",\"controlName\":\"Provide + evidence that data at rest is encrypted in line with the encryption profile + requirements, using encryption algorithms such as AES, Blowfish, TDES and + encryption key sizes of 128-bit, and 256-bit\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that data at rest is encrypted in line with the encryption profile + requirements, using encryption algorithms such as Advanced Encryption Standard + (AES), Blowfish, Triple Data Encryption Standard (TDES) and encryption key + sizes of 128-bit, and 256-bit\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control3\",\"controlStatus\":\"Passed\",\"responsibilities\":[{\"responsibilityId\":\"automation_account_variables_should_be_encrypted\",\"responsibilityTitle\":\"Automation + account variables should be encrypted\",\"responsibilityDescription\":\"It + is important to enable encryption of Automation account variable assets when + storing sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-encrypt-automation-account-variables\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_hdinsight_cluster_should_enable_double_encryption\",\"responsibilityTitle\":\"Azure + HDInsight clusters should use encryption at host to encrypt data at rest\",\"responsibilityDescription\":\"Enabling + encryption at host helps protect and safeguard your data to meet your organizational + security and compliance commitments. When you enable encryption at host, data + stored on the VM host is encrypted at rest and flows encrypted to the Storage + service.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-hdinsight-cluster-encryption-data-at-rest\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_synapse_analytics_dedicated_sql_pools_should_enable_encryption\",\"responsibilityTitle\":\"Azure + Synapse Analytics dedicated SQL pools should enable encryption\",\"responsibilityDescription\":\"Enable + transparent data encryption for Azure Synapse Analytics dedicated SQL pools + to protect data-at-rest and meet compliance requirements. Please note that + enabling transparent data encryption for the pool may impact query performance. + More details can refer to https://go.microsoft.com/fwlink/?linkid=2147714 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-synapse-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"disk_encryption_should_be_enabled_on_azure_data_explorer\",\"responsibilityTitle\":\"Disk + encryption should be enabled on Azure Data Explorer\",\"responsibilityDescription\":\"Enabling + disk encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-disk-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"double_encryption_should_be_enabled_on_azure_data_explorer\",\"responsibilityTitle\":\"Double + encryption should be enabled on Azure Data Explorer\",\"responsibilityDescription\":\"Enabling + double encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments. When double encryption has been enabled, + data in the storage account is encrypted twice, once at the service level + and once at the infrastructure level, using two different encryption algorithms + and two different keys.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-data-explorer-double-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"eventhub_namespace_should_enable_double_encryption\",\"responsibilityTitle\":\"Event + Hub namespaces should have double encryption enabled\",\"responsibilityDescription\":\"Enabling + double encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments. When double encryption has been enabled, + data in the storage account is encrypted twice, once at the service level + and once at the infrastructure level, using two different encryption algorithms + and two different keys.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-synapse-enable-custom-key-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"most_storages_in_azure_are_encrypted_by_default_with_microsoft_managed_keys_encryption\",\"responsibilityTitle\":\"Most + storages in Azure are encrypted by default with Microsoft-managed keys encryption\",\"responsibilityDescription\":\"Azure + Database for MySQL, Azure PostgreSQL, SQL Database, Azure SQL Managed Instance, + SQL Server, Azure Cosmos DB, Event Hubs, SQL managed instances, Storage account, + Azure Synapse Analytics, Azure Batch accounts, Azure Kubernetes Service (AKS), + Virtual Machines, Azure Container registries, Azure HPC Cache, etc., are encrypted + by default with Microsoft-managed keys encryption. More resource types can + refer to this doc.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.287Z\",\"recommendationIds\":[\"ds3_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-encryption-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"queue_storage_should_use_customer_managed_key_for_encryption\",\"responsibilityTitle\":\"Queue + Storage should use customer-managed key for encryption\",\"responsibilityDescription\":\"Secure + your queue storage with greater flexibility using customer-managed keys. When + you specify a customer-managed key, that key is used to protect and control + access to the key that encrypts your data. Using customer-managed keys provides + additional capabilities to control rotation of the key encryption key or cryptographically + erase data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-queue-storage-customer-key-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"require_encryption_on_data_lake_store_accounts\",\"responsibilityTitle\":\"Require + encryption on Data Lake Store accounts\",\"responsibilityDescription\":\"This + policy ensures encryption is enabled on all Data Lake Store accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-datalake-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_account_encryption_scopes_should_use_double_encryption_for_data_at_rest\",\"responsibilityTitle\":\"Storage + account encryption scopes should use double encryption for data at rest\",\"responsibilityDescription\":\"Enable + infrastructure encryption for encryption at rest of your storage account encryption + scopes for added security. Infrastructure encryption ensures that your data + is encrypted twice.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-account-scope-double-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"transparent_data_encryption_on_sql_databases_should_be_enabled\",\"responsibilityTitle\":\"Transparent + Data Encryption on SQL databases should be enabled\",\"responsibilityDescription\":\"Transparent + data encryption should be enabled to protect data-at-rest and meet compliance + requirements.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + Retention, Back-up and Disposal\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_4\",\"controlName\":\"Provide + evidence of documented, approved data retention period\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + proof that an approved data retention period is formally established and documented\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control4\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_4_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that an approved and documented data retention period + is formally established\",\"responsibilityDescription\":\"Please provide proof + that an approved data retention period is formally established and documented.

Supply + the full data retention policy which clearly details how long data (must cover + all data types) should be kept for so the business can perform its business + functions.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-establish-retention-policy\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_5\",\"controlName\":\"Provide + evidence for data retention within controlled retention period as per control + 4\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence that + data is retained only for the defined\_retention period as discussed in control + 4\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control5\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_5_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that retained data matches defined retention period\",\"responsibilityDescription\":\"Provide + screenshot evidence (or via screenshare) showing that stored data (in all + the various data locations, i.e., databases, file shares, archives, etc.) + does not exceed the defined data retention policy. Examples could be screenshots + of:

(i) Database records with a date field, searched in oldest record + order, and/or
(ii) File storage locations showing timestamps that are within + the retention period Note: Any personal/sensitive customer data should be + redacted within the screenshot.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-validate-retention-periods\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_6\",\"controlName\":\"Provide + evidence of secure data deletion processes after retention period\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that processes are in place to securely delete data after its retention + period\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control6\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_6_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that processes are in place to securely delete data + after its retention period\",\"responsibilityDescription\":\"If the deletion + process is done programmatically, then provide a screenshot of the script + that is used to perform this. If it is executed on a schedule, provide a screenshot + showing the schedule. For example, a script to delete files within a file + share may be configured as a CRON job, screenshot the CRON job showing the + schedule and the script which is executed; and provide the script showing + the command used.\",\"responsibilityType\":\"ScopedManual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-data-deletion\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_database_retention_period_meet_retention_policy\",\"responsibilityTitle\":\"Provide + demonstrable evidence that the retention policy of your Azure resources meet + your data deletion tetention period\",\"responsibilityDescription\":\"Most + Azure databses (i.e., CosmosDB, Azure SQL Database, MySQL Database, etc.) + have default retention period for the backup data and it can also be configured. + The retention period of Azure backup data should also be considered in your + defined data retention policy. Please provide screenshot showing the backup + retention period of your Azure database services (i.e., databases, file shares, + archives, etc.)\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"azure_database_retention_period_meet_retention_policy\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds6_1\",\"recommendationSolutionContent\":\"
ACAT + can collect your backup policies from Azure Backup Center.
To collect backup + policy from Azure Backup Center:
1. Create Recovery Service Vault or Backup + Vault in the Azure Backup Center
2. Set backup policies in the related + vaults
3. Please make sure to include the backup resources and its backup + vaults to the report resources. You can modify the report resources by clicking + 'Settings' > 'Edit resources' to update ACAT report resources.

Once + you've included your backup resources to the ACAT report, click 'Collect evidence + by ACAT' button to collect evidence. ACAT will summarize your backup policies + into a csv file. Then, you can view ACAT evidence in the 'ACAT collected evidence' + below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_7\",\"controlName\":\"Provide + evidence of automated backup system, backup testing, and access controls for + backup data\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) An automated backup system is in place and configured to perform + backups at scheduled times

B) Backup information is tested in line + with the backup scheduling procedure and restored periodically to confirm + the reliability and integrity of the data

C) Appropriate access controls + and protection mechanisms (i.e immunable backups) are implemented to ensure + backups / system snapshots are secured against unauthorized access and to + ensure the confidentiality, integrity, and availability of the backup data\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control7\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_7_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that appropriate access controls and protection mechanisms + are implemented to ensure backups are secured against unauthorized access\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Appropriate access controls and + protection mechanisms (i.e., immutable backups) are implemented to ensure + backups/ system snapshots are secured against unauthorized access and to ensure + the confidentiality, integrity, and availability of the backup data.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-database-for-mysql-flexible-server-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + Database for MySQL Flexible Server instance should be configured to backup + automatically\",\"responsibilityDescription\":\"By default, Azure Database + for MySQL flexible server enables automated backups of your entire server + (encompassing all databases created) with a default 7-day retention period. + You can also trigger a manual backup using On-Demand backup feature.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-database-for-postgresql-flexible-server-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + Database for PostgreSQL Flexible Server instance should be configured to backup + automatically\",\"responsibilityDescription\":\"Azure Database for PostgreSQL + flexible server automatically performs regular backups of your server. You + can then do a point-in-time recovery (PITR) within a retention period that + you specify.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-sql-database-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + SQL Database should be configured to backup automatically\",\"responsibilityDescription\":\"Azure + SQL Database comes with a core resiliency and reliability promise that protects + it against software or hardware failures. Database backups are automated to + protect your data from corruption or accidental deletion.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cosmos-db-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Cosmos + DB should be configured to backup automatically\",\"responsibilityDescription\":\"Azure + Cosmos DB automatically takes backups your data at regular intervals. The + automatic backups are taken without affecting the performance or availability + of the database operations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmosdb-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-backup-system-in-place-and-test-inline\",\"responsibilityTitle\":\"Provide + demonstrable evidence that automated backup system is in place and backup + infromation is tested in line with backup scheduling\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

(i) An automated backup system + is in place and configured to perform backups at scheduled times.
(ii) + Backup information is tested in line with the backup scheduling procedure + and restored periodically to confirm the reliability and integrity of the + data.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"azure-backup-system-in-place-and-test-inline\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"
ACAT + can collection backup policy from Azure Backup Center(If applicable) to help + you demonstrate that an automated backup system is in place and configured + to perform backups at scheduled times.

To collect backup policy from + Azure Backup Center:
Please make sure to include the backup resources and + its backup vaults from Azure Backup Center to the report resources. You can + modify the report resources by clicking 'Settings' > 'Edit resources' to update + ACAT report resources.

Once you've included your backup resources to + the ACAT report, click 'Collect evidence by ACAT' button to collect evidence. + ACAT will summarize your backup data retention period into a csv file. Then, + you can view ACAT evidence in the 'ACAT collected evidence' below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + Access Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_8\",\"controlName\":\"Provide + evidence that individuals with access to data/keys are approved & configured + based on job\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) A list of users with access to data and/or encryption keys + is maintained including the business justification for each person
B) This + list of users was formally approved based on access privileges required for + their job function
C) Users are configured with the privileges outlined + in the approval\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control8\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_8_1_manual_cr\",\"responsibilityTitle\":\"Provide + a list of all individuals with access to data or encryption keys, including + the business justification\",\"responsibilityDescription\":\"Provide evidence + to demonstrate that a list of individuals with access to data and/or encryption + keys is maintained including the business justification for each individual.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-access-list\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Data_Security_Privacy_8_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the individuals with access to data or encryption + keys were formally approved and outlined with documentation\",\"responsibilityDescription\":\"Provide + evidence to demonstrate that a list of individuals with access to data and/or + encryption keys:

(i) Were formally approved based on access privileges + required for their job function.
(ii) Are configured with the privileges + outlined in the approval.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-approval-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_9\",\"controlName\":\"Provide + evidence of maintaining third-party list and having data sharing agreements + with them\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) A list of all third-parties that data is shared with is maintained.
B) + Data sharing agreements are in place with all third-parties consuming data
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control9\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_9_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a list of all third parties that data is shared + with is maintained and data sharing agreements are in place with all third-parties + consuming data\",\"responsibilityDescription\":\"Provide evidence that:

(i) + A list of all third parties that data is shared with is maintained.
(ii) + Data sharing agreements are in place with all third-parties consuming data.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-list-third-parties\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Privacy\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_10\",\"controlName\":\"Provide + evidence of established PIM system with leadership commitment, roles and responsibilities + defined\",\"controlFullName\":\"\",\"controlDescription\":\"Does your organization + have a Privacy Information Management (PIM) system established, implemented + and maintained that:

A) Holds leadership commitment by way of a policy + or other form of documentation/computerised system for how your privacy information + management efforts are maintained for system confidentiality and integrity
B) + Determines roles, responsibilities and authorities of each person maintaining + the system, including PII Processors and Controllers\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control10\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_10_manual_cr\",\"responsibilityTitle\":\"Provide + evidence demonstrating that your organization have a Privacy Information Management + (PIM) system established, implemented, and maintained\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that your organization have a Privacy Information + Management (PIM) system established, implemented, and maintained that:

(i) + Holds leadership commitment by way of a policy or other form of documentation/computerized + system for how your privacy information management efforts are maintained + for system confidentiality and integrity.
(ii) Determines roles, responsibilities + and authorities of each person maintaining the system, including PII Processors + and Controllers.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-sar-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_11\",\"controlName\":\"Provide + evidence for following PII security processes: minimize, deidentify, control + transmission & record transfer\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence of processes to show that:

i) PII minimization is taking place

ii) + PII de-identification and deletion is being done at the end of the processing + period

iii) Controls are in place for PII transmission including any + confidentiality

iv) Record of transfer of PII from one country/region + to another exists with expressed consent to do so\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control11\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_11_manual_cr\",\"responsibilityTitle\":\"Provide + evidence demonstrating that PII minimization is taking place, PII de-identification + and deletion is being done, and controls & record are in place for PII transmission\",\"responsibilityDescription\":\"Provide + evidence of processes to show that:

(i) PII minimization is taking + place.
(ii) PII de-identification and deletion is being done at the end + of the processing period.
(iii) Controls are in place for PII transmission + including any confidentiality.
(iv) Record of transfer of PII from one + country/region to another exists with expressed consent to do so.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-privacy-notice\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"GDPR\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_12\",\"controlName\":\"Provide + evidence of SARs ability, identifying data and retention period for backups\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

(i) Data subjects are able to raise SARs
(ii) That + you (the ISV) are able to identify all locations of data subjects' data when + responding to a SARs request.
(iii)That there is a retention period for + backups which allows clients requesting removal of data via SAR's to be removed + as rolling backups over a period are removed (lifecycle of oldest back up + deletions/rewritten over)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control12\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_12_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that data subjects are able to raise SARs and you (the + ISV) are able to identify all locations of data subjects' data when responding + to a SARs request\",\"responsibilityDescription\":\"Provide evidence demonstrating + that:

(i) Data subjects are able to raise SARs.
(ii) Validate + that you (the ISV) are able to identify all locations of data subjects' data + when responding to a SARs request.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-sars-ability-identifying-data\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Data_Security_Privacy_12_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that there is a retention period for backups which allows + clients requesting removal of data via SARs to be removed as rolling backups + over a period are removed\",\"responsibilityDescription\":\"Provide evidence + demonstrating that:

That there is a retention period for backups which + allows clients requesting removal of data via SARs to be removed as rolling + backups over a period are removed (lifecycle of oldest back up deletions/rewritten + over).\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"Data_Security_Privacy_12_2_manual_cr\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds12_1\",\"recommendationSolutionContent\":\"
ACAT + can collect your resource backup data retention period from Azure Backup Center + (If applicable).
To collect backup data retention period from Azure Backup + Center:
Please make sure to include the backup resources and its backup + vaults from Azure Backup Center to the report resources. You can modify the + report resources by clicking 'Settings' > 'Edit resources' to update ACAT + report resources.

ACAT can also collect your backup data retention + period from Azure Cosmos DB, Azure SQL Database, Azure Database for PostgreSQL, + Azure Database for MySQL (If applicable).
To collect backup data retention + period from the above Azure resources, please make sure to include the backup + resources to the report resources. You can modify the report resources by + clicking 'Settings' > 'Edit resources' to update ACAT report resources.

Once + you've included your backup resources to the ACAT report, click 'Collect evidence + by ACAT' button to collect evidence. ACAT will summarize your backup data + retention period into a csv file. Then, you can view ACAT evidence in the + 'ACAT collected evidence' below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sars-ability-identifying-data\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_13\",\"controlName\":\"Provide + evidence of a privacy notice with essential information, including entities, + data types, and data subject rights\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + the privacy notice which should contain all the required elements as follows:

A) + Attributes details (Name, Address, and other personal identifiable information)
B) + Details of the type of personal data being processed
C) Details how long + personal data will be kept for.
D) Details of the lawfulness of processing + personal data.
E) Details of:
- Data subject's rights
- + Right to be informed
- Right of access by the data subject
- Right + to erasure
- Right to restriction of processing
- Right to data + portability
- Right to object
- Rights in relation to automated + decision-making including profiling\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control13\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_13_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that a privacy notice with essential information, including + details of personal data types, and data subject rights are provided\",\"responsibilityDescription\":\"Please + provide the privacy notice which should contain all the required elements + as follows:

(i) Entities details (Name, Address, etc.)
(ii) Details + of the type of personal data being processed.
(iii) Details how long personal + data will be kept for.
(iv) Details of the lawfulness of processing personal + data.
(v) Details of data subject's rights:
- Right to be informed
+ \ - Right of access by the data subject
- Right to erasure
- + Right to restriction of processing
- Right to data portability
- + Right to object
- Rights in relation to automated decision-making, including + profiling\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-privacy-notice-essential-information\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"HIPAA\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_14\",\"controlName\":\"Provide + evidence of HIPAA policy existence, ePHI confidentiality, integrity, availability + assurance, and security protection\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) A policy exists for HIPAA and HIPAA handling within + your organization for staff, contractors, vendors, etc.
B) Your organization + ensures confidentiality, integrity, and availability of ePHI that it creates, + receives, maintains, or transmits
C) Your organization ensures protection + against any reasonably anticipated threats and hazards to the security or + integrity
of ePHI\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control14\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_14_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that HIPAA policy existence, ePHI confidentiality, integrity, + availability assurance, and security protection are provided\",\"responsibilityDescription\":\"Please + provide demonstratable evidence that:

(i) A policy exists for HIPAA + and HIPAA handling within your organization for staff, contractors etc.
(ii) + ISV is ensuring the confidentiality, integrity, and availability of ePHI that + it creates, receives, maintains, or transmits.
(iii) Protect against any + reasonably anticipated threats and hazards to the security or integrity of + ePHI.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-hipaa-policy-existence\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_15\",\"controlName\":\"Provide + evidence that you protect private information, ensure staff follows security + rules, and backup data\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that you:

A) Provide protection against reasonably anticipated + uses or disclosures of such information that are not permitted by the privacy + rule
B) Ensure compliance with the security rule by its workforce
C) + Provide Data backup and Disaster recovery plan under 164.308 (a)(7)(ii)(A) + and 164.308 (a)(7)(ii)(B)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control15\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_15_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that you protect private information, ensure staff follows + security rules, and data backup and disaster recovery plan are in place\",\"responsibilityDescription\":\"Please + provide evidence that you (ISV):

(i) Protects against reasonably anticipated + uses or disclosures of such information that are not permitted by the Privacy + Rule; and
(ii) Ensure compliance with the Security Rule by its workforce.
(iii) + Data backup and Disaster recovery plan under 164..308 (a)(7)(ii)(A) and 164.308 + (a)(7)(ii)(B).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-protect-private-information\",\"justification\":\"\",\"evidenceFiles\":[]}]}]}]}]}]}}],\"nextLink\":\"https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots?%24skipToken=1&%24top=1&api-version=2024-06-27\"}" + headers: + cache-control: + - no-store, no-cache + content-length: + - '240069' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:22:17 GMT + mise-correlation-id: + - b2a324ff-77aa-41e1-836b-45eabaff0902 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062217Z-168779fcbd6txdgf5aq6cgpw5800000000z00000000051p0 + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 5f16e87d8c109b4fa4dc262be20f8932 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: B565FCF4D91C4C6FB85D0E350EACC497 Ref B: TYO201100115029 Ref C: 2024-06-18T06:22:17Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"downloadType": "ComplianceReport"}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report download + Connection: + - keep-alive + Content-Length: + - '36' + Content-Type: + - application/json + ParameterSetName: + - --report-name --download-type + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: POST + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots/crstatustest-prod-20240617200351-20240617T230307-487Z/download?api-version=2024-06-27 + response: + body: + string: "{\"complianceReport\":[{\"categoryName\":\"Operational Security\",\"controlFamilyName\":\"Awareness + Training\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that you have established security awareness training + to information system users\",\"responsibilityDescription\":\"Provide evidence + that:

A) The organization provides established security awareness training + to information system users (including managers, senior executives, and contractors):
+ (i) As part of initial training for new users
OR
(ii) When required + by information system changes

B) Organization-defined frequency of + awareness training.

C) Documents and monitors individual information + system security awareness activities and retains individual training records + over an organization-defined frequency.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Malware Protection - Anti-Malware\",\"controlId\":\"2\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Antivirus + software or Microsoft Defender should be enabled\",\"responsibilityDescription\":\"This + control monitors if Antivirus software or Microsoft Defender is be enabled.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Malware Protection - Application Control\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence of approved software list and active application control + technology with configuration documentation\",\"responsibilityDescription\":\"Provide + evidence that the following controls are in place:

A) You have an approved + list of software/applications with business justification that:
(i) exists + and is kept up to date
(ii) each application undergoes an approval process + and sign off prior to its deployment

B) That application control technology + is active, enabled, and configured across all the sampled system components + as documented\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Patch Management - Patching & Risk Ranking\",\"controlId\":\"4\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence of comprehensive patch management documentation including + patch windows, decommissioning, and vulnerability identification\",\"responsibilityDescription\":\"Provide + evidence that:

A) Patch management policy and procedure documentation + defines all of the following:
(i) suitable minimal patching window/s from + vendor patch release or from when coding vulnerabilities are first identified + for Critical/High and Medium risks vulnerabilities.
(ii) decommissioning + of unsupported operating systems and software
(iii) details on how new + security vulnerabilities are identified and assigned a risk score\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Patch Management - Patching & Risk Ranking\",\"controlId\":\"5\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that historical patching operations of AWS EC2 instances + are within the minimum patching window\",\"responsibilityDescription\":\"Provide + demonstratable evidence that historical patching operation of AWS EC2 instances + are within the minimum patching window.
The minimal patching timeframe + is:
- Critical severity (14 days),
- High severity (30 days),
+ - Medium severity (60 days).\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Patch Management - Patching & Risk Ranking\",\"controlId\":\"5\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that unsupported operating systems and software components + are not in use for Azure Virtual Machines\",\"responsibilityDescription\":\"Provide + demonstratable evidence that unsupported operating systems and software components + are not in use for Azure Virtual Machines.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Patch Management - Patching & Risk Ranking\",\"controlId\":\"5\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence to show all the software are being patched\",\"responsibilityDescription\":\"Provide + demonstratable evidence to show all sampled system components are being patched.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Vulnerability Scanning\",\"controlId\":\"6\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for App Service should be enabled\",\"responsibilityDescription\":\"Azure + Defender for App Service leverages the scale of the cloud, and the visibility + that Azure has as a cloud provider, to monitor for common web app attacks.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Vulnerability Scanning\",\"controlId\":\"6\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for Azure SQL Database servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Vulnerability Scanning\",\"controlId\":\"6\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for Key Vault should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Key Vault provides an additional layer of protection and security + intelligence by detecting unusual and potentially harmful attempts to access + or exploit key vault accounts.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Vulnerability Scanning\",\"controlId\":\"6\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for Resource Manager should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Resource Manager automatically monitors the resource management + operations in your organization. Azure Defender detects threats and alerts + you about suspicious activity. Learn more about the capabilities of Azure + Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling + this Azure Defender plan results in charges. Learn about the pricing details + per region on Security Center's pricing page: https://aka.ms/pricing-security-center .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Vulnerability Scanning\",\"controlId\":\"6\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for servers provides real-time threat protection for server workloads + and generates hardening recommendations as well as alerts about suspicious + activities.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Vulnerability Scanning\",\"controlId\":\"6\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for SQL servers on machines should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Vulnerability Scanning\",\"controlId\":\"6\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for SQL should be enabled for unprotected SQL Managed Instances\",\"responsibilityDescription\":\"Audit + each SQL Managed Instance without advanced data security.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Vulnerability Scanning\",\"controlId\":\"6\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Microsoft + Defender for Containers should be enabled\",\"responsibilityDescription\":\"Microsoft + Defender for Containers provides hardening, vulnerability assessment and run-time + protections for your Azure, hybrid, and multi-cloud Kubernetes environments.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Vulnerability Scanning\",\"controlId\":\"7\",\"controlName\":\"Provide + evidence that remediation of all vulnerabilities identified in Control 6 are + patched in line with the minimal patching window defined in your policy\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Validate + that vulnerabilities remediation for Azure resources are patched inline with + the minimal patching window\",\"responsibilityDescription\":\"This policy + validates that vulnerabilities remediation for Azure resources are patched + inline with the minimal patching window. The minimal patching timeframe is: + Critical severity(3 business days), High severity(7 business days), Medium + severity(28 business days), Low severity(60 business days), other severity(90 + business days).\",\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"Microsoft.Resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"resourceStatus\":\"Unhealthy\",\"resourceStatusChangeDate\":\"2023-12-25T08:09:12.7230376Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"[Preview]: + All Internet traffic should be routed via your deployed Azure Firewall\",\"responsibilityDescription\":\"Azure + Security Center has identified that some of your subnets aren't protected + with a next generation firewall. Protect your subnets from potential threats + by restricting access to them with Azure Firewall or a supported next generation + firewall.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"[Preview]: + Azure Key Vault should disable public network access\",\"responsibilityDescription\":\"Disable + public network access for your key vault so that it's not accessible over + the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink + .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Adaptive + network hardening recommendations should be applied on internet facing virtual + machines\",\"responsibilityDescription\":\"Azure Security Center analyzes + the traffic patterns of Internet facing virtual machines and provides Network + Security Group rule recommendations that reduce the potential attack surface.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"API + Management services should use a virtual network\",\"responsibilityDescription\":\"Azure + Virtual Network deployment provides enhanced security, isolation and allows + you to place your API Management service in a non-internet routable network + that you control access to. These networks can then be connected to your on-premises + networks using various VPN technologies, which enables access to your backend + services within the network and/or on-premises. The developer portal and API + gateway, can be configured to be accessible either from the Internet or only + within the virtual network.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Authorized + IP ranges should be defined on Kubernetes Services\",\"responsibilityDescription\":\"Restrict + access to the Kubernetes Service Management API by granting API access only + to IP addresses in specific ranges. It is recommended to limit access to authorized + IP ranges to ensure that only applications from allowed networks can access + the cluster.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Cosmos DB accounts should have firewall rules\",\"responsibilityDescription\":\"Firewall + rules should be defined on your Azure Cosmos DB accounts to prevent traffic + from unauthorized sources. Accounts that have at least one IP rule defined + with the virtual network filter enabled are deemed compliant. Accounts disabling + public access are also deemed compliant.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + DDoS Protection Standard should be enabled\",\"responsibilityDescription\":\"DDoS + protection standard should be enabled for all virtual networks with a subnet + that is part of an application gateway with a public IP.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Web Application Firewall should be enabled for Azure Front Door entry-points\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Cognitive + Services accounts should disable public network access\",\"responsibilityDescription\":\"Disabling + public network access improves security by ensuring that Cognitive Services + account isn't exposed on the public internet. Creating private endpoints can + limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800 .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Cognitive + Services accounts should restrict network access\",\"responsibilityDescription\":\"Network + access to Cognitive Services accounts should be restricted. Configure network + rules so only applications from allowed networks can access the Cognitive + Services account. To allow connections from specific internet or on-premises + clients, access can be granted to traffic from specific Azure virtual networks + or to public internet IP address ranges.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Container + registries should not allow unrestricted network access\",\"responsibilityDescription\":\"Azure + container registries by default accept connections over the internet from + hosts on any network. To protect your registries from potential threats, allow + access from only specific public IP addresses or address ranges. If your registry + doesn't have an IP/firewall rule or a configured virtual network, it will + appear in the unhealthy resources. Learn more about Container Registry network + rules here: https://aka.ms/acr/portal/public-network + and here https://aka.ms/acr/vnet + .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Internet-facing + virtual machines should be protected with network security groups\",\"responsibilityDescription\":\"Protect + your virtual machines from potential threats by restricting access to them + with network security groups (NSG). Learn more about controlling traffic with + NSGs at https://aka.ms/nsg-doc + .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"IP + Forwarding on your virtual machine should be disabled\",\"responsibilityDescription\":\"Enabling + IP forwarding on a virtual machine's NIC allows the machine to receive traffic + addressed to other destinations. IP forwarding is rarely required (e.g., when + using the VM as a network virtual appliance), and therefore, this should be + reviewed by the network security team.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Management + ports of virtual machines should be protected with just-in-time network access + control\",\"responsibilityDescription\":\"Possible network Just In Time (JIT) + access will be monitored by Azure Security Center as recommendations.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Management + ports should be closed on your virtual machines\",\"responsibilityDescription\":\"Open + remote management ports are exposing your VM to a high level of risk from + Internet-based attacks. These attacks attempt to brute force credentials to + gain admin access to the machine.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Public + network access on Azure SQL Database should be disabled\",\"responsibilityDescription\":\"Disabling + the public network access property improves security by ensuring your Azure + SQL Database can only be accessed from a private endpoint. This configuration + denies all logins that match IP or virtual network based firewall rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Public + network access should be disabled for MariaDB servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MariaDB can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Public + network access should be disabled for MySQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MySQL can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Public + network access should be disabled for PostgreSQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for PostgreSQL can only be accessed from a private endpoint. This + configuration disables access from any public address space outside of Azure + IP range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Storage + accounts should restrict network access using virtual network rules\",\"responsibilityDescription\":\"Protect + your storage accounts from potential threats using virtual network rules as + a preferred method instead of IP-based filtering. Disabling IP-based filtering + prevents public IPs from accessing your storage accounts.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Subnets + should be associated with a Network Security Group\",\"responsibilityDescription\":\"Protect + your subnet from potential threats by restricting access to it with a Network + Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules + that allow or deny network traffic to your subnet.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Web + Application Firewall (WAF) should be enabled for Application Gateway\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that you are performing firewall rule reviews at least + every 6 months\",\"responsibilityDescription\":\"Any evidence provided needs + to be able to demonstrate that rule review meetings have been occurring. This + can be done by sharing meeting minutes of the NSC review and any additional + change control evidence that shows any actions taken from the review. Please + ensure that dates are present as the certification analyst reviewing your + submission would need to see a minimum of two of these meetings review documents + (i.e., every six months).\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"[Preview]: + All Internet traffic should be routed via your deployed Azure Firewall\",\"responsibilityDescription\":\"Azure + Security Center has identified that some of your subnets aren't protected + with a next generation firewall. Protect your subnets from potential threats + by restricting access to them with Azure Firewall or a supported next generation + firewall.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"[Preview]: + Azure Key Vault should disable public network access\",\"responsibilityDescription\":\"Disable + public network access for your key vault so that it's not accessible over + the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink + .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Adaptive + network hardening recommendations should be applied on internet facing virtual + machines\",\"responsibilityDescription\":\"Azure Security Center analyzes + the traffic patterns of Internet facing virtual machines and provides Network + Security Group rule recommendations that reduce the potential attack surface.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"API + Management services should use a virtual network\",\"responsibilityDescription\":\"Azure + Virtual Network deployment provides enhanced security, isolation and allows + you to place your API Management service in a non-internet routable network + that you control access to. These networks can then be connected to your on-premises + networks using various VPN technologies, which enables access to your backend + services within the network and/or on-premises. The developer portal and API + gateway, can be configured to be accessible either from the Internet or only + within the virtual network.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Authorized + IP ranges should be defined on Kubernetes Services\",\"responsibilityDescription\":\"Restrict + access to the Kubernetes Service Management API by granting API access only + to IP addresses in specific ranges. It is recommended to limit access to authorized + IP ranges to ensure that only applications from allowed networks can access + the cluster.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Cosmos DB accounts should have firewall rules\",\"responsibilityDescription\":\"Firewall + rules should be defined on your Azure Cosmos DB accounts to prevent traffic + from unauthorized sources. Accounts that have at least one IP rule defined + with the virtual network filter enabled are deemed compliant. Accounts disabling + public access are also deemed compliant.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + DDoS Protection Standard should be enabled\",\"responsibilityDescription\":\"DDoS + protection standard should be enabled for all virtual networks with a subnet + that is part of an application gateway with a public IP.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Web Application Firewall should be enabled for Azure Front Door entry-points\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Cognitive + Services accounts should disable public network access\",\"responsibilityDescription\":\"Disabling + public network access improves security by ensuring that Cognitive Services + account isn't exposed on the public internet. Creating private endpoints can + limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800 .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Cognitive + Services accounts should restrict network access\",\"responsibilityDescription\":\"Network + access to Cognitive Services accounts should be restricted. Configure network + rules so only applications from allowed networks can access the Cognitive + Services account. To allow connections from specific internet or on-premises + clients, access can be granted to traffic from specific Azure virtual networks + or to public internet IP address ranges.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Container + registries should not allow unrestricted network access\",\"responsibilityDescription\":\"Azure + container registries by default accept connections over the internet from + hosts on any network. To protect your registries from potential threats, allow + access from only specific public IP addresses or address ranges. If your registry + doesn't have an IP/firewall rule or a configured virtual network, it will + appear in the unhealthy resources. Learn more about Container Registry network + rules here: https://aka.ms/acr/portal/public-network + and here https://aka.ms/acr/vnet + .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Internet-facing + virtual machines should be protected with network security groups\",\"responsibilityDescription\":\"Protect + your virtual machines from potential threats by restricting access to them + with network security groups (NSG). Learn more about controlling traffic with + NSGs at https://aka.ms/nsg-doc + .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"IP + Forwarding on your virtual machine should be disabled\",\"responsibilityDescription\":\"Enabling + IP forwarding on a virtual machine's NIC allows the machine to receive traffic + addressed to other destinations. IP forwarding is rarely required (e.g., when + using the VM as a network virtual appliance), and therefore, this should be + reviewed by the network security team.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Management + ports of virtual machines should be protected with just-in-time network access + control\",\"responsibilityDescription\":\"Possible network Just In Time (JIT) + access will be monitored by Azure Security Center as recommendations.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Management + ports should be closed on your virtual machines\",\"responsibilityDescription\":\"Open + remote management ports are exposing your VM to a high level of risk from + Internet-based attacks. These attacks attempt to brute force credentials to + gain admin access to the machine.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Public + network access on Azure SQL Database should be disabled\",\"responsibilityDescription\":\"Disabling + the public network access property improves security by ensuring your Azure + SQL Database can only be accessed from a private endpoint. This configuration + denies all logins that match IP or virtual network based firewall rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Public + network access should be disabled for MariaDB servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MariaDB can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Public + network access should be disabled for MySQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MySQL can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Public + network access should be disabled for PostgreSQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for PostgreSQL can only be accessed from a private endpoint. This + configuration disables access from any public address space outside of Azure + IP range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Storage + accounts should restrict network access using virtual network rules\",\"responsibilityDescription\":\"Protect + your storage accounts from potential threats using virtual network rules as + a preferred method instead of IP-based filtering. Disabling IP-based filtering + prevents public IPs from accessing your storage accounts.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Subnets + should be associated with a Network Security Group\",\"responsibilityDescription\":\"Protect + your subnet from potential threats by restricting access to it with a Network + Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules + that allow or deny network traffic to your subnet.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Network Security Controls (NSC)\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Web + Application Firewall (WAF) should be enabled for Application Gateway\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Change Control\",\"controlId\":\"10\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that any changes introduced to production environments + are implemented through documented change requests\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Any changes introduced to production + environments are implemented through documented change requests which contain:
(i) + Impact of the change.
(ii) Details of back-out procedures.
(iii) Testing + to be carried out.
(iv) eview and approval by authorized personnel.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Change Control\",\"controlId\":\"11\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that development and test environments enforce separation + of duties and sensitive data from the production environment\",\"responsibilityDescription\":\"Please + provide evidence:

Separate environments exist so that:
(i) Development + and test/staging environments enforce separation of duties from the production + environment.
(ii) Sensitive production data is not in use within the development + or test/staging environments.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Change Control\",\"controlId\":\"11\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that separation of duties is enforced via environment + access controls\",\"responsibilityDescription\":\"Please provide evidence + that:

Separate environments exist so that separation of duties is enforced + via access controls.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Secure Software Development/Deployment\",\"controlId\":\"12\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that support secure software development and deployment, + and developers undergo secure software development training annually\",\"responsibilityDescription\":\"Please + provide evidence demonstrating documentation exists and is maintained that:

(i) + Supports the development of secure software and includes industry standards + and/or best practices for secure coding, such as OWASP Top 10 or SANS Top + 25 CWE.
(ii) Developers undergo relevant secure coding and secure software + development training annually.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Secure Software Development/Deployment\",\"controlId\":\"13\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"GitHub + repositories should have force pushes to default branch disabled\",\"responsibilityDescription\":\"As + part of evidence for code change should undergo review process, GitHub should + have force push for default branch disabled. This auto checkpoint needs to + establish a GitHub connector created by GitHub Enterprise Cloud account.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Secure Software Development/Deployment\",\"controlId\":\"13\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"GitHub + repositories should have protection policies for default branch enabled\",\"responsibilityDescription\":\"As + part of evidence for code change should undergo review process, GitHub should + have default branch protection policy enabled. This auto checkpoint needs + to establish a GitHub connector created by GitHub Enterprise Cloud account.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Secure Software Development/Deployment\",\"controlId\":\"13\",\"controlName\":\"Provide + evidence of secure code repository with code review, access controls, MFA + and reviewed production deployment\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"MFA + is enforced by GitHub for accounts with contributions\",\"responsibilityDescription\":\"Since + end of 2023, MFA is mandatory for accounts identified as contributors to GitHub.com + according to this announcement .\",\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Secure Software Development/Deployment\",\"controlId\":\"13\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that code changes and releases undergo a review, access + controls are inplace, access is enforced through MFA\",\"responsibilityDescription\":\"Please + provide evidence that code repositories are secured so that:

(i) All + code changes undergo a review and approval process by a second reviewer prior + to being merged with main branch.
(ii) Appropriate access controls are + in place.
(iii) All access is enforced through multi-factor authentication + (MFA).
(iv) All releases made into the production environment(s) are reviewed + and approved prior to their deployment.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Account Management\",\"controlId\":\"14\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a process is in place to secure (harden) service + accounts and that this process has been followed\",\"responsibilityDescription\":\"Provide + evidence that:

A process is in place to secure (harden) service accounts + and that this process has been followed.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Account Management\",\"controlId\":\"14\",\"controlName\":\"Provide + evidence of disabled, removed, or changed default credentials and hardened + service accounts processes\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"There + is no default credential in Azure\",\"responsibilityDescription\":\"It is + mandatory on Azure to create username and set password for Azure accounts. + There is no default credential which can be used to login to Azure directly. + If ISV uses Azure's service, this policy will pass directly.\",\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Account Management\",\"controlId\":\"15\",\"controlName\":\"Provide + evidence of user account management, password policy, and regular account + disabling/deletion process\",\"controlStatus\":\"PartiallyAutomated\",\"responsibilityTitle\":\"Azure + password policy can fulfill this requirement\",\"responsibilityDescription\":\"It + is mandatory on Azure to set strong password for Azure accounts. If ISV uses + Azure's service, this policy will pass directly.\",\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Account Management\",\"controlId\":\"15\",\"controlName\":\"\",\"controlStatus\":\"PartiallyAutomated\",\"responsibilityTitle\":\"Provide + evidence of user account management, privilege principles are being followed, + password policy, and regular account disabling/deletion process\",\"responsibilityDescription\":\"Provide + evidence that:

(i) Unique user accounts are issued to all users.
(ii) + User least privilege principles are being followed within the environment.
(iii) + A process is in place and followed at least every three months to either disable + or delete accounts not used within 3 months.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Account Management\",\"controlId\":\"16\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that remote access, non-console administrative interface, + code repo are secured with multi-factor authentication (MFA)\",\"responsibilityDescription\":\"Validate + that multi-factor authentication (MFA) is configured for all remote access + connections and all non-console administrative interfaces, including access + to any code repositories and Cloud management interfaces.

Meaning of + these terms:
(i) Remote Access \u2013 This refers to technologies used + to access the supporting environment. For example, Remote Access IPSec VPN, + SSL VPN or Jumpbox/Bastian Host.
(ii) Non-console Administrative Interfaces + \u2013 This refers to the network administrative connections to system components. + This could be over Remote Desktop, SSH or a web interface.
(iii) Code + Repositories \u2013 The code base of the app needs to be protected against + malicious modification which could introduce malware into the app. MFA needs + to be configured on the code repositories.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Account Management\",\"controlId\":\"16\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Accounts + with owner permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + owner permissions to prevent a breach of accounts or resources.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Account Management\",\"controlId\":\"16\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Accounts + with read permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + write privileges to prevent a breach of accounts or resources.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Account Management\",\"controlId\":\"16\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Accounts + with write permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + write privileges to prevent a breach of accounts or resources.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"[Preview]: + Azure Arc enabled Kubernetes clusters should have Azure Defender's extension + installed\",\"responsibilityDescription\":\"Azure Defender's extension for + Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. + The extension collects data from nodes in the cluster and sends it to the + Azure Defender for Kubernetes backend in the cloud for further analysis. Learn + more in https://docs.microsoft.com/azure/security-center/defender-for-kubernetes-azure-arc + .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"App + Service logs in App Services should be enabled\",\"responsibilityDescription\":\"Audit + enabling of app service logs on the app. This enables you to recreate activity + trails for investigation purposes if a security incident occurs or your network + is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Auditing + on SQL server should be enabled\",\"responsibilityDescription\":\"Auditing + on your SQL Server should be enabled to track database activities across all + databases on the server and save them in an audit log.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Application Gateway should have Resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Application Gateway (plus WAF) and stream to a Log + Analytics workspace. Get detailed visibility into inbound web traffic and + actions taken to mitigate attacks.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for App Service should be enabled\",\"responsibilityDescription\":\"Azure + Defender for App Service leverages the scale of the cloud, and the visibility + that Azure has as a cloud provider, to monitor for common web app attacks.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for Azure SQL Database servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for Key Vault should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Key Vault provides an additional layer of protection and security + intelligence by detecting unusual and potentially harmful attempts to access + or exploit key vault accounts.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for Resource Manager should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Resource Manager automatically monitors the resource management + operations in your organization. Azure Defender detects threats and alerts + you about suspicious activity. Learn more about the capabilities of Azure + Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling + this Azure Defender plan results in charges. Learn about the pricing details + per region on Security Center's pricing page: https://aka.ms/pricing-security-center .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for servers provides real-time threat protection for server workloads + and generates hardening recommendations as well as alerts about suspicious + activities.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for SQL servers on machines should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Defender for SQL should be enabled for unprotected SQL Managed Instances\",\"responsibilityDescription\":\"Audit + each SQL Managed Instance without advanced data security.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Front Door should have Resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Front Door (plus WAF) and stream to a Log Analytics + workspace. Get detailed visibility into inbound web traffic and actions taken + to mitigate attacks.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Front Door Standard or Premium (Plus WAF) should have resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Front Door Standard or Premium (plus WAF) and stream + to a Log Analytics workspace. Get detailed visibility into inbound web traffic + and actions taken to mitigate attacks.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Data + Collection Rule should collect system logs\",\"responsibilityDescription\":\"This + policy enables you check whether data collection rules collect system logs.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Linux + virtual machines should have Azure Monitor Agent installed\",\"responsibilityDescription\":\"Linux + virtual machines should be monitored and secured through the deployed Azure + Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest + OS. This policy will audit virtual machines with supported OS images in supported + regions. Learn more: https://aka.ms/AMAOverview + .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Microsoft + Defender for Containers should be enabled\",\"responsibilityDescription\":\"Microsoft + Defender for Containers provides hardening, vulnerability assessment and run-time + protections for your Azure, hybrid, and multi-cloud Kubernetes environments.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Resource + logs in Azure Data Lake Store should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Resource + logs in Azure Stream Analytics should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Resource + logs in Batch accounts should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Resource + logs in Data Lake Analytics should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Resource + logs in Event Hub should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Resource + logs in IoT Hub should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Resource + logs in Key Vault should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes when a security incident occurs or when your + network is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Resource + logs in Logic Apps should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Resource + logs in Search services should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Resource + logs in Service Bus should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Virtual + Machines should be associated with a Data Collection Rule\",\"responsibilityDescription\":\"This + policy enables you check whether virtual machines associated with a Data Collection + Rule.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"17\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Windows + virtual machines should have Azure Monitor Agent installed\",\"responsibilityDescription\":\"Windows + virtual machines should be monitored and secured through the deployed Azure + Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest + OS. Windows virtual machines with supported OS and in supported regions are + monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"18\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Log + Analytics Workspace should be configured with 90 days retention or longer\",\"responsibilityDescription\":\"For + incident investigation purposes, it is recommend to configure the data retention + of Log Analytics Workspace to at least 90 days.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"19\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that logs are being reviewed periodically and any + potential security events/anomalies identified are investiagted and addressed\",\"responsibilityDescription\":\"Provide + demonstratable evidence that Logs are being reviewed periodically and any + potential security events/anomalies identified during the reveiw process are + investiagted and addressed.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"20\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Activity + log alert should exist for high privileged operations\",\"responsibilityDescription\":\"This + policy audits specific high privileged operations with no activity log alerts + configured.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"20\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Activity + log alert should exist for write or delete Account operations\",\"responsibilityDescription\":\"This + policy audits write or delete Account operations with no activity log alerts + configured.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"20\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Alert + ruleCollections must exist for Log Analytics Workspace Monitoring\",\"responsibilityDescription\":\"Customer + must set up for Log Analytics Workspace Monitoring.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"20\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Diagnostic + settings should be set for WAF to export logs to Log Analytics workspace\",\"responsibilityDescription\":\"This + policy audit if the diagnostic settings for WAF to stream resource logs to + a Log Analytics workspace when any WAF which is missing this diagnostic settings + is created or updated.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Event Logging, Reviewing and Alerting\",\"controlId\":\"20\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Log + Analytics workspace should have read-only lock to block all activities that + could delete data\",\"responsibilityDescription\":\"Set a lock on your Log + Analytics workspace to block all activities that could delete data: purge, + table delete, and table- or workspace-level data retention changes. To learn + more about Log Analytics workspace immutability, visit https://aka.ms/monitor/lock .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Information Security Risk Management\",\"controlId\":\"21\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a ratified formal information security risk management + policy/process is documented and established\",\"responsibilityDescription\":\"A + robust information security risk management process is important to help organizations + manage risks effectively. This will help organizations plan effective mitigations + against threats to the environment. The intent of this control is to confirm + that the organization has a formally ratified information security risk management + policy or process that is comprehensively documented. The policy should outline + how the organization identifies, assesses, and manages information security + risks. It should include roles and responsibilities, methodologies for risk + assessment, criteria for risk acceptance, and procedures for risk mitigation.

Note: + The risk assessment must focus on information-security risks, not just general + business risks.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Information Security Risk Management\",\"controlId\":\"22\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a formal company-wide information security risk + assessment is carried out at least annually or a targeted risk analysis is + documented and performed\",\"responsibilityDescription\":\"Please provide + evidence demonstrating that:

(A) Formal company-wide information security + risk assessment is carried out at least annually.

OR For targeted risk + analysis:

(B) A targeted risk analysis is documented and performed:
+ (i) At a minimum every 12 months for every instance where a traditional control + or industry best practice is not in place.
(ii) Where a design/technological + limitation creates a risk of introducing a vulnerability into the environment/puts + users and data at risk.
(iii) Upon suspicion or confirmation of compromise.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Information Security Risk Management\",\"controlId\":\"23\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the information security risk assessment includes + affected resources, threats and vulnerabilities, impact, and risk treatment + plan\",\"responsibilityDescription\":\"Validate that the information security + risk assessment includes:

(i) System component or resource affected.
+ (ii) Threats and vulnerabilities, or equivale.
(iii) Impact and likelihood + matrices or equivalent.
(iv) The creation of a risk register / risk treatment + plan.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Information Security Risk Management\",\"controlId\":\"24\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that risk management processes are in place, and ability + to identify changes and risks that could impact your system of internal controls\",\"responsibilityDescription\":\"Please + provide evidence that:

(i) You (ISV) have risk management processes + in place that assesses and manages risks associated with vendors and business + partners.
(ii) You (ISV) can identify and assess changes and risks that + could impact your system of internal controls.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Incident Response\",\"controlId\":\"25\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that a ratified incident response plan/procedure (IRP) + with contact information, communication plan, and recovery steps\",\"responsibilityDescription\":\"Please + provide your ratified security incident response plan/procedure (IRP) outlining + how your organization responds to incidents, showing how it is maintained, + and that it includes:

(i) Details of the incident response team including + contact information,
(ii) An internal communication plan during the incident + and external communication to relevant parties such as key stakeholders, payment + brands and acquirers, regulatory bodies (for example 72 hours for GDPR), supervisory + authorities, directors, customers,
(iii) Steps for activities such as + incident classification, containment, mitigation, recovery and returning to + normal business operations depending on the type of incident.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Incident Response\",\"controlId\":\"26\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that all members of the incident response team have + received annual training that enables them to respond to incidents\",\"responsibilityDescription\":\"Please + provide evidence which shows that:

All members of the incident response + team have received annual training that enables them to respond to incidents.

Evidence + should be provided which demonstrates training has been carried out by means + of sharing the training content, and records showing who attended (which should + include all the incident response team). Alternatively, or as well as, records + showing that a tabletop exercise has been carried out. All this must have + been completed within a 12-month period from when the evidence is submitted.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Security Incident Response\",\"controlId\":\"27\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence to show the incident response strategy and supporting + documentation is reviewed and updated based on the lessons learned from exercise + or incident\",\"responsibilityDescription\":\"Please provide evidence that:

The + incident response strategy and supporting documentation is reviewed and updated + based on either:

(i) Lessons learned from a tabletop exercise
+ (ii) Lessons learned from responding to an incident
(iii) Organizational + changes\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Business Continuity Plan (BCP) and Disaster + Recovery Plan\",\"controlId\":\"28\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that documentaion exists, and is maintained, which + outlines the business continuity plan\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Documentation exists, and is maintained, + which outlines the business continuity plan and includes:
(i) Details + of relevant personnel including their roles and responsibilities
(ii) + Business functions with associated contingency requirements and objectives
+ (iii) System and data backup procedures, configuration, and scheduling/retention
+ (iv) Recovery priority and timeframe targets
(v) A contingency plan detailing + actions, steps, and procedures to be followed to return critical information + systems, business functions and services to operation in the event of an unexpected + and unscheduled interruption
(vi) An established process that covers the + eventual full system restoration and return to the original state\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Business Continuity Plan (BCP) and Disaster + Recovery Plan\",\"controlId\":\"29\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that documentation exists, and is maintained, which + outlines the disaster recovery plan\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Documentation exists, and is maintained, + which outlines the disaster recovery plan and includes at a minimum:
(i) + Details of relevant personnel including their roles and responsibilities
+ (ii) Business functions with associated contingency requirements and objectives
+ (iii) System and data backup procedures, configuration, and scheduling/retention
+ (iv) Recovery priority and timeframe targets
(v) A contingency plan detailing + actions, steps, and procedures to be followed to return critical information + systems, business functions and services to operation in the event of an unexpected + and unscheduled interruption
(vi) An established process that covers the + eventual full system restoration and return to the original state\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Operational + Security\",\"controlFamilyName\":\"Business Continuity Plan (BCP) and Disaster + Recovery Plan\",\"controlId\":\"30\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the business continuity plan and the disaster + recovery plan are being reviewed and updated at least every 12 months to ensure + that it remains valid and effective\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

The business continuity plan and + the disaster recovery plan are being reviewed at least every 12 months to + ensure that it remains valid and effective during adverse situations, and + is updated based on:
(i) Annual review of the plan.
(ii) All relevant + personnel receive training on their roles and responsibilities assigned in + the contingency plans.
(iii) The plan/s are tested through business continuity + or disaster recovery exercises.
(iv) Test results are documented including + lessons learned from exercises or organizational changes.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"App + Service app slots should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"App + Service app slots should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"App + Service app slots should use the latest TLS version\",\"responsibilityDescription\":\"Periodically, + newer versions are released for TLS either due to security flaws, include + additional functionality, and enhance speed. Upgrade to the latest TLS version + for App Service apps to take advantage of security fixes, if any, and/or new + functionalities of the latest version.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"App + Service apps should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"App + Service apps should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"App + Service apps should use the latest TLS version\",\"responsibilityDescription\":\"Upgrade + to the latest TLS version.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"App + Service Environment should disable TLS 1.0 and 1.1\",\"responsibilityDescription\":\"TLS + 1.0 and 1.1 are out-of-date protocols that do not support modern cryptographic + algorithms. Disabling inbound TLS 1.0 and 1.1 traffic helps secure apps in + an App Service Environment.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Active Directory Domain Services managed domains should use TLS 1.2 only mode\",\"responsibilityDescription\":\"Use + TLS 1.2 only mode for your managed domains. By default, Azure AD Domain Services + enables the use of ciphers such as NTLM v1 and TLS v1. These ciphers may be + required for some legacy applications, but are considered weak and can be + disabled if you don't need them. When TLS 1.2 only mode is enabled, any client + making a request that is not using TLS 1.2 will fail. Learn more at https://docs.microsoft.com/azure/active-directory-domain-services/secure-your-domain + .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Front Door Standard and Premium should be running minimum TLS version of 1.2\",\"responsibilityDescription\":\"Setting + minimal TLS version to 1.2 improves security by ensuring your custom domains + are accessed from clients using TLS 1.2 or newer. Using versions of TLS less + than 1.2 is not recommended since they are weak and do not support modern + cryptographic algorithms.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + SQL Database should be running TLS version 1.2 or newer\",\"responsibilityDescription\":\"Setting + TLS version to 1.2 or newer improves security by ensuring your Azure SQL Database + can only be accessed from clients using TLS 1.2 or newer. Using versions of + TLS less than 1.2 is not recommended since they have well documented security + vulnerabilities.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Synapse Workspace SQL Server should be running TLS version 1.2 or newer\",\"responsibilityDescription\":\"Setting + TLS version to 1.2 or newer improves security by ensuring your Azure Synapse + workspace SQL server can only be accessed from clients using TLS 1.2 or newer. + Using versions of TLS less than 1.2 is not recommended since they have well + documented security vulnerabilities.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Container + Apps should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks. Disabling 'allowInsecure' will result + in the automatic redirection of requests from HTTP to HTTPS connections for + container apps.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Enforce + SSL connection should be enabled for MySQL database servers\",\"responsibilityDescription\":\"Azure + Database for MySQL supports connecting your Azure Database for MySQL server + to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections + between your database server and your client applications helps protect against + 'man in the middle' attacks by encrypting the data stream between the server + and your application. This configuration enforces that SSL is always enabled + for accessing your database server.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Enforce + SSL connection should be enabled for PostgreSQL database servers\",\"responsibilityDescription\":\"Azure + Database for PostgreSQL supports connecting your Azure Database for PostgreSQL + server to client applications using Secure Sockets Layer (SSL). Enforcing + SSL connections between your database server and your client applications + helps protect against 'man in the middle' attacks by encrypting the data stream + between the server and your application. This configuration enforces that + SSL is always enabled for accessing your database server.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"FTPS + only should be required in your Function App\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Function + App should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Function + app slots should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Function + app slots should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Function + app slots should use the latest TLS version\",\"responsibilityDescription\":\"Periodically, + newer versions are released for TLS either due to security flaws, include + additional functionality, and enhance speed. Upgrade to the latest TLS version + for Function apps to take advantage of security fixes, if any, and/or new + functionalities of the latest version.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"HDInsight + should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your HSInsight cluster is public facing, then TLS latest version should be + used to secure your cluster.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Iot + Hub should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your Iot Hub is public facing, then TLS latest version should be used to secure + your resource.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Kubernetes + clusters should be accessible only over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures authentication and protects data in transit from network + layer eavesdropping attacks. This capability is currently generally available + for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc + enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Latest + TLS version should be used in your Function App\",\"responsibilityDescription\":\"Upgrade + to the latest TLS version.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"MariaDB + should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your MariaDB is public facing, then TLS latest version should be used to secure + your DB.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Only + secure connections to your Azure Cache for Redis should be enabled\",\"responsibilityDescription\":\"Audit + enabling of only connections via SSL to Azure Cache for Redis. Use of secure + connections ensures authentication between the server and the service and + protects data in transit from network layer attacks such as man-in-the-middle, + eavesdropping, and session-hijacking.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Publicly + accessible cache for Redis should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"This + policy enables you to check if the Redis instance's TLS version is the latest.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Publicly + accessible MySQL Database should enable SSL enforcement and should have the + minimal TLS version of 1.2\",\"responsibilityDescription\":\"This policy enables + you to check if the MySQL instance's sslEnforcement enabled and TLS version + is the latest.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Publicly + accessible PostgreSQL server should enable SSL enforcement and should have + the minimal TLS version of 1.2\",\"responsibilityDescription\":\"This policy + enables you to check if the PostgreSQL instance's sslEnforcement enabled and + TLS version is the latest.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Secure + transfer to storage accounts should be enabled\",\"responsibilityDescription\":\"Audit + requirement of Secure transfer in your storage account. Secure transfer is + an option that forces your storage account to accept requests only from secure + connections (HTTPS). Use of HTTPS ensures authentication between the server + and the service and protects data in transit from network layer attacks such + as man-in-the-middle, eavesdropping, and session-hijacking.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"SQL + Managed Instance should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"Setting + minimal TLS version to 1.2 improves security by ensuring your SQL Managed + Instance can only be accessed from clients using TLS 1.2. Using versions of + TLS less than 1.2 is not recommended since they have well documented security + vulnerabilities.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"SSL + Policy of Application gateway listener should have the minimal TLS version + of 1.2\",\"responsibilityDescription\":\"This policy enables you to check + if the TLS version of the listener's SSL policy is the latest, designed for + the application gateway.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Storage + accounts should have the specified minimum TLS version\",\"responsibilityDescription\":\"Configure + a minimum TLS version for secure communication between the client application + and the storage account. To minimize security risk, the recommended minimum + TLS version is the latest released version, which is currently TLS 1.2.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"TLS + protocol 1.2 must be used for Arc SQL managed instances\",\"responsibilityDescription\":\"As + a part of network settings, Microsoft recommends allowing only TLS 1.2 for + TLS protocols in SQL Servers. Learn more on network settings for SQL Server + at https://aka.ms/TlsSettingsSQLServer + .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"1\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Windows + web servers should be configured to use secure communication protocols\",\"responsibilityDescription\":\"To + protect the privacy of information communicated over the Internet, your web + servers should use the latest version of the industry-standard cryptographic + protocol, Transport Layer Security (TLS). TLS secures communications over + a network by using security certificates to encrypt a connection between machines.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"2\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that TLS compression is disabled across all public-facing + services that handle web requests\",\"responsibilityDescription\":\"There + is a specific TLS vulnerability, CRIME (CVE-2012-4929), which affects TLS Compression. For this + reason, industry recommendations are to turn this functionality off. ACAT + will leverage the python module sslyze(https://pypi.org/project/sslyze/) to check the TLS compression + status.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data in Transit\",\"controlId\":\"2\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Validate + that TLS HSTS is enabled and configured to >= 15552000 across all sites\",\"responsibilityDescription\":\"HTTP + Strict Transport Security (HSTS) is a security mechanism designed to protect + websites against man-in-the-middle attacks by forcing TLS connections by way + of an HTTPS response header field named \\\"Strict-Transport-Security\\\". + ACAT will call the hostname which ISVs provide to check the response headers + whether enable the HSTS header correctly.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Automation + account variables should be encrypted\",\"responsibilityDescription\":\"It + is important to enable encryption of Automation account variable assets when + storing sensitive data.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + HDInsight clusters should use encryption at host to encrypt data at rest\",\"responsibilityDescription\":\"Enabling + encryption at host helps protect and safeguard your data to meet your organizational + security and compliance commitments. When you enable encryption at host, data + stored on the VM host is encrypted at rest and flows encrypted to the Storage + service.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Synapse Analytics dedicated SQL pools should enable encryption\",\"responsibilityDescription\":\"Enable + transparent data encryption for Azure Synapse Analytics dedicated SQL pools + to protect data-at-rest and meet compliance requirements. Please note that + enabling transparent data encryption for the pool may impact query performance. + More details can refer to https://go.microsoft.com/fwlink/?linkid=2147714 .\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Disk + encryption should be enabled on Azure Data Explorer\",\"responsibilityDescription\":\"Enabling + disk encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Double + encryption should be enabled on Azure Data Explorer\",\"responsibilityDescription\":\"Enabling + double encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments. When double encryption has been enabled, + data in the storage account is encrypted twice, once at the service level + and once at the infrastructure level, using two different encryption algorithms + and two different keys.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Event + Hub namespaces should have double encryption enabled\",\"responsibilityDescription\":\"Enabling + double encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments. When double encryption has been enabled, + data in the storage account is encrypted twice, once at the service level + and once at the infrastructure level, using two different encryption algorithms + and two different keys.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"Provide + evidence that data at rest is encrypted in line with the encryption profile + requirements, using encryption algorithms such as AES, Blowfish, TDES and + encryption key sizes of 128-bit, and 256-bit\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Most + storages in Azure are encrypted by default with Microsoft-managed keys encryption\",\"responsibilityDescription\":\"Azure + Database for MySQL, Azure PostgreSQL, SQL Database, Azure SQL Managed Instance, + SQL Server, Azure Cosmos DB, Event Hubs, SQL managed instances, Storage account, + Azure Synapse Analytics, Azure Batch accounts, Azure Kubernetes Service (AKS), + Virtual Machines, Azure Container registries, Azure HPC Cache, etc., are encrypted + by default with Microsoft-managed keys encryption. More resource types can + refer to this doc.\",\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.287Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Queue + Storage should use customer-managed key for encryption\",\"responsibilityDescription\":\"Secure + your queue storage with greater flexibility using customer-managed keys. When + you specify a customer-managed key, that key is used to protect and control + access to the key that encrypts your data. Using customer-managed keys provides + additional capabilities to control rotation of the key encryption key or cryptographically + erase data.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Require + encryption on Data Lake Store accounts\",\"responsibilityDescription\":\"This + policy ensures encryption is enabled on all Data Lake Store accounts.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Storage + account encryption scopes should use double encryption for data at rest\",\"responsibilityDescription\":\"Enable + infrastructure encryption for encryption at rest of your storage account encryption + scopes for added security. Infrastructure encryption ensures that your data + is encrypted twice.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data At Rest\",\"controlId\":\"3\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Transparent + Data Encryption on SQL databases should be enabled\",\"responsibilityDescription\":\"Transparent + data encryption should be enabled to protect data-at-rest and meet compliance + requirements.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Retention, Back-up and Disposal\",\"controlId\":\"4\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that an approved and documented data retention period + is formally established\",\"responsibilityDescription\":\"Please provide proof + that an approved data retention period is formally established and documented.

Supply + the full data retention policy which clearly details how long data (must cover + all data types) should be kept for so the business can perform its business + functions.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Retention, Back-up and Disposal\",\"controlId\":\"5\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that retained data matches defined retention period\",\"responsibilityDescription\":\"Provide + screenshot evidence (or via screenshare) showing that stored data (in all + the various data locations, i.e., databases, file shares, archives, etc.) + does not exceed the defined data retention policy. Examples could be screenshots + of:

(i) Database records with a date field, searched in oldest record + order, and/or
(ii) File storage locations showing timestamps that are within + the retention period Note: Any personal/sensitive customer data should be + redacted within the screenshot.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Retention, Back-up and Disposal\",\"controlId\":\"6\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that processes are in place to securely delete data + after its retention period\",\"responsibilityDescription\":\"If the deletion + process is done programmatically, then provide a screenshot of the script + that is used to perform this. If it is executed on a schedule, provide a screenshot + showing the schedule. For example, a script to delete files within a file + share may be configured as a CRON job, screenshot the CRON job showing the + schedule and the script which is executed; and provide the script showing + the command used.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Retention, Back-up and Disposal\",\"controlId\":\"6\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that the retention policy of your Azure resources meet + your data deletion tetention period\",\"responsibilityDescription\":\"Most + Azure databses (i.e., CosmosDB, Azure SQL Database, MySQL Database, etc.) + have default retention period for the backup data and it can also be configured. + The retention period of Azure backup data should also be considered in your + defined data retention policy. Please provide screenshot showing the backup + retention period of your Azure database services (i.e., databases, file shares, + archives, etc.)\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Retention, Back-up and Disposal\",\"controlId\":\"7\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that appropriate access controls and protection mechanisms + are implemented to ensure backups are secured against unauthorized access\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Appropriate access controls and + protection mechanisms (i.e., immutable backups) are implemented to ensure + backups/ system snapshots are secured against unauthorized access and to ensure + the confidentiality, integrity, and availability of the backup data.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Retention, Back-up and Disposal\",\"controlId\":\"7\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Database for MySQL Flexible Server instance should be configured to backup + automatically\",\"responsibilityDescription\":\"By default, Azure Database + for MySQL flexible server enables automated backups of your entire server + (encompassing all databases created) with a default 7-day retention period. + You can also trigger a manual backup using On-Demand backup feature.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Retention, Back-up and Disposal\",\"controlId\":\"7\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + Database for PostgreSQL Flexible Server instance should be configured to backup + automatically\",\"responsibilityDescription\":\"Azure Database for PostgreSQL + flexible server automatically performs regular backups of your server. You + can then do a point-in-time recovery (PITR) within a retention period that + you specify.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Retention, Back-up and Disposal\",\"controlId\":\"7\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Azure + SQL Database should be configured to backup automatically\",\"responsibilityDescription\":\"Azure + SQL Database comes with a core resiliency and reliability promise that protects + it against software or hardware failures. Database backups are automated to + protect your data from corruption or accidental deletion.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Retention, Back-up and Disposal\",\"controlId\":\"7\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Cosmos + DB should be configured to backup automatically\",\"responsibilityDescription\":\"Azure + Cosmos DB automatically takes backups your data at regular intervals. The + automatic backups are taken without affecting the performance or availability + of the database operations.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Retention, Back-up and Disposal\",\"controlId\":\"7\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that automated backup system is in place and backup + infromation is tested in line with backup scheduling\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

(i) An automated backup system + is in place and configured to perform backups at scheduled times.
(ii) + Backup information is tested in line with the backup scheduling procedure + and restored periodically to confirm the reliability and integrity of the + data.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Access Management\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + a list of all individuals with access to data or encryption keys, including + the business justification\",\"responsibilityDescription\":\"Provide evidence + to demonstrate that a list of individuals with access to data and/or encryption + keys is maintained including the business justification for each individual.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Access Management\",\"controlId\":\"8\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the individuals with access to data or encryption + keys were formally approved and outlined with documentation\",\"responsibilityDescription\":\"Provide + evidence to demonstrate that a list of individuals with access to data and/or + encryption keys:

(i) Were formally approved based on access privileges + required for their job function.
(ii) Are configured with the privileges + outlined in the approval.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Data Access Management\",\"controlId\":\"9\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a list of all third parties that data is shared + with is maintained and data sharing agreements are in place with all third-parties + consuming data\",\"responsibilityDescription\":\"Provide evidence that:

(i) + A list of all third parties that data is shared with is maintained.
(ii) + Data sharing agreements are in place with all third-parties consuming data.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Privacy\",\"controlId\":\"10\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + evidence demonstrating that your organization have a Privacy Information Management + (PIM) system established, implemented, and maintained\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that your organization have a Privacy Information + Management (PIM) system established, implemented, and maintained that:

(i) + Holds leadership commitment by way of a policy or other form of documentation/computerized + system for how your privacy information management efforts are maintained + for system confidentiality and integrity.
(ii) Determines roles, responsibilities + and authorities of each person maintaining the system, including PII Processors + and Controllers.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"Privacy\",\"controlId\":\"11\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + evidence demonstrating that PII minimization is taking place, PII de-identification + and deletion is being done, and controls & record are in place for PII transmission\",\"responsibilityDescription\":\"Provide + evidence of processes to show that:

(i) PII minimization is taking + place.
(ii) PII de-identification and deletion is being done at the end + of the processing period.
(iii) Controls are in place for PII transmission + including any confidentiality.
(iv) Record of transfer of PII from one + country/region to another exists with expressed consent to do so.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"GDPR\",\"controlId\":\"12\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that data subjects are able to raise SARs and you (the + ISV) are able to identify all locations of data subjects' data when responding + to a SARs request\",\"responsibilityDescription\":\"Provide evidence demonstrating + that:

(i) Data subjects are able to raise SARs.
(ii) Validate + that you (the ISV) are able to identify all locations of data subjects' data + when responding to a SARs request.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"GDPR\",\"controlId\":\"12\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that there is a retention period for backups which allows + clients requesting removal of data via SARs to be removed as rolling backups + over a period are removed\",\"responsibilityDescription\":\"Provide evidence + demonstrating that:

That there is a retention period for backups which + allows clients requesting removal of data via SARs to be removed as rolling + backups over a period are removed (lifecycle of oldest back up deletions/rewritten + over).\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"GDPR\",\"controlId\":\"13\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that a privacy notice with essential information, including + details of personal data types, and data subject rights are provided\",\"responsibilityDescription\":\"Please + provide the privacy notice which should contain all the required elements + as follows:

(i) Entities details (Name, Address, etc.)
(ii) Details + of the type of personal data being processed.
(iii) Details how long personal + data will be kept for.
(iv) Details of the lawfulness of processing personal + data.
(v) Details of data subject's rights:
- Right to be informed
+ \ - Right of access by the data subject
- Right to erasure
- + Right to restriction of processing
- Right to data portability
- + Right to object
- Rights in relation to automated decision-making, including + profiling\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"HIPAA\",\"controlId\":\"14\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that HIPAA policy existence, ePHI confidentiality, integrity, + availability assurance, and security protection are provided\",\"responsibilityDescription\":\"Please + provide demonstratable evidence that:

(i) A policy exists for HIPAA + and HIPAA handling within your organization for staff, contractors etc.
(ii) + ISV is ensuring the confidentiality, integrity, and availability of ePHI that + it creates, receives, maintains, or transmits.
(iii) Protect against any + reasonably anticipated threats and hazards to the security or integrity of + ePHI.\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"},{\"categoryName\":\"Data + Security & Privacy\",\"controlFamilyName\":\"HIPAA\",\"controlId\":\"15\",\"controlName\":\"\",\"controlStatus\":\"FullyAutomated\",\"responsibilityTitle\":\"Provide + demonstrable evidence that you protect private information, ensure staff follows + security rules, and data backup and disaster recovery plan are in place\",\"responsibilityDescription\":\"Please + provide evidence that you (ISV):

(i) Protects against reasonably anticipated + uses or disclosures of such information that are not permitted by the Privacy + Rule; and
(ii) Ensure compliance with the Security Rule by its workforce.
(iii) + Data backup and Disaster recovery plan under 164..308 (a)(7)(ii)(A) and 164.308 + (a)(7)(ii)(B).\",\"resourceId\":\"-\",\"resourceType\":\"-\",\"resourceOrigin\":\"-\",\"resourceStatus\":\"-\",\"resourceStatusChangeDate\":\"2024-06-18T06:22:18.865Z\"}]}" + headers: + cache-control: + - no-store, no-cache + content-length: + - '133644' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:22:18 GMT + mise-correlation-id: + - 8475271f-a183-4024-8a2d-cf0a2fb6e103 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062218Z-r15f4699bb7l9ftj5vm5cew1q4000000051g00000000envf + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 7ab6088b84bee07c21893509955c4121 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: 893A1F4A292440FABF1BE4894F9C768E Ref B: TYO201100116009 Ref C: 2024-06-18T06:22:18Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report show + Connection: + - keep-alive + ParameterSetName: + - --report-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351","name":"crstatustest-prod-20240617200351","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-17T20:06:17.8922461Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-17T20:06:17.8922461Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-18T23:00:00Z","lastTriggerTime":"2024-06-17T23:03:14.127Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CRStatusRG-prod-20240617200351/providers/Microsoft.Storage/storageAccounts/appprod20240617200351","resourceType":"Microsoft.Storage/storageAccounts","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1174' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:22:19 GMT + mise-correlation-id: + - 5605469f-8d14-4448-a473-c2804a79a431 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062219Z-r15f4699bb7hqbcdwvu1x1typs00000004zg000000011tby + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - e53412ecc28529b94b02febc7ec7177c + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 526ED9EDB2024D5CA9792540D45E72DB Ref B: TYO201151004029 Ref C: 2024-06-18T06:22:19Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report download + Connection: + - keep-alive + ParameterSetName: + - --report-name --download-type + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots?$skipToken=0&$top=1&api-version=2024-06-27 + response: + body: + string: "{\"value\":[{\"id\":\"/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots/crstatustest-prod-20240617200351-20240617T230307-487Z\",\"name\":\"crstatustest-prod-20240617200351-20240617T230307-487Z\",\"type\":\"Microsoft.AppComplianceAutomation/reports/snapshots\",\"properties\":{\"snapshotName\":\"crstatustest-prod-20240617200351-20240617T230307-487Z\",\"createdAt\":\"2024-06-17T23:03:08.288Z\",\"provisioningState\":\"Succeeded\",\"reportProperties\":{\"timeZone\":\"China + Standard Time\",\"triggerTime\":\"2023-01-08T23:00:00Z\",\"resources\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CRStatusRG-prod-20240617200351/providers/Microsoft.Storage/storageAccounts/appprod20240617200351\",\"resourceType\":\"Microsoft.Storage/storageAccounts\",\"resourceOrigin\":null,\"accountId\":null}],\"status\":\"Active\",\"errors\":[],\"tenantId\":\"72f988bf-86f1-41af-91ab-2d7cd011db47\",\"offerGuid\":\"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf\",\"nextTriggerTime\":\"2024-06-18T23:00:00Z\",\"lastTriggerTime\":\"2024-06-17T23:03:08.194Z\",\"subscriptions\":[\"120b982f-6bd3-4b60-98d2-a7b7ecd6c78e\"],\"complianceStatus\":{\"m365\":{\"passedCount\":1,\"failedCount\":37,\"manualCount\":0,\"notApplicableCount\":6,\"pendingCount\":1}},\"provisioningState\":\"Succeeded\"},\"reportSystemData\":{\"createdBy\":\"\",\"createdByType\":\"User\",\"createdAt\":\"2024-06-17T20:06:17.8922461Z\",\"lastModifiedBy\":\"\",\"lastModifiedByType\":\"User\",\"lastModifiedAt\":\"2024-06-17T20:06:17.8922461Z\"},\"complianceResults\":[{\"complianceName\":\"M365\",\"categories\":[{\"categoryName\":\"Operational + Security\",\"categoryStatus\":\"Failed\",\"controlFamilies\":[{\"controlFamilyName\":\"Awareness + Training\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_1\",\"controlName\":\"Provide + evidence of established security awareness training, frequency and records + monitoring for all information system users\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The organization provides established security awareness + training to information system users (including managers, senior executives, + and contractors) :
(i) As part of initial training for new users
OR
(ii) + When required by information system changes

B) You have organization-defined + frequency of awareness training

C) You document and monitor individual + information system security awareness activites and retain individual training + records over an organization-defined frequency

\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control1\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that you have established security awareness training + to information system users\",\"responsibilityDescription\":\"Provide evidence + that:

A) The organization provides established security awareness training + to information system users (including managers, senior executives, and contractors):
+ (i) As part of initial training for new users
OR
(ii) When required + by information system changes

B) Organization-defined frequency of + awareness training.

C) Documents and monitors individual information + system security awareness activities and retains individual training records + over an organization-defined frequency.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-awareness-training\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Malware + Protection - Anti-Malware\",\"controlFamilyStatus\":\"NotApplicable\",\"controls\":[{\"controlId\":\"Operational_Security_2\",\"controlName\":\"Provide + evidence of active anti-malware solution meeting specific criteria including + on-access scanning and blocking capabilities\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that your anti-malware solution is active and enabled across all + the sampled system components and configured to meet the following criteria:

A) + If Anti Virus, then on-access scanning is enabled and that signatures are + up-to-date within 1-day

B) If Anti Virus, then it automatically blocks + malware or alerts and quarantines when malware is detected

OR

C) + If Endpoint Detection and Threat Response(EDTR)/Endpoint Detection and Protection + Response(EDPR)/Hueristic based scanning using AI then:
(i) periodic scanning + is being performed
(ii) it is generating audit logs
(iii) it is kept + up-to date continually and has self-learning capabilities

D) If EDTR/EDPR/Hueristic + based scanning using AI then:
(i) it blocks known malware
(ii) it identifies + and blocks new malware variants based on macro behaviours as well as having + full safelist capabilities\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control2\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"antivirus_software_or_ms_defender_should_be_enabled\",\"responsibilityTitle\":\"Antivirus + software or Microsoft Defender should be enabled\",\"responsibilityDescription\":\"This + control monitors if Antivirus software or Microsoft Defender is be enabled.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op2_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-antivirus-software\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Malware + Protection - Application Control\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_3\",\"controlName\":\"Provide + evidence of approved software list and active application control technology + with configuration documentation\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that the following controls are in place:

A) You have an approved + list of software/applications with business justification that:

(i) + exists and is kept up to date
(ii) each application undergoes an approval + process and sign off prior to its deployment

B) That application control + technology is active, enabled, and configured across all the sampled system + components as documented\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control3\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_3_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence of approved software list and active application control + technology with configuration documentation\",\"responsibilityDescription\":\"Provide + evidence that the following controls are in place:

A) You have an approved + list of software/applications with business justification that:
(i) exists + and is kept up to date
(ii) each application undergoes an approval process + and sign off prior to its deployment

B) That application control technology + is active, enabled, and configured across all the sampled system components + as documented\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-approval-process-for-applications\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Patch + Management - Patching & Risk Ranking\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_4\",\"controlName\":\"Provide + evidence of comprehensive patch management documentation including patch windows, + decommissioning of unsupported OS/software, and vulnerability identification\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:
A) Patch management policy and procedure documentation defines + all of the following:

i) suitable minimal patching window/s from vendor + patch release or from when coding vulnerabilities are first identified for + Critical/High and Medium risks vulnerabilities.
ii) decommissioning of + unsupported operating systems and software
(ii) details on how new security + vulnerabilities are identified and assigned a risk score\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control4\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_4_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence of comprehensive patch management documentation including + patch windows, decommissioning, and vulnerability identification\",\"responsibilityDescription\":\"Provide + evidence that:

A) Patch management policy and procedure documentation + defines all of the following:
(i) suitable minimal patching window/s from + vendor patch release or from when coding vulnerabilities are first identified + for Critical/High and Medium risks vulnerabilities.
(ii) decommissioning + of unsupported operating systems and software
(iii) details on how new + security vulnerabilities are identified and assigned a risk score\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-minimal-patching-windows\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_5\",\"controlName\":\"Provide + demonstratable evidence that all sampled system components are being patched + and unsupported OS and software components are not in use\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) All sampled system components are being patched
B) + Unsupported operating systems and software components are not in use

Where + applicable this should include code base if serverless technology or PaaS + is used, or both infrastructure and code base if IaaS is used\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control5\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_5_3_manual_cr_aws\",\"responsibilityTitle\":\"Provide + demonstratable evidence that historical patching operations of AWS EC2 instances + are within the minimum patching window\",\"responsibilityDescription\":\"Provide + demonstratable evidence that historical patching operation of AWS EC2 instances + are within the minimum patching window.
The minimal patching timeframe + is:
- Critical severity (14 days),
- High severity (30 days),
+ - Medium severity (60 days).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-unsupported-operating-systems-and-software\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_5_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that unsupported operating systems and software components + are not in use for Azure Virtual Machines\",\"responsibilityDescription\":\"Provide + demonstratable evidence that unsupported operating systems and software components + are not in use for Azure Virtual Machines.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-unsupported-operating-systems-and-software\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_5_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence to show all the software are being patched\",\"responsibilityDescription\":\"Provide + demonstratable evidence to show all sampled system components are being patched.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-software-list-and-patching\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Vulnerability + Scanning\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_6\",\"controlName\":\"Provide + evidence of quarterly infrastructure and web vulnerability scanning is carried + out against public and internal IPs/URLs\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Quarterly infrastructure and web application vulnerability + scanning is carried out.

(If Hybrid, On-prem or IaaS: This needs + to be carried out against the public footprint (IPs/URLs) and internal IP + ranges OR
If PaaS: This needs to be carried out on external infratructure + and web assessment only).

(Must include the full scope of the environment)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control6\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"azure_defender_for_app_service_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for App Service should be enabled\",\"responsibilityDescription\":\"Azure + Defender for App Service leverages the scale of the cloud, and the visibility + that Azure has as a cloud provider, to monitor for common web app attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-app-service\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_azure_sql_database_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Azure SQL Database servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-database-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Key Vault should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Key Vault provides an additional layer of protection and security + intelligence by detecting unusual and potentially harmful attempts to access + or exploit key vault accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_resource_manager_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Resource Manager should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Resource Manager automatically monitors the resource management + operations in your organization. Azure Defender detects threats and alerts + you about suspicious activity. Learn more about the capabilities of Azure + Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling + this Azure Defender plan results in charges. Learn about the pricing details + per region on Security Center's pricing page: https://aka.ms/pricing-security-center .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-resource-manager\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for servers provides real-time threat protection for server workloads + and generates hardening recommendations as well as alerts about suspicious + activities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_servers_on_machines_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for SQL servers on machines should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-on-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_should_be_enabled_for_unprotected_sql_managed_instances\",\"responsibilityTitle\":\"Azure + Defender for SQL should be enabled for unprotected SQL Managed Instances\",\"responsibilityDescription\":\"Audit + each SQL Managed Instance without advanced data security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"microsoft_defender_for_containers_should_be_enabled\",\"responsibilityTitle\":\"Microsoft + Defender for Containers should be enabled\",\"responsibilityDescription\":\"Microsoft + Defender for Containers provides hardening, vulnerability assessment and run-time + protections for your Azure, hybrid, and multi-cloud Kubernetes environments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-containers\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_7\",\"controlName\":\"Provide + evidence that remediation of all vulnerabilities identified in Control 6 are + patched in line with the minimal patching window defined in your policy\",\"controlFullName\":\"\",\"controlDescription\":\" + Provide rescan evidence that:

A) Remediation of all vulnerabilities + identified in control 6 are patched inline with the minimal patching window + defined in your policy\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control7\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"validate_that_vulnerabilities_remediation_are_patched_inline_with_the_minimal_patching_window\",\"responsibilityTitle\":\"Validate + that vulnerabilities remediation for Azure resources are patched inline with + the minimal patching window\",\"responsibilityDescription\":\"This policy + validates that vulnerabilities remediation for Azure resources are patched + inline with the minimal patching window. The minimal patching timeframe is: + Critical severity(3 business days), High severity(7 business days), Medium + severity(28 business days), Low severity(60 business days), other severity(90 + business days).\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":1,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"Microsoft.Resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Unhealthy\",\"resourceStatusChangeDate\":\"2023-12-25T08:09:12.7230376Z\",\"recommendationIds\":[\"validate-that-vulnerabilities-remediation-are-patched-inline-with-the-minimal-patching-window\"]}],\"recommendationList\":[{\"recommendationId\":\"validate-that-vulnerabilities-remediation-are-patched-inline-with-the-minimal-patching-window\",\"recommendationShortName\":\"Vulnerabilities + not patch in time\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op7_1\",\"recommendationSolutionContent\":\"1. + Go to the https://portal.azure.com/#view/HubsExtension/ArgQueryBlade/resourceType/Microsoft.Resources%2FResources +
2. Run query 'securityresources| where type == 'microsoft.security/assessments' + and properties.status.code != 'Healthy' '.
3. Please fix your vulnerabilities + in the specified period following the specific remediation steps. The patching + timeframe is: Critical severity (14 days), High severity (30 days), Medium + severity (60 days)\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-vulnerabilities-patching-validation-azure\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Network + Security Controls (NSC)\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_8\",\"controlName\":\"Provide + evidence of NSC installation on the in-scope boundary and public access termination + at perimeter network\",\"controlFullName\":\"\",\"controlDescription\":\"
Provide + evidence that:

A) Network Secuirtiy Controls (NSC) are installed + on the boundary of the in-scope environment, and installed between the perimeter + network and internal networks

AND if Hybrid, On-prem, IaaS also provide + evidence that:

B) all public access terminates at the perimeter network\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control8\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"preview_all_internet_traffic_should_be_routed_via_your_deployed_azure_firewall\",\"responsibilityTitle\":\"[Preview]: + All Internet traffic should be routed via your deployed Azure Firewall\",\"responsibilityDescription\":\"Azure + Security Center has identified that some of your subnets aren't protected + with a next generation firewall. Protect your subnets from potential threats + by restricting access to them with Azure Firewall or a supported next generation + firewall.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-firewall-internet-traffic-routing\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_azure_key_vault_should_disable_public_network_access\",\"responsibilityTitle\":\"[Preview]: + Azure Key Vault should disable public network access\",\"responsibilityDescription\":\"Disable + public network access for your key vault so that it's not accessible over + the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-key-vault-disable-public-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"adaptive_network_hardening_recommendations_should_be_applied_on_internet_facing_virtual_machines\",\"responsibilityTitle\":\"Adaptive + network hardening recommendations should be applied on internet facing virtual + machines\",\"responsibilityDescription\":\"Azure Security Center analyzes + the traffic patterns of Internet facing virtual machines and provides Network + Security Group rule recommendations that reduce the potential attack surface.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-network-harden-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"api_management_services_should_use_a_virtual_network\",\"responsibilityTitle\":\"API + Management services should use a virtual network\",\"responsibilityDescription\":\"Azure + Virtual Network deployment provides enhanced security, isolation and allows + you to place your API Management service in a non-internet routable network + that you control access to. These networks can then be connected to your on-premises + networks using various VPN technologies, which enables access to your backend + services within the network and/or on-premises. The developer portal and API + gateway, can be configured to be accessible either from the Internet or only + within the virtual network.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-api-mgmt-vnet\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"authorized_ip_ranges_should_be_defined_on_kubernetes_services\",\"responsibilityTitle\":\"Authorized + IP ranges should be defined on Kubernetes Services\",\"responsibilityDescription\":\"Restrict + access to the Kubernetes Service Management API by granting API access only + to IP addresses in specific ranges. It is recommended to limit access to authorized + IP ranges to ensure that only applications from allowed networks can access + the cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-kubernetes-authorized-ip-ranges\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_cosmos_db_accounts_should_have_firewall_rules\",\"responsibilityTitle\":\"Azure + Cosmos DB accounts should have firewall rules\",\"responsibilityDescription\":\"Firewall + rules should be defined on your Azure Cosmos DB accounts to prevent traffic + from unauthorized sources. Accounts that have at least one IP rule defined + with the virtual network filter enabled are deemed compliant. Accounts disabling + public access are also deemed compliant.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmos-db-firewall-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_ddos_protection_standard_should_be_enabled\",\"responsibilityTitle\":\"Azure + DDoS Protection Standard should be enabled\",\"responsibilityDescription\":\"DDoS + protection standard should be enabled for all virtual networks with a subnet + that is part of an application gateway with a public IP.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-ddos-protection\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_web_application_firewall_should_be_enabled_for_azure_front_door_entry_points\",\"responsibilityTitle\":\"Azure + Web Application Firewall should be enabled for Azure Front Door entry-points\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-front-door-entry-points\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_disable_public_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should disable public network access\",\"responsibilityDescription\":\"Disabling + public network access improves security by ensuring that Cognitive Services + account isn't exposed on the public internet. Creating private endpoints can + limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-disable-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_restrict_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should restrict network access\",\"responsibilityDescription\":\"Network + access to Cognitive Services accounts should be restricted. Configure network + rules so only applications from allowed networks can access the Cognitive + Services account. To allow connections from specific internet or on-premises + clients, access can be granted to traffic from specific Azure virtual networks + or to public internet IP address ranges.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_registries_should_not_allow_unrestricted_network_access\",\"responsibilityTitle\":\"Container + registries should not allow unrestricted network access\",\"responsibilityDescription\":\"Azure + container registries by default accept connections over the internet from + hosts on any network. To protect your registries from potential threats, allow + access from only specific public IP addresses or address ranges. If your registry + doesn't have an IP/firewall rule or a configured virtual network, it will + appear in the unhealthy resources. Learn more about Container Registry network + rules here: https://aka.ms/acr/portal/public-network + and here https://aka.ms/acr/vnet + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-container-registry-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"internet_facing_virtual_machines_should_be_protected_with_network_security_groups\",\"responsibilityTitle\":\"Internet-facing + virtual machines should be protected with network security groups\",\"responsibilityDescription\":\"Protect + your virtual machines from potential threats by restricting access to them + with network security groups (NSG). Learn more about controlling traffic with + NSGs at https://aka.ms/nsg-doc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-vm-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ip_forwarding_on_your_virtual_machine_should_be_disabled\",\"responsibilityTitle\":\"IP + Forwarding on your virtual machine should be disabled\",\"responsibilityDescription\":\"Enabling + IP forwarding on a virtual machine's NIC allows the machine to receive traffic + addressed to other destinations. IP forwarding is rarely required (e.g., when + using the VM as a network virtual appliance), and therefore, this should be + reviewed by the network security team.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-ip-forwarding-disable-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_of_virtual_machines_should_be_protected_with_just_in_time_network_access_control\",\"responsibilityTitle\":\"Management + ports of virtual machines should be protected with just-in-time network access + control\",\"responsibilityDescription\":\"Possible network Just In Time (JIT) + access will be monitored by Azure Security Center as recommendations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-jit-network-access-control\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_should_be_closed_on_your_virtual_machines\",\"responsibilityTitle\":\"Management + ports should be closed on your virtual machines\",\"responsibilityDescription\":\"Open + remote management ports are exposing your VM to a high level of risk from + Internet-based attacks. These attacks attempt to brute force credentials to + gain admin access to the machine.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-close-vm-management-ports\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_on_azure_sql_database_should_be_disabled\",\"responsibilityTitle\":\"Public + network access on Azure SQL Database should be disabled\",\"responsibilityDescription\":\"Disabling + the public network access property improves security by ensuring your Azure + SQL Database can only be accessed from a private endpoint. This configuration + denies all logins that match IP or virtual network based firewall rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-db-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mariadb_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MariaDB servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MariaDB can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mariadb-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mysql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MySQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MySQL can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_postgresql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for PostgreSQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for PostgreSQL can only be accessed from a private endpoint. This + configuration disables access from any public address space outside of Azure + IP range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_restrict_network_access_using_virtual_network_rules\",\"responsibilityTitle\":\"Storage + accounts should restrict network access using virtual network rules\",\"responsibilityDescription\":\"Protect + your storage accounts from potential threats using virtual network rules as + a preferred method instead of IP-based filtering. Disabling IP-based filtering + prevents public IPs from accessing your storage accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-accounts-vnet-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"subnets_should_be_associated_with_a_network_security_group\",\"responsibilityTitle\":\"Subnets + should be associated with a Network Security Group\",\"responsibilityDescription\":\"Protect + your subnet from potential threats by restricting access to it with a Network + Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules + that allow or deny network traffic to your subnet.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-subnets-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"web_application_firewall_waf_should_be_enabled_for_application_gateway\",\"responsibilityTitle\":\"Web + Application Firewall (WAF) should be enabled for Application Gateway\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-application-gateway\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_9\",\"controlName\":\"Provide + evidence of proper configuration and regular review of Network Security Control + rules\",\"controlFullName\":\"\",\"controlDescription\":\"Validate that:

A) + all Network Security Controls (NSC) are configured to drop traffic not explicitly + defined within the rule base

B) Network Security Controls (NSC) rule + reviews are carried out at least every 6 months\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control9\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_9_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that you are performing firewall rule reviews at least + every 6 months\",\"responsibilityDescription\":\"Any evidence provided needs + to be able to demonstrate that rule review meetings have been occurring. This + can be done by sharing meeting minutes of the NSC review and any additional + change control evidence that shows any actions taken from the review. Please + ensure that dates are present as the certification analyst reviewing your + submission would need to see a minimum of two of these meetings review documents + (i.e., every six months).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-configuration-creep\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_all_internet_traffic_should_be_routed_via_your_deployed_azure_firewall\",\"responsibilityTitle\":\"[Preview]: + All Internet traffic should be routed via your deployed Azure Firewall\",\"responsibilityDescription\":\"Azure + Security Center has identified that some of your subnets aren't protected + with a next generation firewall. Protect your subnets from potential threats + by restricting access to them with Azure Firewall or a supported next generation + firewall.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-firewall-internet-traffic-routing\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_azure_key_vault_should_disable_public_network_access\",\"responsibilityTitle\":\"[Preview]: + Azure Key Vault should disable public network access\",\"responsibilityDescription\":\"Disable + public network access for your key vault so that it's not accessible over + the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-key-vault-disable-public-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"adaptive_network_hardening_recommendations_should_be_applied_on_internet_facing_virtual_machines\",\"responsibilityTitle\":\"Adaptive + network hardening recommendations should be applied on internet facing virtual + machines\",\"responsibilityDescription\":\"Azure Security Center analyzes + the traffic patterns of Internet facing virtual machines and provides Network + Security Group rule recommendations that reduce the potential attack surface.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-network-harden-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"api_management_services_should_use_a_virtual_network\",\"responsibilityTitle\":\"API + Management services should use a virtual network\",\"responsibilityDescription\":\"Azure + Virtual Network deployment provides enhanced security, isolation and allows + you to place your API Management service in a non-internet routable network + that you control access to. These networks can then be connected to your on-premises + networks using various VPN technologies, which enables access to your backend + services within the network and/or on-premises. The developer portal and API + gateway, can be configured to be accessible either from the Internet or only + within the virtual network.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-api-mgmt-vnet\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"authorized_ip_ranges_should_be_defined_on_kubernetes_services\",\"responsibilityTitle\":\"Authorized + IP ranges should be defined on Kubernetes Services\",\"responsibilityDescription\":\"Restrict + access to the Kubernetes Service Management API by granting API access only + to IP addresses in specific ranges. It is recommended to limit access to authorized + IP ranges to ensure that only applications from allowed networks can access + the cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-kubernetes-authorized-ip-ranges\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_cosmos_db_accounts_should_have_firewall_rules\",\"responsibilityTitle\":\"Azure + Cosmos DB accounts should have firewall rules\",\"responsibilityDescription\":\"Firewall + rules should be defined on your Azure Cosmos DB accounts to prevent traffic + from unauthorized sources. Accounts that have at least one IP rule defined + with the virtual network filter enabled are deemed compliant. Accounts disabling + public access are also deemed compliant.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmos-db-firewall-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_ddos_protection_standard_should_be_enabled\",\"responsibilityTitle\":\"Azure + DDoS Protection Standard should be enabled\",\"responsibilityDescription\":\"DDoS + protection standard should be enabled for all virtual networks with a subnet + that is part of an application gateway with a public IP.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-ddos-protection\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_web_application_firewall_should_be_enabled_for_azure_front_door_entry_points\",\"responsibilityTitle\":\"Azure + Web Application Firewall should be enabled for Azure Front Door entry-points\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-front-door-entry-points\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_disable_public_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should disable public network access\",\"responsibilityDescription\":\"Disabling + public network access improves security by ensuring that Cognitive Services + account isn't exposed on the public internet. Creating private endpoints can + limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-disable-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_restrict_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should restrict network access\",\"responsibilityDescription\":\"Network + access to Cognitive Services accounts should be restricted. Configure network + rules so only applications from allowed networks can access the Cognitive + Services account. To allow connections from specific internet or on-premises + clients, access can be granted to traffic from specific Azure virtual networks + or to public internet IP address ranges.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_registries_should_not_allow_unrestricted_network_access\",\"responsibilityTitle\":\"Container + registries should not allow unrestricted network access\",\"responsibilityDescription\":\"Azure + container registries by default accept connections over the internet from + hosts on any network. To protect your registries from potential threats, allow + access from only specific public IP addresses or address ranges. If your registry + doesn't have an IP/firewall rule or a configured virtual network, it will + appear in the unhealthy resources. Learn more about Container Registry network + rules here: https://aka.ms/acr/portal/public-network + and here https://aka.ms/acr/vnet + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-container-registry-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"internet_facing_virtual_machines_should_be_protected_with_network_security_groups\",\"responsibilityTitle\":\"Internet-facing + virtual machines should be protected with network security groups\",\"responsibilityDescription\":\"Protect + your virtual machines from potential threats by restricting access to them + with network security groups (NSG). Learn more about controlling traffic with + NSGs at https://aka.ms/nsg-doc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-vm-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ip_forwarding_on_your_virtual_machine_should_be_disabled\",\"responsibilityTitle\":\"IP + Forwarding on your virtual machine should be disabled\",\"responsibilityDescription\":\"Enabling + IP forwarding on a virtual machine's NIC allows the machine to receive traffic + addressed to other destinations. IP forwarding is rarely required (e.g., when + using the VM as a network virtual appliance), and therefore, this should be + reviewed by the network security team.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-ip-forwarding-disable-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_of_virtual_machines_should_be_protected_with_just_in_time_network_access_control\",\"responsibilityTitle\":\"Management + ports of virtual machines should be protected with just-in-time network access + control\",\"responsibilityDescription\":\"Possible network Just In Time (JIT) + access will be monitored by Azure Security Center as recommendations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-jit-network-access-control\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_should_be_closed_on_your_virtual_machines\",\"responsibilityTitle\":\"Management + ports should be closed on your virtual machines\",\"responsibilityDescription\":\"Open + remote management ports are exposing your VM to a high level of risk from + Internet-based attacks. These attacks attempt to brute force credentials to + gain admin access to the machine.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-close-vm-management-ports\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_on_azure_sql_database_should_be_disabled\",\"responsibilityTitle\":\"Public + network access on Azure SQL Database should be disabled\",\"responsibilityDescription\":\"Disabling + the public network access property improves security by ensuring your Azure + SQL Database can only be accessed from a private endpoint. This configuration + denies all logins that match IP or virtual network based firewall rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-db-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mariadb_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MariaDB servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MariaDB can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mariadb-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mysql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MySQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MySQL can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_postgresql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for PostgreSQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for PostgreSQL can only be accessed from a private endpoint. This + configuration disables access from any public address space outside of Azure + IP range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_restrict_network_access_using_virtual_network_rules\",\"responsibilityTitle\":\"Storage + accounts should restrict network access using virtual network rules\",\"responsibilityDescription\":\"Protect + your storage accounts from potential threats using virtual network rules as + a preferred method instead of IP-based filtering. Disabling IP-based filtering + prevents public IPs from accessing your storage accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-accounts-vnet-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"subnets_should_be_associated_with_a_network_security_group\",\"responsibilityTitle\":\"Subnets + should be associated with a Network Security Group\",\"responsibilityDescription\":\"Protect + your subnet from potential threats by restricting access to it with a Network + Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules + that allow or deny network traffic to your subnet.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-subnets-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"web_application_firewall_waf_should_be_enabled_for_application_gateway\",\"responsibilityTitle\":\"Web + Application Firewall (WAF) should be enabled for Application Gateway\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-application-gateway\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Change + Control\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_10\",\"controlName\":\"Provide + evidence of documented change requests with impact, back-out procedures, testing, + and approvers\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Any changes introduced to production environments + are implemented through documented change requests which contain:
(i) + impact of the change
(ii) details of back-out procedures
(iii) testing + to be carried out
(iv) review and approval by authorised personnel


\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control10\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_10_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that any changes introduced to production environments + are implemented through documented change requests\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Any changes introduced to production + environments are implemented through documented change requests which contain:
(i) + Impact of the change.
(ii) Details of back-out procedures.
(iii) Testing + to be carried out.
(iv) eview and approval by authorized personnel.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-change-control-policies\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_11\",\"controlName\":\"Provide + evidence of separate environments and access controls enforcing separation + of duties and data protection\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Separate environments exist so that:

(i) development + and test/staging environments enforce separation of duties from the production + environment
(ii) separation of duties is enforced via access controls
(iii) + sensitive production data is not in use within the development or test/staging + environments\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control11\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_11_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that development and test environments enforce separation + of duties and sensitive data from the production environment\",\"responsibilityDescription\":\"Please + provide evidence:

Separate environments exist so that:
(i) Development + and test/staging environments enforce separation of duties from the production + environment.
(ii) Sensitive production data is not in use within the development + or test/staging environments.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-separation-of-environments\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_11_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that separation of duties is enforced via environment + access controls\",\"responsibilityDescription\":\"Please provide evidence + that:

Separate environments exist so that separation of duties is enforced + via access controls.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-avoid-sensitive-data\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Secure + Software Development/Deployment\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_12\",\"controlName\":\"Provide + evidence of secure software development documentation and developer training + on secure coding annually\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists and is maintained that:

(i) + supports the development of secure software and includes industry standards + and/or best practices for secure coding, such asOpen Web Application Security + Project (OWASP) Top 10 or SysAdmin, Audit, Network and Security (SANS) Top + 25 Common Weakness Enumeration (CWE)
(ii) developers undergo relevant secure + coding and secure software development training annually
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control12\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_12_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that support secure software development and deployment, + and developers undergo secure software development training annually\",\"responsibilityDescription\":\"Please + provide evidence demonstrating documentation exists and is maintained that:

(i) + Supports the development of secure software and includes industry standards + and/or best practices for secure coding, such as OWASP Top 10 or SANS Top + 25 CWE.
(ii) Developers undergo relevant secure coding and secure software + development training annually.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-software-development\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_13\",\"controlName\":\"Provide + evidence of secure code repository with code review, access controls, MFA + and reviewed production deployment\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Code repositories are secured so that:

(i) + all code changes undergo a review and approval process by a second reviewer + prior to being merged with main branch
(ii) appropriate access controls + are in place
(iii) all access is enforced through multi-factor authentication + (MFA)

B) All releases made into the production environment(s) are reviewed + and approved prior to their deployment\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control13\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"github_has_force_push_disabled\",\"responsibilityTitle\":\"GitHub + repositories should have force pushes to default branch disabled\",\"responsibilityDescription\":\"As + part of evidence for code change should undergo review process, GitHub should + have force push for default branch disabled. This auto checkpoint needs to + establish a GitHub connector created by GitHub Enterprise Cloud account.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"github_has_default_branch_protection_policy\",\"responsibilityTitle\":\"GitHub + repositories should have protection policies for default branch enabled\",\"responsibilityDescription\":\"As + part of evidence for code change should undergo review process, GitHub should + have default branch protection policy enabled. This auto checkpoint needs + to establish a GitHub connector created by GitHub Enterprise Cloud account.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"github_has_auto_mfa_enforcement\",\"responsibilityTitle\":\"MFA + is enforced by GitHub for accounts with contributions\",\"responsibilityDescription\":\"Since + end of 2023, MFA is mandatory for accounts identified as contributors to GitHub.com + according to this announcement .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op13_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-github-mfa-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_13_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that code changes and releases undergo a review, access + controls are inplace, access is enforced through MFA\",\"responsibilityDescription\":\"Please + provide evidence that code repositories are secured so that:

(i) All + code changes undergo a review and approval process by a second reviewer prior + to being merged with main branch.
(ii) Appropriate access controls are + in place.
(iii) All access is enforced through multi-factor authentication + (MFA).
(iv) All releases made into the production environment(s) are reviewed + and approved prior to their deployment.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Account + Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_14\",\"controlName\":\"Provide + evidence of disabled, removed, or changed default credentials and hardened + service accounts processes\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) default credentials are either disabled, removed, + or changed across the sampled system components

B) a process is in + place to secure (harden) service accounts and that this process has been followed\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control14\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_14_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a process is in place to secure (harden) service + accounts and that this process has been followed\",\"responsibilityDescription\":\"Provide + evidence that:

A process is in place to secure (harden) service accounts + and that this process has been followed.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-service-accounts-will-often-be-targeted\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"there_is_no_default_credential_in_azure\",\"responsibilityTitle\":\"There + is no default credential in Azure\",\"responsibilityDescription\":\"It is + mandatory on Azure to create username and set password for Azure accounts. + There is no default credential which can be used to login to Azure directly. + If ISV uses Azure's service, this policy will pass directly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op14_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op14_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-default-credential\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_15\",\"controlName\":\"Provide + evidence of user account management, password policy, and regular account + disabling/deletion process\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Unique user accounts are issued to all users

B) + User least privilege principles are being followed within the environment

C) + A strong password/ pass phrase policy or other suitable mitigations are in + place

D) A process is in place and followed at least every three months + to either disabled or deleted accounts not used within three months\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control15\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"azure_password_policy_can_fulfill_this_requirement\",\"responsibilityTitle\":\"Azure + password policy can fulfill this requirement\",\"responsibilityDescription\":\"It + is mandatory on Azure to set strong password for Azure accounts. If ISV uses + Azure's service, this policy will pass directly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op15_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op15_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-password-policy-can-fulfill-this-requirement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_15_manual_cr\",\"responsibilityTitle\":\"Provide + evidence of user account management, privilege principles are being followed, + password policy, and regular account disabling/deletion process\",\"responsibilityDescription\":\"Provide + evidence that:

(i) Unique user accounts are issued to all users.
(ii) + User least privilege principles are being followed within the environment.
(iii) + A process is in place and followed at least every three months to either disable + or delete accounts not used within 3 months.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-provide-evidence-of-user-account-management\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_16\",\"controlName\":\"Provide + evidence of MFA configuration for all remote access and administrative interfaces\",\"controlFullName\":\"\",\"controlDescription\":\"Validate + that MFA is configured for all remote access connections and all non-console + administrative interfaces, including access to any code repositories and Cloud + management interfaces\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control16\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_16_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that remote access, non-console administrative interface, + code repo are secured with multi-factor authentication (MFA)\",\"responsibilityDescription\":\"Validate + that multi-factor authentication (MFA) is configured for all remote access + connections and all non-console administrative interfaces, including access + to any code repositories and Cloud management interfaces.

Meaning of + these terms:
(i) Remote Access \u2013 This refers to technologies used + to access the supporting environment. For example, Remote Access IPSec VPN, + SSL VPN or Jumpbox/Bastian Host.
(ii) Non-console Administrative Interfaces + \u2013 This refers to the network administrative connections to system components. + This could be over Remote Desktop, SSH or a web interface.
(iii) Code + Repositories \u2013 The code base of the app needs to be protected against + malicious modification which could introduce malware into the app. MFA needs + to be configured on the code repositories.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_on_accounts_with_owner_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with owner permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + owner permissions to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_accounts_with_write_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with read permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + write privileges to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_on_accounts_with_read_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with write permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + write privileges to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Security + Event Logging, Reviewing and Alerting\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_17\",\"controlName\":\"Provide + evidence of properly set up security event logging for user and system activity\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that security event logging is setup across the inscope environment + to log events where applicable such as:

A) User/s access to system + components and the application
B) All actions taken by a high-privileged + user
C) Invalid logical access attempts
D) Privileged account creation + / modification
E) Event log tampering
F) Disabling of security tools + (example: event logging)
G) Anti-Malware logging (example: updates, malware + detection, scan failures)
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control17\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"preview_azure_arc_enabled_kubernetes_clusters_should_have_azure_defender_extension_installed\",\"responsibilityTitle\":\"[Preview]: + Azure Arc enabled Kubernetes clusters should have Azure Defender's extension + installed\",\"responsibilityDescription\":\"Azure Defender's extension for + Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. + The extension collects data from nodes in the cluster and sends it to the + Azure Defender for Kubernetes backend in the cloud for further analysis. Learn + more in https://docs.microsoft.com/azure/security-center/defender-for-kubernetes-azure-arc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-defender-extension\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_logs_in_app_services_should_be_enabled\",\"responsibilityTitle\":\"App + Service logs in App Services should be enabled\",\"responsibilityDescription\":\"Audit + enabling of app service logs on the app. This enables you to recreate activity + trails for investigation purposes if a security incident occurs or your network + is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-app-service-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"auditing_on_sql_server_should_be_enabled\",\"responsibilityTitle\":\"Auditing + on SQL server should be enabled\",\"responsibilityDescription\":\"Auditing + on your SQL Server should be enabled to track database activities across all + databases on the server and save them in an audit log.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-auditing-on-sql-server\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_application_gateway_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Application Gateway should have Resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Application Gateway (plus WAF) and stream to a Log + Analytics workspace. Get detailed visibility into inbound web traffic and + actions taken to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-gateway-enable-resource-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_app_service_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for App Service should be enabled\",\"responsibilityDescription\":\"Azure + Defender for App Service leverages the scale of the cloud, and the visibility + that Azure has as a cloud provider, to monitor for common web app attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-app-service\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_azure_sql_database_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Azure SQL Database servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-database-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Key Vault should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Key Vault provides an additional layer of protection and security + intelligence by detecting unusual and potentially harmful attempts to access + or exploit key vault accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_resource_manager_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Resource Manager should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Resource Manager automatically monitors the resource management + operations in your organization. Azure Defender detects threats and alerts + you about suspicious activity. Learn more about the capabilities of Azure + Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling + this Azure Defender plan results in charges. Learn about the pricing details + per region on Security Center's pricing page: https://aka.ms/pricing-security-center .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-resource-manager\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for servers provides real-time threat protection for server workloads + and generates hardening recommendations as well as alerts about suspicious + activities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_servers_on_machines_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for SQL servers on machines should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-on-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_should_be_enabled_for_unprotected_sql_managed_instances\",\"responsibilityTitle\":\"Azure + Defender for SQL should be enabled for unprotected SQL Managed Instances\",\"responsibilityDescription\":\"Audit + each SQL Managed Instance without advanced data security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_front_door_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Front Door should have Resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Front Door (plus WAF) and stream to a Log Analytics + workspace. Get detailed visibility into inbound web traffic and actions taken + to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-frontdoor-should-enable-resource-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_front_door_standard_or_premium_plus_waf_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Front Door Standard or Premium (Plus WAF) should have resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Front Door Standard or Premium (plus WAF) and stream + to a Log Analytics workspace. Get detailed visibility into inbound web traffic + and actions taken to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-frontdoor-stand-premium-enable-log\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"data_collection_rule_should_collect_system_logs\",\"responsibilityTitle\":\"Data + Collection Rule should collect system logs\",\"responsibilityDescription\":\"This + policy enables you check whether data collection rules collect system logs.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-collection-of-system-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"linux_virtual_machines_should_have_azure_monitor_agent_installed\",\"responsibilityTitle\":\"Linux + virtual machines should have Azure Monitor Agent installed\",\"responsibilityDescription\":\"Linux + virtual machines should be monitored and secured through the deployed Azure + Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest + OS. This policy will audit virtual machines with supported OS images in supported + regions. Learn more: https://aka.ms/AMAOverview + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-monitor-agent-on-linux-virtual-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"microsoft_defender_for_containers_should_be_enabled\",\"responsibilityTitle\":\"Microsoft + Defender for Containers should be enabled\",\"responsibilityDescription\":\"Microsoft + Defender for Containers provides hardening, vulnerability assessment and run-time + protections for your Azure, hybrid, and multi-cloud Kubernetes environments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-containers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_azure_data_lake_store_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Azure Data Lake Store should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-data-lake-store\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_azure_stream_analytics_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Azure Stream Analytics should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-azure-stream-analytics\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_batch_accounts_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Batch accounts should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-batch-accounts\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_data_lake_analytics_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Data Lake Analytics should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-data-lake-analytics\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_event_hub_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Event Hub should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-event-hub\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_iot_hub_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in IoT Hub should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-iot-hub\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Key Vault should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_logic_apps_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Logic Apps should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-logic-apps\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_search_services_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Search services should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-search-services\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_service_bus_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Service Bus should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-service-bus\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"virtual_machines_should_be_associated_with_a_data_collection_rule\",\"responsibilityTitle\":\"Virtual + Machines should be associated with a Data Collection Rule\",\"responsibilityDescription\":\"This + policy enables you check whether virtual machines associated with a Data Collection + Rule.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-associate-virtual-machines-with-data-collection-rule\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"windows_virtual_machines_should_have_azure_monitor_agent_installed\",\"responsibilityTitle\":\"Windows + virtual machines should have Azure Monitor Agent installed\",\"responsibilityDescription\":\"Windows + virtual machines should be monitored and secured through the deployed Azure + Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest + OS. Windows virtual machines with supported OS and in supported regions are + monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-monitor-agent-on-windows-virtual-machines\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_18\",\"controlName\":\"Provide + evidence of 30-day immediate availability and 90-day retention of security + event logs\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that a minimum of 30 days worth of security event logging data is immediately + available, with 90 days of security event logs being retained\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control18\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"log_analytics_workspace_should_be_configured_with_90_days_retention_or_longer\",\"responsibilityTitle\":\"Log + Analytics Workspace should be configured with 90 days retention or longer\",\"responsibilityDescription\":\"For + incident investigation purposes, it is recommend to configure the data retention + of Log Analytics Workspace to at least 90 days.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op18_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-configure-log-analytics-workspace-retention\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_19\",\"controlName\":\"Provide + evidence of periodic log review and investigation of identified security events/anomalies\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evdience that:

\_A) Logs are being reviewed periodically and any potential + security events/anomalies identified during the reveiw process are investiagted + and addressed\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control19\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_19_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that logs are being reviewed periodically and any + potential security events/anomalies identified are investiagted and addressed\",\"responsibilityDescription\":\"Provide + demonstratable evidence that Logs are being reviewed periodically and any + potential security events/anomalies identified during the reveiw process are + investiagted and addressed.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-log-review-and-investigation\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_20\",\"controlName\":\"Provide + evidence of configured alert rules for investigating security events including + privileged accounts, malware, and log tampering\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Alert rules are configured so that alerts are triggered + for investigation for the following \_security events where applicable:

i) + privileged account creation/ modifications
ii) privileged/High risk activities + or operations\_
iii) malware events
iv) event log tampering
v) IDPS + /WAF events (if configured)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control20\",\"controlStatus\":\"PendingApproval\",\"responsibilities\":[{\"responsibilityId\":\"activity_log_alert_should_exist_for_privileged_operations\",\"responsibilityTitle\":\"Activity + log alert should exist for high privileged operations\",\"responsibilityDescription\":\"This + policy audits specific high privileged operations with no activity log alerts + configured.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"account_operation_activity_log_alert_should_exist\",\"responsibilityTitle\":\"Activity + log alert should exist for write or delete Account operations\",\"responsibilityDescription\":\"This + policy audits write or delete Account operations with no activity log alerts + configured.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":null,\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":null,\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"alert_rule_should_set_up_for_diagnostic_logs\",\"responsibilityTitle\":\"Alert + ruleCollections must exist for Log Analytics Workspace Monitoring\",\"responsibilityDescription\":\"Customer + must set up for Log Analytics Workspace Monitoring.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"waf_should_export_logs_to_log_analytic_workspaces\",\"responsibilityTitle\":\"Diagnostic + settings should be set for WAF to export logs to Log Analytics workspace\",\"responsibilityDescription\":\"This + policy audit if the diagnostic settings for WAF to stream resource logs to + a Log Analytics workspace when any WAF which is missing this diagnostic settings + is created or updated.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"log_analytics_workspace_should_have_read_only_lock\",\"responsibilityTitle\":\"Log + Analytics workspace should have read-only lock to block all activities that + could delete data\",\"responsibilityDescription\":\"Set a lock on your Log + Analytics workspace to block all activities that could delete data: purge, + table delete, and table- or workspace-level data retention changes. To learn + more about Log Analytics workspace immutability, visit https://aka.ms/monitor/lock .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Information + Security Risk Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_21\",\"controlName\":\"Provide + evidence that a ratified formal information security risk management policy/process + is documented and established\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that a ratified formal information security risk management policy/process + is documented and established\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control21\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_21_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a ratified formal information security risk management + policy/process is documented and established\",\"responsibilityDescription\":\"A + robust information security risk management process is important to help organizations + manage risks effectively. This will help organizations plan effective mitigations + against threats to the environment. The intent of this control is to confirm + that the organization has a formally ratified information security risk management + policy or process that is comprehensively documented. The policy should outline + how the organization identifies, assesses, and manages information security + risks. It should include roles and responsibilities, methodologies for risk + assessment, criteria for risk acceptance, and procedures for risk mitigation.

Note: + The risk assessment must focus on information-security risks, not just general + business risks.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-information-security-risk-management-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_22\",\"controlName\":\"Provide + evidence of a formal company-wide information security risk assessment is + carried out at least annually or a targeted risk analysis is documented and + performed\",\"controlFullName\":\"\",\"controlDescription\":\"
Provide + evidence that:

A) A formal company-wide information security risk assessment + is carried out at least annually.

\_OR

\_For Targeted Risk Analysis:

\_B) + A targeted risk analysis is documented and performed:

(i) at a minimum + every 12 months for every instance where a traditional control or industry + best practice is not in place\_
(ii) where a design/technological limitation + creates a risk of introducing a vulnerability into the environment/puts users + and data at risk,\_
(iii) upon suspicion or confirmation of compromise\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control22\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_22_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a formal company-wide information security risk + assessment is carried out at least annually or a targeted risk analysis is + documented and performed\",\"responsibilityDescription\":\"Please provide + evidence demonstrating that:

(A) Formal company-wide information security + risk assessment is carried out at least annually.

OR For targeted risk + analysis:

(B) A targeted risk analysis is documented and performed:
+ (i) At a minimum every 12 months for every instance where a traditional control + or industry best practice is not in place.
(ii) Where a design/technological + limitation creates a risk of introducing a vulnerability into the environment/puts + users and data at risk.
(iii) Upon suspicion or confirmation of compromise.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-formal-risk-assessment-occurs-annually\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_23\",\"controlName\":\"Provide + evidence that information security risk assessment includes relevant system + components, matrix, and risk treatment plan\",\"controlFullName\":\"\",\"controlDescription\":\"Validate + that the information security risk assessment includes:

A) System component + or resource affected
B) Threats and vulnerabilities, or equivalent
C) + Impact and likelihood matrices or equivalent
D) The creation of a risk + register / risk treatment plan\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control23\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_23_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the information security risk assessment includes + affected resources, threats and vulnerabilities, impact, and risk treatment + plan\",\"responsibilityDescription\":\"Validate that the information security + risk assessment includes:

(i) System component or resource affected.
+ (ii) Threats and vulnerabilities, or equivale.
(iii) Impact and likelihood + matrices or equivalent.
(iv) The creation of a risk register / risk treatment + plan.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-information-security-risk-assessment\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_24\",\"controlName\":\"Provide + evidence of risk management processes are in place, and ability to identify + changes and risks that could impact your system of internal controls\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) You have risk management processes in place that + assesses and manages risks associated with vendors and business partners
B) + You can identify and assess changes and risks that could impact your system + of internal controls
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control24\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_24_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that risk management processes are in place, and ability + to identify changes and risks that could impact your system of internal controls\",\"responsibilityDescription\":\"Please + provide evidence that:

(i) You (ISV) have risk management processes + in place that assesses and manages risks associated with vendors and business + partners.
(ii) You (ISV) can identify and assess changes and risks that + could impact your system of internal controls.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-risk-management-processes\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Security + Incident Response\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_25\",\"controlName\":\"Provide + evidence of a ratified incident response plan/procedure (IRP) with contact + information, communication plan, and recovery steps\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + your ratified security incident response plan/procedure (IRP) outlining how + your organization responds to incidents, showing how it is maintained, and + that it includes:\_

A) Details of the incident response team including + contact information
B) An internal communication plan during the incident + and external communication to relevant parties such as key stakeholders, payment + brands and acquirers, regulatory bodies (for example 72 hours for GDPR), supervisory + authorities, directors, customers
C) Steps for activities such as incident + classification, containment, mitigation, recovery and returning to normal + business operations depending on the type of incident\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control25\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_25_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that a ratified incident response plan/procedure (IRP) + with contact information, communication plan, and recovery steps\",\"responsibilityDescription\":\"Please + provide your ratified security incident response plan/procedure (IRP) outlining + how your organization responds to incidents, showing how it is maintained, + and that it includes:

(i) Details of the incident response team including + contact information,
(ii) An internal communication plan during the incident + and external communication to relevant parties such as key stakeholders, payment + brands and acquirers, regulatory bodies (for example 72 hours for GDPR), supervisory + authorities, directors, customers,
(iii) Steps for activities such as + incident classification, containment, mitigation, recovery and returning to + normal business operations depending on the type of incident.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-incident-response-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_26\",\"controlName\":\"Provide + evidence of all members of the incident response team have received annual + training that enables them to respond to incidents\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + \ evidence that:

A) All members of the incident response team have + received annual training which enables them to respond to incidents\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control26\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_26_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that all members of the incident response team have + received annual training that enables them to respond to incidents\",\"responsibilityDescription\":\"Please + provide evidence which shows that:

All members of the incident response + team have received annual training that enables them to respond to incidents.

Evidence + should be provided which demonstrates training has been carried out by means + of sharing the training content, and records showing who attended (which should + include all the incident response team). Alternatively, or as well as, records + showing that a tabletop exercise has been carried out. All this must have + been completed within a 12-month period from when the evidence is submitted.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-incident-response-team-annual-training\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_27\",\"controlName\":\"Provide + evidence of reviewing and updating the incident response strategy and documentation + based on the lessons learned from exercise or incident\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The incident response strategy and supporting documentation + is reviewed and updated based on either:

(i) lessons learned from a + table top exercise
(ii) lessons learned from responding to an incident
(iii) + organizational changes\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control27\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_27_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence to show the incident response strategy and supporting + documentation is reviewed and updated based on the lessons learned from exercise + or incident\",\"responsibilityDescription\":\"Please provide evidence that:

The + incident response strategy and supporting documentation is reviewed and updated + based on either:

(i) Lessons learned from a tabletop exercise
+ (ii) Lessons learned from responding to an incident
(iii) Organizational + changes\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-irp-updated-lessons-learned\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Business + Continuity Plan (BCP) and Disaster Recovery Plan\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_28\",\"controlName\":\"Provide + evidence of maintained Business Continuity plan documenting personnel, contingency + requirements, recovery procedures, and system restoration\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists, and is maintained, which outlines + the Business Continuity plan and includes:

i) details of relevant personnel + including their roles and responsibilities\_
ii) business functions with + associated contingency requirements and objectives
iii) system and data + backup procedures, configuration, and schedueling/retention
iv) recovery + priority and timeframe targets
v) a contingency plan detailing actions, + steps, and procedures to be followed to return critical information systems, + business functions and services to operation in the event of an unexpected + and unscheduled interruption
vi) an established process that covers the + eventual full system restoration and return to the original state\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control28\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_28_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that documentaion exists, and is maintained, which + outlines the business continuity plan\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Documentation exists, and is maintained, + which outlines the business continuity plan and includes:
(i) Details + of relevant personnel including their roles and responsibilities
(ii) + Business functions with associated contingency requirements and objectives
+ (iii) System and data backup procedures, configuration, and scheduling/retention
+ (iv) Recovery priority and timeframe targets
(v) A contingency plan detailing + actions, steps, and procedures to be followed to return critical information + systems, business functions and services to operation in the event of an unexpected + and unscheduled interruption
(vi) An established process that covers the + eventual full system restoration and return to the original state\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-business-continuity-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_29\",\"controlName\":\"Provide + evidence of documented Disaster Recovery plan with personnel roles, inventory, + backup procedures, and recovery plan\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists, and is maintained, which outlines + the Disaster Recovery plan and includes at a minimum:

(i) personnel + \ their roles, responsibilities, and escalation process
(ii) inventory + of the information systems used to support critical business functions and + services
(iii) system and data backup procedures and configuration
(iv) + a recovery plan detailing actions and procedures to be followed to restore + critical information systems and data to operation
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control29\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_29_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that documentation exists, and is maintained, which + outlines the disaster recovery plan\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Documentation exists, and is maintained, + which outlines the disaster recovery plan and includes at a minimum:
(i) + Details of relevant personnel including their roles and responsibilities
+ (ii) Business functions with associated contingency requirements and objectives
+ (iii) System and data backup procedures, configuration, and scheduling/retention
+ (iv) Recovery priority and timeframe targets
(v) A contingency plan detailing + actions, steps, and procedures to be followed to return critical information + systems, business functions and services to operation in the event of an unexpected + and unscheduled interruption
(vi) An established process that covers the + eventual full system restoration and return to the original state\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-disaster-recovery-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_30\",\"controlName\":\"Provide + evidence of annual review, personnel training, exercise testing, and documentation + of BCP and DRP\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The Business Continuity plan and the Disaster Recovery + Plan are being reviewed at least every 12 months to ensure that it remains + valid and effective during adverse situations, and is updated based on:

i) + annual reveiw of the plan
ii) all relevant personnel receiving training + on their roles and responsibilitties assigned in the contingency plans
iii) + the plan/s are being tested through business continuity or Disaster Recovery + exercises\_
iv) test results are documented including lessons learned from + the excercise or organizational changes\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control30\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_30_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the business continuity plan and the disaster + recovery plan are being reviewed and updated at least every 12 months to ensure + that it remains valid and effective\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

The business continuity plan and + the disaster recovery plan are being reviewed at least every 12 months to + ensure that it remains valid and effective during adverse situations, and + is updated based on:
(i) Annual review of the plan.
(ii) All relevant + personnel receive training on their roles and responsibilities assigned in + the contingency plans.
(iii) The plan/s are tested through business continuity + or disaster recovery exercises.
(iv) Test results are documented including + lessons learned from exercises or organizational changes.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-bcp-drp-annual-review\",\"justification\":\"\",\"evidenceFiles\":[]}]}]}]},{\"categoryName\":\"Data + Security & Privacy\",\"categoryStatus\":\"Failed\",\"controlFamilies\":[{\"controlFamilyName\":\"Data + in Transit\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_1\",\"controlName\":\"Please + provide evidence demonstrating that your TLS configuration is TLS1.2 or higher + and an inventory of trusted keys and certificates is kept and maintained\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence for all of the following which:

A) Validates that your TLS + Configuration is TLS1.2 or higher within the TLS Profile Configuration Requirements
B) + Shows that an inventory of trusted keys and certificates is kept and maintained
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control1\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"app_service_app_slots_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"App + Service app slots should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_app_slots_should_require_ftps_only\",\"responsibilityTitle\":\"App + Service app slots should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_app_slots_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"App + Service app slots should use the latest TLS version\",\"responsibilityDescription\":\"Periodically, + newer versions are released for TLS either due to security flaws, include + additional functionality, and enhance speed. Upgrade to the latest TLS version + for App Service apps to take advantage of security fixes, if any, and/or new + functionalities of the latest version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"App + Service apps should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_require_ftps_only\",\"responsibilityTitle\":\"App + Service apps should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"App + Service apps should use the latest TLS version\",\"responsibilityDescription\":\"Upgrade + to the latest TLS version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_environment_should_disable_tls_1_dot_0_and_1_dot_1\",\"responsibilityTitle\":\"App + Service Environment should disable TLS 1.0 and 1.1\",\"responsibilityDescription\":\"TLS + 1.0 and 1.1 are out-of-date protocols that do not support modern cryptographic + algorithms. Disabling inbound TLS 1.0 and 1.1 traffic helps secure apps in + an App Service Environment.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-tls-1.0-and-1.1-are-out-of-date-protocols\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"aad_domain_services_managed_domains_should_use_tls_1_dot_2_only_mode\",\"responsibilityTitle\":\"Azure + Active Directory Domain Services managed domains should use TLS 1.2 only mode\",\"responsibilityDescription\":\"Use + TLS 1.2 only mode for your managed domains. By default, Azure AD Domain Services + enables the use of ciphers such as NTLM v1 and TLS v1. These ciphers may be + required for some legacy applications, but are considered weak and can be + disabled if you don't need them. When TLS 1.2 only mode is enabled, any client + making a request that is not using TLS 1.2 will fail. Learn more at https://docs.microsoft.com/azure/active-directory-domain-services/secure-your-domain + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_aad_domains\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"front_door_standard_and_premium_should_be_running_minimun_tls_version_1_dot_2\",\"responsibilityTitle\":\"Azure + Front Door Standard and Premium should be running minimum TLS version of 1.2\",\"responsibilityDescription\":\"Setting + minimal TLS version to 1.2 improves security by ensuring your custom domains + are accessed from clients using TLS 1.2 or newer. Using versions of TLS less + than 1.2 is not recommended since they are weak and do not support modern + cryptographic algorithms.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_front_door\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"sql_database_should_be_running_tls_version_1_dot_2_or_newer\",\"responsibilityTitle\":\"Azure + SQL Database should be running TLS version 1.2 or newer\",\"responsibilityDescription\":\"Setting + TLS version to 1.2 or newer improves security by ensuring your Azure SQL Database + can only be accessed from clients using TLS 1.2 or newer. Using versions of + TLS less than 1.2 is not recommended since they have well documented security + vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_sql_database\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"synapse_workspace_sql_server_should_be_running_tls_version_1_dot_2_or_newer\",\"responsibilityTitle\":\"Azure + Synapse Workspace SQL Server should be running TLS version 1.2 or newer\",\"responsibilityDescription\":\"Setting + TLS version to 1.2 or newer improves security by ensuring your Azure Synapse + workspace SQL server can only be accessed from clients using TLS 1.2 or newer. + Using versions of TLS less than 1.2 is not recommended since they have well + documented security vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_synapse_sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_apps_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"Container + Apps should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks. Disabling 'allowInsecure' will result + in the automatic redirection of requests from HTTP to HTTPS connections for + container apps.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-use-container-apps-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"enforce_ssl_connection_should_be_enabled_for_mysql_database_servers\",\"responsibilityTitle\":\"Enforce + SSL connection should be enabled for MySQL database servers\",\"responsibilityDescription\":\"Azure + Database for MySQL supports connecting your Azure Database for MySQL server + to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections + between your database server and your client applications helps protect against + 'man in the middle' attacks by encrypting the data stream between the server + and your application. This configuration enforces that SSL is always enabled + for accessing your database server.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enforcing-my_sql_ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"enforce_ssl_connection_should_be_enabled_for_postgresql_database_servers\",\"responsibilityTitle\":\"Enforce + SSL connection should be enabled for PostgreSQL database servers\",\"responsibilityDescription\":\"Azure + Database for PostgreSQL supports connecting your Azure Database for PostgreSQL + server to client applications using Secure Sockets Layer (SSL). Enforcing + SSL connections between your database server and your client applications + helps protect against 'man in the middle' attacks by encrypting the data stream + between the server and your application. This configuration enforces that + SSL is always enabled for accessing your database server.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enforcing-postgresql-ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ftps_only_should_be_required_in_your_function_app\",\"responsibilityTitle\":\"FTPS + only should be required in your Function App\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-app-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"Function + App should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_only_accessible_over_https\",\"responsibilityTitle\":\"Function + app slots should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-slots-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_require_ftps_only\",\"responsibilityTitle\":\"Function + app slots should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-app-slots-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"Function + app slots should use the latest TLS version\",\"responsibilityDescription\":\"Periodically, + newer versions are released for TLS either due to security flaws, include + additional functionality, and enhance speed. Upgrade to the latest TLS version + for Function apps to take advantage of security fixes, if any, and/or new + functionalities of the latest version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-slot-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"hdinsight_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"HDInsight + should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your HSInsight cluster is public facing, then TLS latest version should be + used to secure your cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure-your-hdinsight-cluster\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"iot_hub_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Iot + Hub should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your Iot Hub is public facing, then TLS latest version should be used to secure + your resource.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-if-your-iot-hub-is-public-facing-then-use-tls-latest-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"kubernetes_clusters_should_be_accessible_only_over_https\",\"responsibilityTitle\":\"Kubernetes + clusters should be accessible only over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures authentication and protects data in transit from network + layer eavesdropping attacks. This capability is currently generally available + for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc + enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-use-of-k8s-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"latest_tls_version_should_be_used_in_your_function_app\",\"responsibilityTitle\":\"Latest + TLS version should be used in your Function App\",\"responsibilityDescription\":\"Upgrade + to the latest TLS version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mariadb_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"MariaDB + should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your MariaDB is public facing, then TLS latest version should be used to secure + your DB.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure-your-db-with-tls-latest-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"only_secure_connections_to_your_azure_cache_for_redis_should_be_enabled\",\"responsibilityTitle\":\"Only + secure connections to your Azure Cache for Redis should be enabled\",\"responsibilityDescription\":\"Audit + enabling of only connections via SSL to Azure Cache for Redis. Use of secure + connections ensures authentication between the server and the service and + protects data in transit from network layer attacks such as man-in-the-middle, + eavesdropping, and session-hijacking.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-audit-enabling-of-ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_cache_for_redis_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible cache for Redis should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"This + policy enables you to check if the Redis instance's TLS version is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-check-redis-instance-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_mysql_database_should_enable_ssl_enforcement_and_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible MySQL Database should enable SSL enforcement and should have the + minimal TLS version of 1.2\",\"responsibilityDescription\":\"This policy enables + you to check if the MySQL instance's sslEnforcement enabled and TLS version + is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-this-policy-enables-you-to-check-if-the-mysql-instance-ssl-enforcement-enabled\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_postgresql_server_should_enable_ssl_enforcement_and_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible PostgreSQL server should enable SSL enforcement and should have + the minimal TLS version of 1.2\",\"responsibilityDescription\":\"This policy + enables you to check if the PostgreSQL instance's sslEnforcement enabled and + TLS version is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-check-postgresql-instance-ssl-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"secure_transfer_to_storage_accounts_should_be_enabled\",\"responsibilityTitle\":\"Secure + transfer to storage accounts should be enabled\",\"responsibilityDescription\":\"Audit + requirement of Secure transfer in your storage account. Secure transfer is + an option that forces your storage account to accept requests only from secure + connections (HTTPS). Use of HTTPS ensures authentication between the server + and the service and protects data in transit from network layer attacks such + as man-in-the-middle, eavesdropping, and session-hijacking.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-audit-requirement-of-secure-transfer\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"sql_managed_instance_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"SQL + Managed Instance should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"Setting + minimal TLS version to 1.2 improves security by ensuring your SQL Managed + Instance can only be accessed from clients using TLS 1.2. Using versions of + TLS less than 1.2 is not recommended since they have well documented security + vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-setting-minimal-tls-version-for-sql-managed-instance\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ssl_policy_of_application_gateway_listener_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"SSL + Policy of Application gateway listener should have the minimal TLS version + of 1.2\",\"responsibilityDescription\":\"This policy enables you to check + if the TLS version of the listener's SSL policy is the latest, designed for + the application gateway.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-this-policy-enables-you-to-check-if-the-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_have_the_specified_minimum_tls_version\",\"responsibilityTitle\":\"Storage + accounts should have the specified minimum TLS version\",\"responsibilityDescription\":\"Configure + a minimum TLS version for secure communication between the client application + and the storage account. To minimize security risk, the recommended minimum + TLS version is the latest released version, which is currently TLS 1.2.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-configure-minimum-tls-version-for-storage-accounts\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"tls_protocol_1_dot_2_must_be_used_for_arc_sql_managed_instances\",\"responsibilityTitle\":\"TLS + protocol 1.2 must be used for Arc SQL managed instances\",\"responsibilityDescription\":\"As + a part of network settings, Microsoft recommends allowing only TLS 1.2 for + TLS protocols in SQL Servers. Learn more on network settings for SQL Server + at https://aka.ms/TlsSettingsSQLServer + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_arc_sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"windows_web_servers_should_be_configured_to_use_secure_communication_protocols\",\"responsibilityTitle\":\"Windows + web servers should be configured to use secure communication protocols\",\"responsibilityDescription\":\"To + protect the privacy of information communicated over the Internet, your web + servers should use the latest version of the industry-standard cryptographic + protocol, Transport Layer Security (TLS). TLS secures communications over + a network by using security certificates to encrypt a connection between machines.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-the-privacy\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_2\",\"controlName\":\"Provide + evidence demonstrating TLS compression is disabled for public web services + to avoid CRIME, and TLS HSTS is enabled for 180-days site-wide\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence for all of the following which:

A) Shows TLS compression is + diasbled for all public facing services handling web requests to prevent Compression + Ratio Info-leak Made Easy (CRIME)
B) Validates that TLS HSTS is enabled + and configured to 180-days across all sites\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control2\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"validate-that-TLS-compression-is-disabled\",\"responsibilityTitle\":\"Provide + demonstrable evidence that TLS compression is disabled across all public-facing + services that handle web requests\",\"responsibilityDescription\":\"There + is a specific TLS vulnerability, CRIME (CVE-2012-4929), which affects TLS Compression. For this + reason, industry recommendations are to turn this functionality off. ACAT + will leverage the python module sslyze(https://pypi.org/project/sslyze/) to check the TLS compression + status.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"validate-that-TLS-compression-is-disabled\",\"recommendationShortName\":\"hostname + is missing\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds2_1\",\"recommendationSolutionContent\":\"1.Go + to the ACAT portal and click your report.

2. Click 'Edit Microsoft + 365 Certification configuration' under Settings on the top menues of the report + detail page.

3. Input your public facing service's hostname and save.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-disable-tls-compression\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"validate-that-HSTS-header-is-configured-and-greater-than-180-days\",\"responsibilityTitle\":\"Validate + that TLS HSTS is enabled and configured to >= 15552000 across all sites\",\"responsibilityDescription\":\"HTTP + Strict Transport Security (HSTS) is a security mechanism designed to protect + websites against man-in-the-middle attacks by forcing TLS connections by way + of an HTTPS response header field named \\\"Strict-Transport-Security\\\". + ACAT will call the hostname which ISVs provide to check the response headers + whether enable the HSTS header correctly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"validate-that-HSTS-header-is-configured-and-greater-than-180-days\",\"recommendationShortName\":\"hostname + is missing\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds2_1\",\"recommendationSolutionContent\":\"1.Go + to the ACAT portal and click your report.

2. Click 'Edit Microsoft + 365 Certification configuration' under Settings on the top menues of the report + detail page.

3. Input your public facing service's hostname and save.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-tls-hsts\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + At Rest\",\"controlFamilyStatus\":\"Passed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_3\",\"controlName\":\"Provide + evidence that data at rest is encrypted in line with the encryption profile + requirements, using encryption algorithms such as AES, Blowfish, TDES and + encryption key sizes of 128-bit, and 256-bit\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that data at rest is encrypted in line with the encryption profile + requirements, using encryption algorithms such as Advanced Encryption Standard + (AES), Blowfish, Triple Data Encryption Standard (TDES) and encryption key + sizes of 128-bit, and 256-bit\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control3\",\"controlStatus\":\"Passed\",\"responsibilities\":[{\"responsibilityId\":\"automation_account_variables_should_be_encrypted\",\"responsibilityTitle\":\"Automation + account variables should be encrypted\",\"responsibilityDescription\":\"It + is important to enable encryption of Automation account variable assets when + storing sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-encrypt-automation-account-variables\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_hdinsight_cluster_should_enable_double_encryption\",\"responsibilityTitle\":\"Azure + HDInsight clusters should use encryption at host to encrypt data at rest\",\"responsibilityDescription\":\"Enabling + encryption at host helps protect and safeguard your data to meet your organizational + security and compliance commitments. When you enable encryption at host, data + stored on the VM host is encrypted at rest and flows encrypted to the Storage + service.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-hdinsight-cluster-encryption-data-at-rest\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_synapse_analytics_dedicated_sql_pools_should_enable_encryption\",\"responsibilityTitle\":\"Azure + Synapse Analytics dedicated SQL pools should enable encryption\",\"responsibilityDescription\":\"Enable + transparent data encryption for Azure Synapse Analytics dedicated SQL pools + to protect data-at-rest and meet compliance requirements. Please note that + enabling transparent data encryption for the pool may impact query performance. + More details can refer to https://go.microsoft.com/fwlink/?linkid=2147714 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-synapse-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"disk_encryption_should_be_enabled_on_azure_data_explorer\",\"responsibilityTitle\":\"Disk + encryption should be enabled on Azure Data Explorer\",\"responsibilityDescription\":\"Enabling + disk encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-disk-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"double_encryption_should_be_enabled_on_azure_data_explorer\",\"responsibilityTitle\":\"Double + encryption should be enabled on Azure Data Explorer\",\"responsibilityDescription\":\"Enabling + double encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments. When double encryption has been enabled, + data in the storage account is encrypted twice, once at the service level + and once at the infrastructure level, using two different encryption algorithms + and two different keys.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-data-explorer-double-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"eventhub_namespace_should_enable_double_encryption\",\"responsibilityTitle\":\"Event + Hub namespaces should have double encryption enabled\",\"responsibilityDescription\":\"Enabling + double encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments. When double encryption has been enabled, + data in the storage account is encrypted twice, once at the service level + and once at the infrastructure level, using two different encryption algorithms + and two different keys.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-synapse-enable-custom-key-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"most_storages_in_azure_are_encrypted_by_default_with_microsoft_managed_keys_encryption\",\"responsibilityTitle\":\"Most + storages in Azure are encrypted by default with Microsoft-managed keys encryption\",\"responsibilityDescription\":\"Azure + Database for MySQL, Azure PostgreSQL, SQL Database, Azure SQL Managed Instance, + SQL Server, Azure Cosmos DB, Event Hubs, SQL managed instances, Storage account, + Azure Synapse Analytics, Azure Batch accounts, Azure Kubernetes Service (AKS), + Virtual Machines, Azure Container registries, Azure HPC Cache, etc., are encrypted + by default with Microsoft-managed keys encryption. More resource types can + refer to this doc.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.287Z\",\"recommendationIds\":[\"ds3_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-encryption-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"queue_storage_should_use_customer_managed_key_for_encryption\",\"responsibilityTitle\":\"Queue + Storage should use customer-managed key for encryption\",\"responsibilityDescription\":\"Secure + your queue storage with greater flexibility using customer-managed keys. When + you specify a customer-managed key, that key is used to protect and control + access to the key that encrypts your data. Using customer-managed keys provides + additional capabilities to control rotation of the key encryption key or cryptographically + erase data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-queue-storage-customer-key-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"require_encryption_on_data_lake_store_accounts\",\"responsibilityTitle\":\"Require + encryption on Data Lake Store accounts\",\"responsibilityDescription\":\"This + policy ensures encryption is enabled on all Data Lake Store accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-datalake-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_account_encryption_scopes_should_use_double_encryption_for_data_at_rest\",\"responsibilityTitle\":\"Storage + account encryption scopes should use double encryption for data at rest\",\"responsibilityDescription\":\"Enable + infrastructure encryption for encryption at rest of your storage account encryption + scopes for added security. Infrastructure encryption ensures that your data + is encrypted twice.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-account-scope-double-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"transparent_data_encryption_on_sql_databases_should_be_enabled\",\"responsibilityTitle\":\"Transparent + Data Encryption on SQL databases should be enabled\",\"responsibilityDescription\":\"Transparent + data encryption should be enabled to protect data-at-rest and meet compliance + requirements.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + Retention, Back-up and Disposal\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_4\",\"controlName\":\"Provide + evidence of documented, approved data retention period\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + proof that an approved data retention period is formally established and documented\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control4\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_4_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that an approved and documented data retention period + is formally established\",\"responsibilityDescription\":\"Please provide proof + that an approved data retention period is formally established and documented.

Supply + the full data retention policy which clearly details how long data (must cover + all data types) should be kept for so the business can perform its business + functions.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-establish-retention-policy\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_5\",\"controlName\":\"Provide + evidence for data retention within controlled retention period as per control + 4\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence that + data is retained only for the defined\_retention period as discussed in control + 4\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control5\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_5_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that retained data matches defined retention period\",\"responsibilityDescription\":\"Provide + screenshot evidence (or via screenshare) showing that stored data (in all + the various data locations, i.e., databases, file shares, archives, etc.) + does not exceed the defined data retention policy. Examples could be screenshots + of:

(i) Database records with a date field, searched in oldest record + order, and/or
(ii) File storage locations showing timestamps that are within + the retention period Note: Any personal/sensitive customer data should be + redacted within the screenshot.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-validate-retention-periods\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_6\",\"controlName\":\"Provide + evidence of secure data deletion processes after retention period\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that processes are in place to securely delete data after its retention + period\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control6\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_6_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that processes are in place to securely delete data + after its retention period\",\"responsibilityDescription\":\"If the deletion + process is done programmatically, then provide a screenshot of the script + that is used to perform this. If it is executed on a schedule, provide a screenshot + showing the schedule. For example, a script to delete files within a file + share may be configured as a CRON job, screenshot the CRON job showing the + schedule and the script which is executed; and provide the script showing + the command used.\",\"responsibilityType\":\"ScopedManual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-data-deletion\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_database_retention_period_meet_retention_policy\",\"responsibilityTitle\":\"Provide + demonstrable evidence that the retention policy of your Azure resources meet + your data deletion tetention period\",\"responsibilityDescription\":\"Most + Azure databses (i.e., CosmosDB, Azure SQL Database, MySQL Database, etc.) + have default retention period for the backup data and it can also be configured. + The retention period of Azure backup data should also be considered in your + defined data retention policy. Please provide screenshot showing the backup + retention period of your Azure database services (i.e., databases, file shares, + archives, etc.)\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"azure_database_retention_period_meet_retention_policy\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds6_1\",\"recommendationSolutionContent\":\"
ACAT + can collect your backup policies from Azure Backup Center.
To collect backup + policy from Azure Backup Center:
1. Create Recovery Service Vault or Backup + Vault in the Azure Backup Center
2. Set backup policies in the related + vaults
3. Please make sure to include the backup resources and its backup + vaults to the report resources. You can modify the report resources by clicking + 'Settings' > 'Edit resources' to update ACAT report resources.

Once + you've included your backup resources to the ACAT report, click 'Collect evidence + by ACAT' button to collect evidence. ACAT will summarize your backup policies + into a csv file. Then, you can view ACAT evidence in the 'ACAT collected evidence' + below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_7\",\"controlName\":\"Provide + evidence of automated backup system, backup testing, and access controls for + backup data\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) An automated backup system is in place and configured to perform + backups at scheduled times

B) Backup information is tested in line + with the backup scheduling procedure and restored periodically to confirm + the reliability and integrity of the data

C) Appropriate access controls + and protection mechanisms (i.e immunable backups) are implemented to ensure + backups / system snapshots are secured against unauthorized access and to + ensure the confidentiality, integrity, and availability of the backup data\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control7\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_7_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that appropriate access controls and protection mechanisms + are implemented to ensure backups are secured against unauthorized access\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Appropriate access controls and + protection mechanisms (i.e., immutable backups) are implemented to ensure + backups/ system snapshots are secured against unauthorized access and to ensure + the confidentiality, integrity, and availability of the backup data.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-database-for-mysql-flexible-server-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + Database for MySQL Flexible Server instance should be configured to backup + automatically\",\"responsibilityDescription\":\"By default, Azure Database + for MySQL flexible server enables automated backups of your entire server + (encompassing all databases created) with a default 7-day retention period. + You can also trigger a manual backup using On-Demand backup feature.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-database-for-postgresql-flexible-server-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + Database for PostgreSQL Flexible Server instance should be configured to backup + automatically\",\"responsibilityDescription\":\"Azure Database for PostgreSQL + flexible server automatically performs regular backups of your server. You + can then do a point-in-time recovery (PITR) within a retention period that + you specify.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-sql-database-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + SQL Database should be configured to backup automatically\",\"responsibilityDescription\":\"Azure + SQL Database comes with a core resiliency and reliability promise that protects + it against software or hardware failures. Database backups are automated to + protect your data from corruption or accidental deletion.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cosmos-db-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Cosmos + DB should be configured to backup automatically\",\"responsibilityDescription\":\"Azure + Cosmos DB automatically takes backups your data at regular intervals. The + automatic backups are taken without affecting the performance or availability + of the database operations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmosdb-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-backup-system-in-place-and-test-inline\",\"responsibilityTitle\":\"Provide + demonstrable evidence that automated backup system is in place and backup + infromation is tested in line with backup scheduling\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

(i) An automated backup system + is in place and configured to perform backups at scheduled times.
(ii) + Backup information is tested in line with the backup scheduling procedure + and restored periodically to confirm the reliability and integrity of the + data.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"azure-backup-system-in-place-and-test-inline\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"
ACAT + can collection backup policy from Azure Backup Center(If applicable) to help + you demonstrate that an automated backup system is in place and configured + to perform backups at scheduled times.

To collect backup policy from + Azure Backup Center:
Please make sure to include the backup resources and + its backup vaults from Azure Backup Center to the report resources. You can + modify the report resources by clicking 'Settings' > 'Edit resources' to update + ACAT report resources.

Once you've included your backup resources to + the ACAT report, click 'Collect evidence by ACAT' button to collect evidence. + ACAT will summarize your backup data retention period into a csv file. Then, + you can view ACAT evidence in the 'ACAT collected evidence' below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + Access Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_8\",\"controlName\":\"Provide + evidence that individuals with access to data/keys are approved & configured + based on job\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) A list of users with access to data and/or encryption keys + is maintained including the business justification for each person
B) This + list of users was formally approved based on access privileges required for + their job function
C) Users are configured with the privileges outlined + in the approval\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control8\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_8_1_manual_cr\",\"responsibilityTitle\":\"Provide + a list of all individuals with access to data or encryption keys, including + the business justification\",\"responsibilityDescription\":\"Provide evidence + to demonstrate that a list of individuals with access to data and/or encryption + keys is maintained including the business justification for each individual.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-access-list\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Data_Security_Privacy_8_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the individuals with access to data or encryption + keys were formally approved and outlined with documentation\",\"responsibilityDescription\":\"Provide + evidence to demonstrate that a list of individuals with access to data and/or + encryption keys:

(i) Were formally approved based on access privileges + required for their job function.
(ii) Are configured with the privileges + outlined in the approval.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-approval-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_9\",\"controlName\":\"Provide + evidence of maintaining third-party list and having data sharing agreements + with them\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) A list of all third-parties that data is shared with is maintained.
B) + Data sharing agreements are in place with all third-parties consuming data
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control9\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_9_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a list of all third parties that data is shared + with is maintained and data sharing agreements are in place with all third-parties + consuming data\",\"responsibilityDescription\":\"Provide evidence that:

(i) + A list of all third parties that data is shared with is maintained.
(ii) + Data sharing agreements are in place with all third-parties consuming data.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-list-third-parties\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Privacy\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_10\",\"controlName\":\"Provide + evidence of established PIM system with leadership commitment, roles and responsibilities + defined\",\"controlFullName\":\"\",\"controlDescription\":\"Does your organization + have a Privacy Information Management (PIM) system established, implemented + and maintained that:

A) Holds leadership commitment by way of a policy + or other form of documentation/computerised system for how your privacy information + management efforts are maintained for system confidentiality and integrity
B) + Determines roles, responsibilities and authorities of each person maintaining + the system, including PII Processors and Controllers\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control10\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_10_manual_cr\",\"responsibilityTitle\":\"Provide + evidence demonstrating that your organization have a Privacy Information Management + (PIM) system established, implemented, and maintained\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that your organization have a Privacy Information + Management (PIM) system established, implemented, and maintained that:

(i) + Holds leadership commitment by way of a policy or other form of documentation/computerized + system for how your privacy information management efforts are maintained + for system confidentiality and integrity.
(ii) Determines roles, responsibilities + and authorities of each person maintaining the system, including PII Processors + and Controllers.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-sar-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_11\",\"controlName\":\"Provide + evidence for following PII security processes: minimize, deidentify, control + transmission & record transfer\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence of processes to show that:

i) PII minimization is taking place

ii) + PII de-identification and deletion is being done at the end of the processing + period

iii) Controls are in place for PII transmission including any + confidentiality

iv) Record of transfer of PII from one country/region + to another exists with expressed consent to do so\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control11\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_11_manual_cr\",\"responsibilityTitle\":\"Provide + evidence demonstrating that PII minimization is taking place, PII de-identification + and deletion is being done, and controls & record are in place for PII transmission\",\"responsibilityDescription\":\"Provide + evidence of processes to show that:

(i) PII minimization is taking + place.
(ii) PII de-identification and deletion is being done at the end + of the processing period.
(iii) Controls are in place for PII transmission + including any confidentiality.
(iv) Record of transfer of PII from one + country/region to another exists with expressed consent to do so.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-privacy-notice\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"GDPR\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_12\",\"controlName\":\"Provide + evidence of SARs ability, identifying data and retention period for backups\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

(i) Data subjects are able to raise SARs
(ii) That + you (the ISV) are able to identify all locations of data subjects' data when + responding to a SARs request.
(iii)That there is a retention period for + backups which allows clients requesting removal of data via SAR's to be removed + as rolling backups over a period are removed (lifecycle of oldest back up + deletions/rewritten over)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control12\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_12_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that data subjects are able to raise SARs and you (the + ISV) are able to identify all locations of data subjects' data when responding + to a SARs request\",\"responsibilityDescription\":\"Provide evidence demonstrating + that:

(i) Data subjects are able to raise SARs.
(ii) Validate + that you (the ISV) are able to identify all locations of data subjects' data + when responding to a SARs request.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-sars-ability-identifying-data\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Data_Security_Privacy_12_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that there is a retention period for backups which allows + clients requesting removal of data via SARs to be removed as rolling backups + over a period are removed\",\"responsibilityDescription\":\"Provide evidence + demonstrating that:

That there is a retention period for backups which + allows clients requesting removal of data via SARs to be removed as rolling + backups over a period are removed (lifecycle of oldest back up deletions/rewritten + over).\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"Data_Security_Privacy_12_2_manual_cr\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds12_1\",\"recommendationSolutionContent\":\"
ACAT + can collect your resource backup data retention period from Azure Backup Center + (If applicable).
To collect backup data retention period from Azure Backup + Center:
Please make sure to include the backup resources and its backup + vaults from Azure Backup Center to the report resources. You can modify the + report resources by clicking 'Settings' > 'Edit resources' to update ACAT + report resources.

ACAT can also collect your backup data retention + period from Azure Cosmos DB, Azure SQL Database, Azure Database for PostgreSQL, + Azure Database for MySQL (If applicable).
To collect backup data retention + period from the above Azure resources, please make sure to include the backup + resources to the report resources. You can modify the report resources by + clicking 'Settings' > 'Edit resources' to update ACAT report resources.

Once + you've included your backup resources to the ACAT report, click 'Collect evidence + by ACAT' button to collect evidence. ACAT will summarize your backup data + retention period into a csv file. Then, you can view ACAT evidence in the + 'ACAT collected evidence' below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sars-ability-identifying-data\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_13\",\"controlName\":\"Provide + evidence of a privacy notice with essential information, including entities, + data types, and data subject rights\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + the privacy notice which should contain all the required elements as follows:

A) + Attributes details (Name, Address, and other personal identifiable information)
B) + Details of the type of personal data being processed
C) Details how long + personal data will be kept for.
D) Details of the lawfulness of processing + personal data.
E) Details of:
- Data subject's rights
- + Right to be informed
- Right of access by the data subject
- Right + to erasure
- Right to restriction of processing
- Right to data + portability
- Right to object
- Rights in relation to automated + decision-making including profiling\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control13\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_13_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that a privacy notice with essential information, including + details of personal data types, and data subject rights are provided\",\"responsibilityDescription\":\"Please + provide the privacy notice which should contain all the required elements + as follows:

(i) Entities details (Name, Address, etc.)
(ii) Details + of the type of personal data being processed.
(iii) Details how long personal + data will be kept for.
(iv) Details of the lawfulness of processing personal + data.
(v) Details of data subject's rights:
- Right to be informed
+ \ - Right of access by the data subject
- Right to erasure
- + Right to restriction of processing
- Right to data portability
- + Right to object
- Rights in relation to automated decision-making, including + profiling\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-privacy-notice-essential-information\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"HIPAA\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_14\",\"controlName\":\"Provide + evidence of HIPAA policy existence, ePHI confidentiality, integrity, availability + assurance, and security protection\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) A policy exists for HIPAA and HIPAA handling within + your organization for staff, contractors, vendors, etc.
B) Your organization + ensures confidentiality, integrity, and availability of ePHI that it creates, + receives, maintains, or transmits
C) Your organization ensures protection + against any reasonably anticipated threats and hazards to the security or + integrity
of ePHI\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control14\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_14_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that HIPAA policy existence, ePHI confidentiality, integrity, + availability assurance, and security protection are provided\",\"responsibilityDescription\":\"Please + provide demonstratable evidence that:

(i) A policy exists for HIPAA + and HIPAA handling within your organization for staff, contractors etc.
(ii) + ISV is ensuring the confidentiality, integrity, and availability of ePHI that + it creates, receives, maintains, or transmits.
(iii) Protect against any + reasonably anticipated threats and hazards to the security or integrity of + ePHI.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-hipaa-policy-existence\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_15\",\"controlName\":\"Provide + evidence that you protect private information, ensure staff follows security + rules, and backup data\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that you:

A) Provide protection against reasonably anticipated + uses or disclosures of such information that are not permitted by the privacy + rule
B) Ensure compliance with the security rule by its workforce
C) + Provide Data backup and Disaster recovery plan under 164.308 (a)(7)(ii)(A) + and 164.308 (a)(7)(ii)(B)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control15\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_15_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that you protect private information, ensure staff follows + security rules, and data backup and disaster recovery plan are in place\",\"responsibilityDescription\":\"Please + provide evidence that you (ISV):

(i) Protects against reasonably anticipated + uses or disclosures of such information that are not permitted by the Privacy + Rule; and
(ii) Ensure compliance with the Security Rule by its workforce.
(iii) + Data backup and Disaster recovery plan under 164..308 (a)(7)(ii)(A) and 164.308 + (a)(7)(ii)(B).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-protect-private-information\",\"justification\":\"\",\"evidenceFiles\":[]}]}]}]}]}]}}],\"nextLink\":\"https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots?%24skipToken=1&%24top=1&api-version=2024-06-27\"}" + headers: + cache-control: + - no-store, no-cache + content-length: + - '240069' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:22:19 GMT + mise-correlation-id: + - 85c9600c-906d-4c94-bad2-16520eed1019 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062220Z-168779fcbd648xwrd2mwcm192s000000034g000000019683 + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 084d3250b4be8be87cd9167c2eccf1ce + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 99BF351FFE664A92BFDDD3472A9C974F Ref B: TYO201151001025 Ref C: 2024-06-18T06:22:20Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"downloadType": "ResourceList"}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report download + Connection: + - keep-alive + Content-Length: + - '32' + Content-Type: + - application/json + ParameterSetName: + - --report-name --download-type + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: POST + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots/crstatustest-prod-20240617200351-20240617T230307-487Z/download?api-version=2024-06-27 + response: + body: + string: '{"resourceList":[{"subscriptionId":"120b982f-6bd3-4b60-98d2-a7b7ecd6c78e","resourceGroup":"CRStatusRG-prod-20240617200351","resourceType":"storageAccounts","resourceId":"appprod20240617200351"}]}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '195' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:22:20 GMT + mise-correlation-id: + - 7a7a3a18-9a78-4c9e-9877-f8064474fc21 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062221Z-168779fcbd648xwrd2mwcm192s000000034g0000000196af + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 0f55651f33cd34ab2cf326e7fe9d45da + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: 5F541567B35743E0ACD6945BAF38F0B7 Ref B: TYO201151003062 Ref C: 2024-06-18T06:22:21Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +version: 1 diff --git a/src/acat/azext_acat/tests/latest/recordings/test_get_control_assessments.yaml b/src/acat/azext_acat/tests/latest/recordings/test_get_control_assessments.yaml new file mode 100644 index 00000000000..3727ed7aa3e --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_get_control_assessments.yaml @@ -0,0 +1,1776 @@ +interactions: +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report show + Connection: + - keep-alive + ParameterSetName: + - --report-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351","name":"crstatustest-prod-20240617200351","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-17T20:06:17.8922461Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-17T20:06:17.8922461Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-18T23:00:00Z","lastTriggerTime":"2024-06-17T23:03:14.127Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CRStatusRG-prod-20240617200351/providers/Microsoft.Storage/storageAccounts/appprod20240617200351","resourceType":"Microsoft.Storage/storageAccounts","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1174' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:27:35 GMT + mise-correlation-id: + - f0dbba56-2ad2-42a3-900a-52756c8a831d + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062734Z-168779fcbd6kfhkfyp8h2n6c6c000000036g000000015e9u + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 1e7a7653f7ce0a58d6187c6f0da38f85 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: AFA376C8240746838970B927D26F8639 Ref B: TYO201100115035 Ref C: 2024-06-18T06:27:34Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report get-control-assessments + Connection: + - keep-alive + ParameterSetName: + - --report-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots?$skipToken=0&$top=1&api-version=2024-06-27 + response: + body: + string: "{\"value\":[{\"id\":\"/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots/crstatustest-prod-20240617200351-20240617T230307-487Z\",\"name\":\"crstatustest-prod-20240617200351-20240617T230307-487Z\",\"type\":\"Microsoft.AppComplianceAutomation/reports/snapshots\",\"properties\":{\"snapshotName\":\"crstatustest-prod-20240617200351-20240617T230307-487Z\",\"createdAt\":\"2024-06-17T23:03:08.288Z\",\"provisioningState\":\"Succeeded\",\"reportProperties\":{\"timeZone\":\"China + Standard Time\",\"triggerTime\":\"2023-01-08T23:00:00Z\",\"resources\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CRStatusRG-prod-20240617200351/providers/Microsoft.Storage/storageAccounts/appprod20240617200351\",\"resourceType\":\"Microsoft.Storage/storageAccounts\",\"resourceOrigin\":null,\"accountId\":null}],\"status\":\"Active\",\"errors\":[],\"tenantId\":\"72f988bf-86f1-41af-91ab-2d7cd011db47\",\"offerGuid\":\"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf\",\"nextTriggerTime\":\"2024-06-18T23:00:00Z\",\"lastTriggerTime\":\"2024-06-17T23:03:08.194Z\",\"subscriptions\":[\"120b982f-6bd3-4b60-98d2-a7b7ecd6c78e\"],\"complianceStatus\":{\"m365\":{\"passedCount\":1,\"failedCount\":37,\"manualCount\":0,\"notApplicableCount\":6,\"pendingCount\":1}},\"provisioningState\":\"Succeeded\"},\"reportSystemData\":{\"createdBy\":\"\",\"createdByType\":\"User\",\"createdAt\":\"2024-06-17T20:06:17.8922461Z\",\"lastModifiedBy\":\"\",\"lastModifiedByType\":\"User\",\"lastModifiedAt\":\"2024-06-17T20:06:17.8922461Z\"},\"complianceResults\":[{\"complianceName\":\"M365\",\"categories\":[{\"categoryName\":\"Operational + Security\",\"categoryStatus\":\"Failed\",\"controlFamilies\":[{\"controlFamilyName\":\"Awareness + Training\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_1\",\"controlName\":\"Provide + evidence of established security awareness training, frequency and records + monitoring for all information system users\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The organization provides established security awareness + training to information system users (including managers, senior executives, + and contractors) :
(i) As part of initial training for new users
OR
(ii) + When required by information system changes

B) You have organization-defined + frequency of awareness training

C) You document and monitor individual + information system security awareness activites and retain individual training + records over an organization-defined frequency

\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control1\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that you have established security awareness training + to information system users\",\"responsibilityDescription\":\"Provide evidence + that:

A) The organization provides established security awareness training + to information system users (including managers, senior executives, and contractors):
+ (i) As part of initial training for new users
OR
(ii) When required + by information system changes

B) Organization-defined frequency of + awareness training.

C) Documents and monitors individual information + system security awareness activities and retains individual training records + over an organization-defined frequency.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-awareness-training\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Malware + Protection - Anti-Malware\",\"controlFamilyStatus\":\"NotApplicable\",\"controls\":[{\"controlId\":\"Operational_Security_2\",\"controlName\":\"Provide + evidence of active anti-malware solution meeting specific criteria including + on-access scanning and blocking capabilities\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that your anti-malware solution is active and enabled across all + the sampled system components and configured to meet the following criteria:

A) + If Anti Virus, then on-access scanning is enabled and that signatures are + up-to-date within 1-day

B) If Anti Virus, then it automatically blocks + malware or alerts and quarantines when malware is detected

OR

C) + If Endpoint Detection and Threat Response(EDTR)/Endpoint Detection and Protection + Response(EDPR)/Hueristic based scanning using AI then:
(i) periodic scanning + is being performed
(ii) it is generating audit logs
(iii) it is kept + up-to date continually and has self-learning capabilities

D) If EDTR/EDPR/Hueristic + based scanning using AI then:
(i) it blocks known malware
(ii) it identifies + and blocks new malware variants based on macro behaviours as well as having + full safelist capabilities\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control2\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"antivirus_software_or_ms_defender_should_be_enabled\",\"responsibilityTitle\":\"Antivirus + software or Microsoft Defender should be enabled\",\"responsibilityDescription\":\"This + control monitors if Antivirus software or Microsoft Defender is be enabled.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op2_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-antivirus-software\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Malware + Protection - Application Control\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_3\",\"controlName\":\"Provide + evidence of approved software list and active application control technology + with configuration documentation\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that the following controls are in place:

A) You have an approved + list of software/applications with business justification that:

(i) + exists and is kept up to date
(ii) each application undergoes an approval + process and sign off prior to its deployment

B) That application control + technology is active, enabled, and configured across all the sampled system + components as documented\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control3\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_3_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence of approved software list and active application control + technology with configuration documentation\",\"responsibilityDescription\":\"Provide + evidence that the following controls are in place:

A) You have an approved + list of software/applications with business justification that:
(i) exists + and is kept up to date
(ii) each application undergoes an approval process + and sign off prior to its deployment

B) That application control technology + is active, enabled, and configured across all the sampled system components + as documented\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-approval-process-for-applications\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Patch + Management - Patching & Risk Ranking\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_4\",\"controlName\":\"Provide + evidence of comprehensive patch management documentation including patch windows, + decommissioning of unsupported OS/software, and vulnerability identification\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:
A) Patch management policy and procedure documentation defines + all of the following:

i) suitable minimal patching window/s from vendor + patch release or from when coding vulnerabilities are first identified for + Critical/High and Medium risks vulnerabilities.
ii) decommissioning of + unsupported operating systems and software
(ii) details on how new security + vulnerabilities are identified and assigned a risk score\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control4\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_4_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence of comprehensive patch management documentation including + patch windows, decommissioning, and vulnerability identification\",\"responsibilityDescription\":\"Provide + evidence that:

A) Patch management policy and procedure documentation + defines all of the following:
(i) suitable minimal patching window/s from + vendor patch release or from when coding vulnerabilities are first identified + for Critical/High and Medium risks vulnerabilities.
(ii) decommissioning + of unsupported operating systems and software
(iii) details on how new + security vulnerabilities are identified and assigned a risk score\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-minimal-patching-windows\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_5\",\"controlName\":\"Provide + demonstratable evidence that all sampled system components are being patched + and unsupported OS and software components are not in use\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) All sampled system components are being patched
B) + Unsupported operating systems and software components are not in use

Where + applicable this should include code base if serverless technology or PaaS + is used, or both infrastructure and code base if IaaS is used\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control5\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_5_3_manual_cr_aws\",\"responsibilityTitle\":\"Provide + demonstratable evidence that historical patching operations of AWS EC2 instances + are within the minimum patching window\",\"responsibilityDescription\":\"Provide + demonstratable evidence that historical patching operation of AWS EC2 instances + are within the minimum patching window.
The minimal patching timeframe + is:
- Critical severity (14 days),
- High severity (30 days),
+ - Medium severity (60 days).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-unsupported-operating-systems-and-software\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_5_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that unsupported operating systems and software components + are not in use for Azure Virtual Machines\",\"responsibilityDescription\":\"Provide + demonstratable evidence that unsupported operating systems and software components + are not in use for Azure Virtual Machines.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-unsupported-operating-systems-and-software\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_5_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence to show all the software are being patched\",\"responsibilityDescription\":\"Provide + demonstratable evidence to show all sampled system components are being patched.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-software-list-and-patching\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Vulnerability + Scanning\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_6\",\"controlName\":\"Provide + evidence of quarterly infrastructure and web vulnerability scanning is carried + out against public and internal IPs/URLs\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Quarterly infrastructure and web application vulnerability + scanning is carried out.

(If Hybrid, On-prem or IaaS: This needs + to be carried out against the public footprint (IPs/URLs) and internal IP + ranges OR
If PaaS: This needs to be carried out on external infratructure + and web assessment only).

(Must include the full scope of the environment)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control6\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"azure_defender_for_app_service_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for App Service should be enabled\",\"responsibilityDescription\":\"Azure + Defender for App Service leverages the scale of the cloud, and the visibility + that Azure has as a cloud provider, to monitor for common web app attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-app-service\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_azure_sql_database_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Azure SQL Database servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-database-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Key Vault should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Key Vault provides an additional layer of protection and security + intelligence by detecting unusual and potentially harmful attempts to access + or exploit key vault accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_resource_manager_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Resource Manager should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Resource Manager automatically monitors the resource management + operations in your organization. Azure Defender detects threats and alerts + you about suspicious activity. Learn more about the capabilities of Azure + Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling + this Azure Defender plan results in charges. Learn about the pricing details + per region on Security Center's pricing page: https://aka.ms/pricing-security-center .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-resource-manager\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for servers provides real-time threat protection for server workloads + and generates hardening recommendations as well as alerts about suspicious + activities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_servers_on_machines_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for SQL servers on machines should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-on-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_should_be_enabled_for_unprotected_sql_managed_instances\",\"responsibilityTitle\":\"Azure + Defender for SQL should be enabled for unprotected SQL Managed Instances\",\"responsibilityDescription\":\"Audit + each SQL Managed Instance without advanced data security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"microsoft_defender_for_containers_should_be_enabled\",\"responsibilityTitle\":\"Microsoft + Defender for Containers should be enabled\",\"responsibilityDescription\":\"Microsoft + Defender for Containers provides hardening, vulnerability assessment and run-time + protections for your Azure, hybrid, and multi-cloud Kubernetes environments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op6_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-containers\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_7\",\"controlName\":\"Provide + evidence that remediation of all vulnerabilities identified in Control 6 are + patched in line with the minimal patching window defined in your policy\",\"controlFullName\":\"\",\"controlDescription\":\" + Provide rescan evidence that:

A) Remediation of all vulnerabilities + identified in control 6 are patched inline with the minimal patching window + defined in your policy\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control7\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"validate_that_vulnerabilities_remediation_are_patched_inline_with_the_minimal_patching_window\",\"responsibilityTitle\":\"Validate + that vulnerabilities remediation for Azure resources are patched inline with + the minimal patching window\",\"responsibilityDescription\":\"This policy + validates that vulnerabilities remediation for Azure resources are patched + inline with the minimal patching window. The minimal patching timeframe is: + Critical severity(3 business days), High severity(7 business days), Medium + severity(28 business days), Low severity(60 business days), other severity(90 + business days).\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":1,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"Microsoft.Resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Unhealthy\",\"resourceStatusChangeDate\":\"2023-12-25T08:09:12.7230376Z\",\"recommendationIds\":[\"validate-that-vulnerabilities-remediation-are-patched-inline-with-the-minimal-patching-window\"]}],\"recommendationList\":[{\"recommendationId\":\"validate-that-vulnerabilities-remediation-are-patched-inline-with-the-minimal-patching-window\",\"recommendationShortName\":\"Vulnerabilities + not patch in time\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op7_1\",\"recommendationSolutionContent\":\"1. + Go to the https://portal.azure.com/#view/HubsExtension/ArgQueryBlade/resourceType/Microsoft.Resources%2FResources +
2. Run query 'securityresources| where type == 'microsoft.security/assessments' + and properties.status.code != 'Healthy' '.
3. Please fix your vulnerabilities + in the specified period following the specific remediation steps. The patching + timeframe is: Critical severity (14 days), High severity (30 days), Medium + severity (60 days)\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-vulnerabilities-patching-validation-azure\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Network + Security Controls (NSC)\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_8\",\"controlName\":\"Provide + evidence of NSC installation on the in-scope boundary and public access termination + at perimeter network\",\"controlFullName\":\"\",\"controlDescription\":\"
Provide + evidence that:

A) Network Secuirtiy Controls (NSC) are installed + on the boundary of the in-scope environment, and installed between the perimeter + network and internal networks

AND if Hybrid, On-prem, IaaS also provide + evidence that:

B) all public access terminates at the perimeter network\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control8\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"preview_all_internet_traffic_should_be_routed_via_your_deployed_azure_firewall\",\"responsibilityTitle\":\"[Preview]: + All Internet traffic should be routed via your deployed Azure Firewall\",\"responsibilityDescription\":\"Azure + Security Center has identified that some of your subnets aren't protected + with a next generation firewall. Protect your subnets from potential threats + by restricting access to them with Azure Firewall or a supported next generation + firewall.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-firewall-internet-traffic-routing\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_azure_key_vault_should_disable_public_network_access\",\"responsibilityTitle\":\"[Preview]: + Azure Key Vault should disable public network access\",\"responsibilityDescription\":\"Disable + public network access for your key vault so that it's not accessible over + the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-key-vault-disable-public-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"adaptive_network_hardening_recommendations_should_be_applied_on_internet_facing_virtual_machines\",\"responsibilityTitle\":\"Adaptive + network hardening recommendations should be applied on internet facing virtual + machines\",\"responsibilityDescription\":\"Azure Security Center analyzes + the traffic patterns of Internet facing virtual machines and provides Network + Security Group rule recommendations that reduce the potential attack surface.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-network-harden-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"api_management_services_should_use_a_virtual_network\",\"responsibilityTitle\":\"API + Management services should use a virtual network\",\"responsibilityDescription\":\"Azure + Virtual Network deployment provides enhanced security, isolation and allows + you to place your API Management service in a non-internet routable network + that you control access to. These networks can then be connected to your on-premises + networks using various VPN technologies, which enables access to your backend + services within the network and/or on-premises. The developer portal and API + gateway, can be configured to be accessible either from the Internet or only + within the virtual network.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-api-mgmt-vnet\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"authorized_ip_ranges_should_be_defined_on_kubernetes_services\",\"responsibilityTitle\":\"Authorized + IP ranges should be defined on Kubernetes Services\",\"responsibilityDescription\":\"Restrict + access to the Kubernetes Service Management API by granting API access only + to IP addresses in specific ranges. It is recommended to limit access to authorized + IP ranges to ensure that only applications from allowed networks can access + the cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-kubernetes-authorized-ip-ranges\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_cosmos_db_accounts_should_have_firewall_rules\",\"responsibilityTitle\":\"Azure + Cosmos DB accounts should have firewall rules\",\"responsibilityDescription\":\"Firewall + rules should be defined on your Azure Cosmos DB accounts to prevent traffic + from unauthorized sources. Accounts that have at least one IP rule defined + with the virtual network filter enabled are deemed compliant. Accounts disabling + public access are also deemed compliant.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmos-db-firewall-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_ddos_protection_standard_should_be_enabled\",\"responsibilityTitle\":\"Azure + DDoS Protection Standard should be enabled\",\"responsibilityDescription\":\"DDoS + protection standard should be enabled for all virtual networks with a subnet + that is part of an application gateway with a public IP.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-ddos-protection\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_web_application_firewall_should_be_enabled_for_azure_front_door_entry_points\",\"responsibilityTitle\":\"Azure + Web Application Firewall should be enabled for Azure Front Door entry-points\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-front-door-entry-points\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_disable_public_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should disable public network access\",\"responsibilityDescription\":\"Disabling + public network access improves security by ensuring that Cognitive Services + account isn't exposed on the public internet. Creating private endpoints can + limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-disable-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_restrict_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should restrict network access\",\"responsibilityDescription\":\"Network + access to Cognitive Services accounts should be restricted. Configure network + rules so only applications from allowed networks can access the Cognitive + Services account. To allow connections from specific internet or on-premises + clients, access can be granted to traffic from specific Azure virtual networks + or to public internet IP address ranges.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_registries_should_not_allow_unrestricted_network_access\",\"responsibilityTitle\":\"Container + registries should not allow unrestricted network access\",\"responsibilityDescription\":\"Azure + container registries by default accept connections over the internet from + hosts on any network. To protect your registries from potential threats, allow + access from only specific public IP addresses or address ranges. If your registry + doesn't have an IP/firewall rule or a configured virtual network, it will + appear in the unhealthy resources. Learn more about Container Registry network + rules here: https://aka.ms/acr/portal/public-network + and here https://aka.ms/acr/vnet + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-container-registry-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"internet_facing_virtual_machines_should_be_protected_with_network_security_groups\",\"responsibilityTitle\":\"Internet-facing + virtual machines should be protected with network security groups\",\"responsibilityDescription\":\"Protect + your virtual machines from potential threats by restricting access to them + with network security groups (NSG). Learn more about controlling traffic with + NSGs at https://aka.ms/nsg-doc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-vm-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ip_forwarding_on_your_virtual_machine_should_be_disabled\",\"responsibilityTitle\":\"IP + Forwarding on your virtual machine should be disabled\",\"responsibilityDescription\":\"Enabling + IP forwarding on a virtual machine's NIC allows the machine to receive traffic + addressed to other destinations. IP forwarding is rarely required (e.g., when + using the VM as a network virtual appliance), and therefore, this should be + reviewed by the network security team.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-ip-forwarding-disable-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_of_virtual_machines_should_be_protected_with_just_in_time_network_access_control\",\"responsibilityTitle\":\"Management + ports of virtual machines should be protected with just-in-time network access + control\",\"responsibilityDescription\":\"Possible network Just In Time (JIT) + access will be monitored by Azure Security Center as recommendations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-jit-network-access-control\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_should_be_closed_on_your_virtual_machines\",\"responsibilityTitle\":\"Management + ports should be closed on your virtual machines\",\"responsibilityDescription\":\"Open + remote management ports are exposing your VM to a high level of risk from + Internet-based attacks. These attacks attempt to brute force credentials to + gain admin access to the machine.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-close-vm-management-ports\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_on_azure_sql_database_should_be_disabled\",\"responsibilityTitle\":\"Public + network access on Azure SQL Database should be disabled\",\"responsibilityDescription\":\"Disabling + the public network access property improves security by ensuring your Azure + SQL Database can only be accessed from a private endpoint. This configuration + denies all logins that match IP or virtual network based firewall rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-db-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mariadb_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MariaDB servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MariaDB can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mariadb-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mysql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MySQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MySQL can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_postgresql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for PostgreSQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for PostgreSQL can only be accessed from a private endpoint. This + configuration disables access from any public address space outside of Azure + IP range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_restrict_network_access_using_virtual_network_rules\",\"responsibilityTitle\":\"Storage + accounts should restrict network access using virtual network rules\",\"responsibilityDescription\":\"Protect + your storage accounts from potential threats using virtual network rules as + a preferred method instead of IP-based filtering. Disabling IP-based filtering + prevents public IPs from accessing your storage accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-accounts-vnet-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"subnets_should_be_associated_with_a_network_security_group\",\"responsibilityTitle\":\"Subnets + should be associated with a Network Security Group\",\"responsibilityDescription\":\"Protect + your subnet from potential threats by restricting access to it with a Network + Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules + that allow or deny network traffic to your subnet.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-subnets-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"web_application_firewall_waf_should_be_enabled_for_application_gateway\",\"responsibilityTitle\":\"Web + Application Firewall (WAF) should be enabled for Application Gateway\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op8_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-application-gateway\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_9\",\"controlName\":\"Provide + evidence of proper configuration and regular review of Network Security Control + rules\",\"controlFullName\":\"\",\"controlDescription\":\"Validate that:

A) + all Network Security Controls (NSC) are configured to drop traffic not explicitly + defined within the rule base

B) Network Security Controls (NSC) rule + reviews are carried out at least every 6 months\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control9\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_9_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that you are performing firewall rule reviews at least + every 6 months\",\"responsibilityDescription\":\"Any evidence provided needs + to be able to demonstrate that rule review meetings have been occurring. This + can be done by sharing meeting minutes of the NSC review and any additional + change control evidence that shows any actions taken from the review. Please + ensure that dates are present as the certification analyst reviewing your + submission would need to see a minimum of two of these meetings review documents + (i.e., every six months).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-configuration-creep\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_all_internet_traffic_should_be_routed_via_your_deployed_azure_firewall\",\"responsibilityTitle\":\"[Preview]: + All Internet traffic should be routed via your deployed Azure Firewall\",\"responsibilityDescription\":\"Azure + Security Center has identified that some of your subnets aren't protected + with a next generation firewall. Protect your subnets from potential threats + by restricting access to them with Azure Firewall or a supported next generation + firewall.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-firewall-internet-traffic-routing\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"preview_azure_key_vault_should_disable_public_network_access\",\"responsibilityTitle\":\"[Preview]: + Azure Key Vault should disable public network access\",\"responsibilityDescription\":\"Disable + public network access for your key vault so that it's not accessible over + the public internet. This can reduce data leakage risks. Learn more at: https://aka.ms/akvprivatelink + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-key-vault-disable-public-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"adaptive_network_hardening_recommendations_should_be_applied_on_internet_facing_virtual_machines\",\"responsibilityTitle\":\"Adaptive + network hardening recommendations should be applied on internet facing virtual + machines\",\"responsibilityDescription\":\"Azure Security Center analyzes + the traffic patterns of Internet facing virtual machines and provides Network + Security Group rule recommendations that reduce the potential attack surface.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-network-harden-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"api_management_services_should_use_a_virtual_network\",\"responsibilityTitle\":\"API + Management services should use a virtual network\",\"responsibilityDescription\":\"Azure + Virtual Network deployment provides enhanced security, isolation and allows + you to place your API Management service in a non-internet routable network + that you control access to. These networks can then be connected to your on-premises + networks using various VPN technologies, which enables access to your backend + services within the network and/or on-premises. The developer portal and API + gateway, can be configured to be accessible either from the Internet or only + within the virtual network.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-api-mgmt-vnet\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"authorized_ip_ranges_should_be_defined_on_kubernetes_services\",\"responsibilityTitle\":\"Authorized + IP ranges should be defined on Kubernetes Services\",\"responsibilityDescription\":\"Restrict + access to the Kubernetes Service Management API by granting API access only + to IP addresses in specific ranges. It is recommended to limit access to authorized + IP ranges to ensure that only applications from allowed networks can access + the cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-kubernetes-authorized-ip-ranges\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_cosmos_db_accounts_should_have_firewall_rules\",\"responsibilityTitle\":\"Azure + Cosmos DB accounts should have firewall rules\",\"responsibilityDescription\":\"Firewall + rules should be defined on your Azure Cosmos DB accounts to prevent traffic + from unauthorized sources. Accounts that have at least one IP rule defined + with the virtual network filter enabled are deemed compliant. Accounts disabling + public access are also deemed compliant.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmos-db-firewall-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_ddos_protection_standard_should_be_enabled\",\"responsibilityTitle\":\"Azure + DDoS Protection Standard should be enabled\",\"responsibilityDescription\":\"DDoS + protection standard should be enabled for all virtual networks with a subnet + that is part of an application gateway with a public IP.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-ddos-protection\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_web_application_firewall_should_be_enabled_for_azure_front_door_entry_points\",\"responsibilityTitle\":\"Azure + Web Application Firewall should be enabled for Azure Front Door entry-points\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-front-door-entry-points\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_disable_public_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should disable public network access\",\"responsibilityDescription\":\"Disabling + public network access improves security by ensuring that Cognitive Services + account isn't exposed on the public internet. Creating private endpoints can + limit exposure of Cognitive Services account. Learn more at: https://go.microsoft.com/fwlink/?linkid=2129800 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-disable-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cognitive_services_accounts_should_restrict_network_access\",\"responsibilityTitle\":\"Cognitive + Services accounts should restrict network access\",\"responsibilityDescription\":\"Network + access to Cognitive Services accounts should be restricted. Configure network + rules so only applications from allowed networks can access the Cognitive + Services account. To allow connections from specific internet or on-premises + clients, access can be granted to traffic from specific Azure virtual networks + or to public internet IP address ranges.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cognitive-services-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_registries_should_not_allow_unrestricted_network_access\",\"responsibilityTitle\":\"Container + registries should not allow unrestricted network access\",\"responsibilityDescription\":\"Azure + container registries by default accept connections over the internet from + hosts on any network. To protect your registries from potential threats, allow + access from only specific public IP addresses or address ranges. If your registry + doesn't have an IP/firewall rule or a configured virtual network, it will + appear in the unhealthy resources. Learn more about Container Registry network + rules here: https://aka.ms/acr/portal/public-network + and here https://aka.ms/acr/vnet + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-container-registry-network-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"internet_facing_virtual_machines_should_be_protected_with_network_security_groups\",\"responsibilityTitle\":\"Internet-facing + virtual machines should be protected with network security groups\",\"responsibilityDescription\":\"Protect + your virtual machines from potential threats by restricting access to them + with network security groups (NSG). Learn more about controlling traffic with + NSGs at https://aka.ms/nsg-doc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-vm-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ip_forwarding_on_your_virtual_machine_should_be_disabled\",\"responsibilityTitle\":\"IP + Forwarding on your virtual machine should be disabled\",\"responsibilityDescription\":\"Enabling + IP forwarding on a virtual machine's NIC allows the machine to receive traffic + addressed to other destinations. IP forwarding is rarely required (e.g., when + using the VM as a network virtual appliance), and therefore, this should be + reviewed by the network security team.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-ip-forwarding-disable-vm\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_of_virtual_machines_should_be_protected_with_just_in_time_network_access_control\",\"responsibilityTitle\":\"Management + ports of virtual machines should be protected with just-in-time network access + control\",\"responsibilityDescription\":\"Possible network Just In Time (JIT) + access will be monitored by Azure Security Center as recommendations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-jit-network-access-control\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"management_ports_should_be_closed_on_your_virtual_machines\",\"responsibilityTitle\":\"Management + ports should be closed on your virtual machines\",\"responsibilityDescription\":\"Open + remote management ports are exposing your VM to a high level of risk from + Internet-based attacks. These attacks attempt to brute force credentials to + gain admin access to the machine.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-close-vm-management-ports\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_on_azure_sql_database_should_be_disabled\",\"responsibilityTitle\":\"Public + network access on Azure SQL Database should be disabled\",\"responsibilityDescription\":\"Disabling + the public network access property improves security by ensuring your Azure + SQL Database can only be accessed from a private endpoint. This configuration + denies all logins that match IP or virtual network based firewall rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-db-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mariadb_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MariaDB servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MariaDB can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mariadb-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_mysql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for MySQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for MySQL can only be accessed from a private endpoint. This configuration + strictly disables access from any public address space outside of Azure IP + range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"public_network_access_should_be_disabled_for_postgresql_servers\",\"responsibilityTitle\":\"Public + network access should be disabled for PostgreSQL servers\",\"responsibilityDescription\":\"Disable + the public network access property to improve security and ensure your Azure + Database for PostgreSQL can only be accessed from a private endpoint. This + configuration disables access from any public address space outside of Azure + IP range, and denies all logins that match IP or virtual network-based firewall + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-public-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_restrict_network_access_using_virtual_network_rules\",\"responsibilityTitle\":\"Storage + accounts should restrict network access using virtual network rules\",\"responsibilityDescription\":\"Protect + your storage accounts from potential threats using virtual network rules as + a preferred method instead of IP-based filtering. Disabling IP-based filtering + prevents public IPs from accessing your storage accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-accounts-vnet-rules\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"subnets_should_be_associated_with_a_network_security_group\",\"responsibilityTitle\":\"Subnets + should be associated with a Network Security Group\",\"responsibilityDescription\":\"Protect + your subnet from potential threats by restricting access to it with a Network + Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules + that allow or deny network traffic to your subnet.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-subnets-nsg\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"web_application_firewall_waf_should_be_enabled_for_application_gateway\",\"responsibilityTitle\":\"Web + Application Firewall (WAF) should be enabled for Application Gateway\",\"responsibilityDescription\":\"Deploy + Azure Web Application Firewall (WAF) in front of public facing web applications + for additional inspection of incoming traffic. Web Application Firewall (WAF) + provides centralized protection of your web applications from common exploits + and vulnerabilities such as SQL injections, Cross-Site Scripting, local and + remote file executions. You can also restrict access to your web applications + by country/region, IP address ranges, and other http(s) parameters via custom + rules.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op9_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-waf-application-gateway\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Change + Control\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_10\",\"controlName\":\"Provide + evidence of documented change requests with impact, back-out procedures, testing, + and approvers\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Any changes introduced to production environments + are implemented through documented change requests which contain:
(i) + impact of the change
(ii) details of back-out procedures
(iii) testing + to be carried out
(iv) review and approval by authorised personnel


\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control10\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_10_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that any changes introduced to production environments + are implemented through documented change requests\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Any changes introduced to production + environments are implemented through documented change requests which contain:
(i) + Impact of the change.
(ii) Details of back-out procedures.
(iii) Testing + to be carried out.
(iv) eview and approval by authorized personnel.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-change-control-policies\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_11\",\"controlName\":\"Provide + evidence of separate environments and access controls enforcing separation + of duties and data protection\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Separate environments exist so that:

(i) development + and test/staging environments enforce separation of duties from the production + environment
(ii) separation of duties is enforced via access controls
(iii) + sensitive production data is not in use within the development or test/staging + environments\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control11\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_11_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that development and test environments enforce separation + of duties and sensitive data from the production environment\",\"responsibilityDescription\":\"Please + provide evidence:

Separate environments exist so that:
(i) Development + and test/staging environments enforce separation of duties from the production + environment.
(ii) Sensitive production data is not in use within the development + or test/staging environments.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-separation-of-environments\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_11_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that separation of duties is enforced via environment + access controls\",\"responsibilityDescription\":\"Please provide evidence + that:

Separate environments exist so that separation of duties is enforced + via access controls.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-avoid-sensitive-data\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Secure + Software Development/Deployment\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_12\",\"controlName\":\"Provide + evidence of secure software development documentation and developer training + on secure coding annually\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists and is maintained that:

(i) + supports the development of secure software and includes industry standards + and/or best practices for secure coding, such asOpen Web Application Security + Project (OWASP) Top 10 or SysAdmin, Audit, Network and Security (SANS) Top + 25 Common Weakness Enumeration (CWE)
(ii) developers undergo relevant secure + coding and secure software development training annually
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control12\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_12_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that support secure software development and deployment, + and developers undergo secure software development training annually\",\"responsibilityDescription\":\"Please + provide evidence demonstrating documentation exists and is maintained that:

(i) + Supports the development of secure software and includes industry standards + and/or best practices for secure coding, such as OWASP Top 10 or SANS Top + 25 CWE.
(ii) Developers undergo relevant secure coding and secure software + development training annually.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-software-development\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_13\",\"controlName\":\"Provide + evidence of secure code repository with code review, access controls, MFA + and reviewed production deployment\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Code repositories are secured so that:

(i) + all code changes undergo a review and approval process by a second reviewer + prior to being merged with main branch
(ii) appropriate access controls + are in place
(iii) all access is enforced through multi-factor authentication + (MFA)

B) All releases made into the production environment(s) are reviewed + and approved prior to their deployment\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control13\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"github_has_force_push_disabled\",\"responsibilityTitle\":\"GitHub + repositories should have force pushes to default branch disabled\",\"responsibilityDescription\":\"As + part of evidence for code change should undergo review process, GitHub should + have force push for default branch disabled. This auto checkpoint needs to + establish a GitHub connector created by GitHub Enterprise Cloud account.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"github_has_default_branch_protection_policy\",\"responsibilityTitle\":\"GitHub + repositories should have protection policies for default branch enabled\",\"responsibilityDescription\":\"As + part of evidence for code change should undergo review process, GitHub should + have default branch protection policy enabled. This auto checkpoint needs + to establish a GitHub connector created by GitHub Enterprise Cloud account.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"github_has_auto_mfa_enforcement\",\"responsibilityTitle\":\"MFA + is enforced by GitHub for accounts with contributions\",\"responsibilityDescription\":\"Since + end of 2023, MFA is mandatory for accounts identified as contributors to GitHub.com + according to this announcement .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op13_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op13_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-github-mfa-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_13_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that code changes and releases undergo a review, access + controls are inplace, access is enforced through MFA\",\"responsibilityDescription\":\"Please + provide evidence that code repositories are secured so that:

(i) All + code changes undergo a review and approval process by a second reviewer prior + to being merged with main branch.
(ii) Appropriate access controls are + in place.
(iii) All access is enforced through multi-factor authentication + (MFA).
(iv) All releases made into the production environment(s) are reviewed + and approved prior to their deployment.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-code-change-authorization-process\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Account + Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_14\",\"controlName\":\"Provide + evidence of disabled, removed, or changed default credentials and hardened + service accounts processes\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) default credentials are either disabled, removed, + or changed across the sampled system components

B) a process is in + place to secure (harden) service accounts and that this process has been followed\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control14\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_14_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a process is in place to secure (harden) service + accounts and that this process has been followed\",\"responsibilityDescription\":\"Provide + evidence that:

A process is in place to secure (harden) service accounts + and that this process has been followed.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-service-accounts-will-often-be-targeted\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"there_is_no_default_credential_in_azure\",\"responsibilityTitle\":\"There + is no default credential in Azure\",\"responsibilityDescription\":\"It is + mandatory on Azure to create username and set password for Azure accounts. + There is no default credential which can be used to login to Azure directly. + If ISV uses Azure's service, this policy will pass directly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op14_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op14_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-default-credential\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_15\",\"controlName\":\"Provide + evidence of user account management, password policy, and regular account + disabling/deletion process\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Unique user accounts are issued to all users

B) + User least privilege principles are being followed within the environment

C) + A strong password/ pass phrase policy or other suitable mitigations are in + place

D) A process is in place and followed at least every three months + to either disabled or deleted accounts not used within three months\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control15\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"azure_password_policy_can_fulfill_this_requirement\",\"responsibilityTitle\":\"Azure + password policy can fulfill this requirement\",\"responsibilityDescription\":\"It + is mandatory on Azure to set strong password for Azure accounts. If ISV uses + Azure's service, this policy will pass directly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.283Z\",\"recommendationIds\":[\"op15_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op15_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-password-policy-can-fulfill-this-requirement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Operational_Security_15_manual_cr\",\"responsibilityTitle\":\"Provide + evidence of user account management, privilege principles are being followed, + password policy, and regular account disabling/deletion process\",\"responsibilityDescription\":\"Provide + evidence that:

(i) Unique user accounts are issued to all users.
(ii) + User least privilege principles are being followed within the environment.
(iii) + A process is in place and followed at least every three months to either disable + or delete accounts not used within 3 months.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-provide-evidence-of-user-account-management\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_16\",\"controlName\":\"Provide + evidence of MFA configuration for all remote access and administrative interfaces\",\"controlFullName\":\"\",\"controlDescription\":\"Validate + that MFA is configured for all remote access connections and all non-console + administrative interfaces, including access to any code repositories and Cloud + management interfaces\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control16\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_16_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that remote access, non-console administrative interface, + code repo are secured with multi-factor authentication (MFA)\",\"responsibilityDescription\":\"Validate + that multi-factor authentication (MFA) is configured for all remote access + connections and all non-console administrative interfaces, including access + to any code repositories and Cloud management interfaces.

Meaning of + these terms:
(i) Remote Access \u2013 This refers to technologies used + to access the supporting environment. For example, Remote Access IPSec VPN, + SSL VPN or Jumpbox/Bastian Host.
(ii) Non-console Administrative Interfaces + \u2013 This refers to the network administrative connections to system components. + This could be over Remote Desktop, SSH or a web interface.
(iii) Code + Repositories \u2013 The code base of the app needs to be protected against + malicious modification which could introduce malware into the app. MFA needs + to be configured on the code repositories.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_on_accounts_with_owner_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with owner permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + owner permissions to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_accounts_with_write_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with read permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + write privileges to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mfa_should_be_enabled_on_accounts_with_read_permissions_on_your_subscription\",\"responsibilityTitle\":\"Accounts + with write permissions on Azure resources should be MFA enabled\",\"responsibilityDescription\":\"Multi-Factor + Authentication (MFA) should be enabled for all subscription accounts with + write privileges to prevent a breach of accounts or resources.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op16_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mfa-remote-access\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Security + Event Logging, Reviewing and Alerting\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_17\",\"controlName\":\"Provide + evidence of properly set up security event logging for user and system activity\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that security event logging is setup across the inscope environment + to log events where applicable such as:

A) User/s access to system + components and the application
B) All actions taken by a high-privileged + user
C) Invalid logical access attempts
D) Privileged account creation + / modification
E) Event log tampering
F) Disabling of security tools + (example: event logging)
G) Anti-Malware logging (example: updates, malware + detection, scan failures)
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control17\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"preview_azure_arc_enabled_kubernetes_clusters_should_have_azure_defender_extension_installed\",\"responsibilityTitle\":\"[Preview]: + Azure Arc enabled Kubernetes clusters should have Azure Defender's extension + installed\",\"responsibilityDescription\":\"Azure Defender's extension for + Azure Arc provides threat protection for your Arc enabled Kubernetes clusters. + The extension collects data from nodes in the cluster and sends it to the + Azure Defender for Kubernetes backend in the cloud for further analysis. Learn + more in https://docs.microsoft.com/azure/security-center/defender-for-kubernetes-azure-arc + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-defender-extension\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_logs_in_app_services_should_be_enabled\",\"responsibilityTitle\":\"App + Service logs in App Services should be enabled\",\"responsibilityDescription\":\"Audit + enabling of app service logs on the app. This enables you to recreate activity + trails for investigation purposes if a security incident occurs or your network + is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-app-service-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"auditing_on_sql_server_should_be_enabled\",\"responsibilityTitle\":\"Auditing + on SQL server should be enabled\",\"responsibilityDescription\":\"Auditing + on your SQL Server should be enabled to track database activities across all + databases on the server and save them in an audit log.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-auditing-on-sql-server\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_application_gateway_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Application Gateway should have Resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Application Gateway (plus WAF) and stream to a Log + Analytics workspace. Get detailed visibility into inbound web traffic and + actions taken to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-gateway-enable-resource-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_app_service_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for App Service should be enabled\",\"responsibilityDescription\":\"Azure + Defender for App Service leverages the scale of the cloud, and the visibility + that Azure has as a cloud provider, to monitor for common web app attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-app-service\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_azure_sql_database_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Azure SQL Database servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-database-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Key Vault should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Key Vault provides an additional layer of protection and security + intelligence by detecting unusual and potentially harmful attempts to access + or exploit key vault accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_resource_manager_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for Resource Manager should be enabled\",\"responsibilityDescription\":\"Azure + Defender for Resource Manager automatically monitors the resource management + operations in your organization. Azure Defender detects threats and alerts + you about suspicious activity. Learn more about the capabilities of Azure + Defender for Resource Manager at https://aka.ms/defender-for-resource-manager . Enabling + this Azure Defender plan results in charges. Learn about the pricing details + per region on Security Center's pricing page: https://aka.ms/pricing-security-center .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-resource-manager\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_servers_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for servers should be enabled\",\"responsibilityDescription\":\"Azure + Defender for servers provides real-time threat protection for server workloads + and generates hardening recommendations as well as alerts about suspicious + activities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-servers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_servers_on_machines_should_be_enabled\",\"responsibilityTitle\":\"Azure + Defender for SQL servers on machines should be enabled\",\"responsibilityDescription\":\"Azure + Defender for SQL provides functionality for surfacing and mitigating potential + database vulnerabilities, detecting anomalous activities that could indicate + threats to SQL databases, and discovering and classifying sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql-on-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_defender_for_sql_should_be_enabled_for_unprotected_sql_managed_instances\",\"responsibilityTitle\":\"Azure + Defender for SQL should be enabled for unprotected SQL Managed Instances\",\"responsibilityDescription\":\"Audit + each SQL Managed Instance without advanced data security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_front_door_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Front Door should have Resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Front Door (plus WAF) and stream to a Log Analytics + workspace. Get detailed visibility into inbound web traffic and actions taken + to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-frontdoor-should-enable-resource-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_front_door_standard_or_premium_plus_waf_should_have_resource_logs_enabled\",\"responsibilityTitle\":\"Azure + Front Door Standard or Premium (Plus WAF) should have resource logs enabled\",\"responsibilityDescription\":\"Enable + Resource logs for Azure Front Door Standard or Premium (plus WAF) and stream + to a Log Analytics workspace. Get detailed visibility into inbound web traffic + and actions taken to mitigate attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-frontdoor-stand-premium-enable-log\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"data_collection_rule_should_collect_system_logs\",\"responsibilityTitle\":\"Data + Collection Rule should collect system logs\",\"responsibilityDescription\":\"This + policy enables you check whether data collection rules collect system logs.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-collection-of-system-logs\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"linux_virtual_machines_should_have_azure_monitor_agent_installed\",\"responsibilityTitle\":\"Linux + virtual machines should have Azure Monitor Agent installed\",\"responsibilityDescription\":\"Linux + virtual machines should be monitored and secured through the deployed Azure + Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest + OS. This policy will audit virtual machines with supported OS images in supported + regions. Learn more: https://aka.ms/AMAOverview + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-monitor-agent-on-linux-virtual-machines\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"microsoft_defender_for_containers_should_be_enabled\",\"responsibilityTitle\":\"Microsoft + Defender for Containers should be enabled\",\"responsibilityDescription\":\"Microsoft + Defender for Containers provides hardening, vulnerability assessment and run-time + protections for your Azure, hybrid, and multi-cloud Kubernetes environments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-defender-for-containers\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_azure_data_lake_store_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Azure Data Lake Store should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-data-lake-store\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_azure_stream_analytics_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Azure Stream Analytics should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-azure-stream-analytics\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_batch_accounts_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Batch accounts should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-batch-accounts\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_data_lake_analytics_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Data Lake Analytics should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-data-lake-analytics\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_event_hub_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Event Hub should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-event-hub\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_iot_hub_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in IoT Hub should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-iot-hub\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_key_vault_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Key Vault should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-key-vault\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_logic_apps_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Logic Apps should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-logic-apps\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_search_services_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Search services should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-search-services\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"resource_logs_in_service_bus_should_be_enabled\",\"responsibilityTitle\":\"Resource + logs in Service Bus should be enabled\",\"responsibilityDescription\":\"Audit + enabling of resource logs. This enables you to recreate activity trails to + use for investigation purposes; when a security incident occurs or when your + network is compromised.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-resource-logs-in-service-bus\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"virtual_machines_should_be_associated_with_a_data_collection_rule\",\"responsibilityTitle\":\"Virtual + Machines should be associated with a Data Collection Rule\",\"responsibilityDescription\":\"This + policy enables you check whether virtual machines associated with a Data Collection + Rule.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-associate-virtual-machines-with-data-collection-rule\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"windows_virtual_machines_should_have_azure_monitor_agent_installed\",\"responsibilityTitle\":\"Windows + virtual machines should have Azure Monitor Agent installed\",\"responsibilityDescription\":\"Windows + virtual machines should be monitored and secured through the deployed Azure + Monitor Agent. The Azure Monitor Agent collects telemetry data from the guest + OS. Windows virtual machines with supported OS and in supported regions are + monitored for Azure Monitor Agent deployment. Learn more: https://aka.ms/AMAOverview .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op17_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-install-azure-monitor-agent-on-windows-virtual-machines\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_18\",\"controlName\":\"Provide + evidence of 30-day immediate availability and 90-day retention of security + event logs\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that a minimum of 30 days worth of security event logging data is immediately + available, with 90 days of security event logs being retained\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control18\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"log_analytics_workspace_should_be_configured_with_90_days_retention_or_longer\",\"responsibilityTitle\":\"Log + Analytics Workspace should be configured with 90 days retention or longer\",\"responsibilityDescription\":\"For + incident investigation purposes, it is recommend to configure the data retention + of Log Analytics Workspace to at least 90 days.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op18_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-configure-log-analytics-workspace-retention\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_19\",\"controlName\":\"Provide + evidence of periodic log review and investigation of identified security events/anomalies\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evdience that:

\_A) Logs are being reviewed periodically and any potential + security events/anomalies identified during the reveiw process are investiagted + and addressed\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control19\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_19_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that logs are being reviewed periodically and any + potential security events/anomalies identified are investiagted and addressed\",\"responsibilityDescription\":\"Provide + demonstratable evidence that Logs are being reviewed periodically and any + potential security events/anomalies identified during the reveiw process are + investiagted and addressed.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-log-review-and-investigation\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_20\",\"controlName\":\"Provide + evidence of configured alert rules for investigating security events including + privileged accounts, malware, and log tampering\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Alert rules are configured so that alerts are triggered + for investigation for the following \_security events where applicable:

i) + privileged account creation/ modifications
ii) privileged/High risk activities + or operations\_
iii) malware events
iv) event log tampering
v) IDPS + /WAF events (if configured)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control20\",\"controlStatus\":\"PendingApproval\",\"responsibilities\":[{\"responsibilityId\":\"activity_log_alert_should_exist_for_privileged_operations\",\"responsibilityTitle\":\"Activity + log alert should exist for high privileged operations\",\"responsibilityDescription\":\"This + policy audits specific high privileged operations with no activity log alerts + configured.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"account_operation_activity_log_alert_should_exist\",\"responsibilityTitle\":\"Activity + log alert should exist for write or delete Account operations\",\"responsibilityDescription\":\"This + policy audits write or delete Account operations with no activity log alerts + configured.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":null,\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":null,\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"alert_rule_should_set_up_for_diagnostic_logs\",\"responsibilityTitle\":\"Alert + ruleCollections must exist for Log Analytics Workspace Monitoring\",\"responsibilityDescription\":\"Customer + must set up for Log Analytics Workspace Monitoring.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"waf_should_export_logs_to_log_analytic_workspaces\",\"responsibilityTitle\":\"Diagnostic + settings should be set for WAF to export logs to Log Analytics workspace\",\"responsibilityDescription\":\"This + policy audit if the diagnostic settings for WAF to stream resource logs to + a Log Analytics workspace when any WAF which is missing this diagnostic settings + is created or updated.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"log_analytics_workspace_should_have_read_only_lock\",\"responsibilityTitle\":\"Log + Analytics workspace should have read-only lock to block all activities that + could delete data\",\"responsibilityDescription\":\"Set a lock on your Log + Analytics workspace to block all activities that could delete data: purge, + table delete, and table- or workspace-level data retention changes. To learn + more about Log Analytics workspace immutability, visit https://aka.ms/monitor/lock .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"op20_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-alert-rules-configuration\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Information + Security Risk Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_21\",\"controlName\":\"Provide + evidence that a ratified formal information security risk management policy/process + is documented and established\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that a ratified formal information security risk management policy/process + is documented and established\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control21\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_21_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a ratified formal information security risk management + policy/process is documented and established\",\"responsibilityDescription\":\"A + robust information security risk management process is important to help organizations + manage risks effectively. This will help organizations plan effective mitigations + against threats to the environment. The intent of this control is to confirm + that the organization has a formally ratified information security risk management + policy or process that is comprehensively documented. The policy should outline + how the organization identifies, assesses, and manages information security + risks. It should include roles and responsibilities, methodologies for risk + assessment, criteria for risk acceptance, and procedures for risk mitigation.

Note: + The risk assessment must focus on information-security risks, not just general + business risks.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-information-security-risk-management-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_22\",\"controlName\":\"Provide + evidence of a formal company-wide information security risk assessment is + carried out at least annually or a targeted risk analysis is documented and + performed\",\"controlFullName\":\"\",\"controlDescription\":\"
Provide + evidence that:

A) A formal company-wide information security risk assessment + is carried out at least annually.

\_OR

\_For Targeted Risk Analysis:

\_B) + A targeted risk analysis is documented and performed:

(i) at a minimum + every 12 months for every instance where a traditional control or industry + best practice is not in place\_
(ii) where a design/technological limitation + creates a risk of introducing a vulnerability into the environment/puts users + and data at risk,\_
(iii) upon suspicion or confirmation of compromise\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control22\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_22_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a formal company-wide information security risk + assessment is carried out at least annually or a targeted risk analysis is + documented and performed\",\"responsibilityDescription\":\"Please provide + evidence demonstrating that:

(A) Formal company-wide information security + risk assessment is carried out at least annually.

OR For targeted risk + analysis:

(B) A targeted risk analysis is documented and performed:
+ (i) At a minimum every 12 months for every instance where a traditional control + or industry best practice is not in place.
(ii) Where a design/technological + limitation creates a risk of introducing a vulnerability into the environment/puts + users and data at risk.
(iii) Upon suspicion or confirmation of compromise.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-formal-risk-assessment-occurs-annually\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_23\",\"controlName\":\"Provide + evidence that information security risk assessment includes relevant system + components, matrix, and risk treatment plan\",\"controlFullName\":\"\",\"controlDescription\":\"Validate + that the information security risk assessment includes:

A) System component + or resource affected
B) Threats and vulnerabilities, or equivalent
C) + Impact and likelihood matrices or equivalent
D) The creation of a risk + register / risk treatment plan\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control23\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_23_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the information security risk assessment includes + affected resources, threats and vulnerabilities, impact, and risk treatment + plan\",\"responsibilityDescription\":\"Validate that the information security + risk assessment includes:

(i) System component or resource affected.
+ (ii) Threats and vulnerabilities, or equivale.
(iii) Impact and likelihood + matrices or equivalent.
(iv) The creation of a risk register / risk treatment + plan.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-information-security-risk-assessment\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_24\",\"controlName\":\"Provide + evidence of risk management processes are in place, and ability to identify + changes and risks that could impact your system of internal controls\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) You have risk management processes in place that + assesses and manages risks associated with vendors and business partners
B) + You can identify and assess changes and risks that could impact your system + of internal controls
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control24\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_24_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that risk management processes are in place, and ability + to identify changes and risks that could impact your system of internal controls\",\"responsibilityDescription\":\"Please + provide evidence that:

(i) You (ISV) have risk management processes + in place that assesses and manages risks associated with vendors and business + partners.
(ii) You (ISV) can identify and assess changes and risks that + could impact your system of internal controls.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-risk-management-processes\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Security + Incident Response\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_25\",\"controlName\":\"Provide + evidence of a ratified incident response plan/procedure (IRP) with contact + information, communication plan, and recovery steps\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + your ratified security incident response plan/procedure (IRP) outlining how + your organization responds to incidents, showing how it is maintained, and + that it includes:\_

A) Details of the incident response team including + contact information
B) An internal communication plan during the incident + and external communication to relevant parties such as key stakeholders, payment + brands and acquirers, regulatory bodies (for example 72 hours for GDPR), supervisory + authorities, directors, customers
C) Steps for activities such as incident + classification, containment, mitigation, recovery and returning to normal + business operations depending on the type of incident\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control25\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_25_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that a ratified incident response plan/procedure (IRP) + with contact information, communication plan, and recovery steps\",\"responsibilityDescription\":\"Please + provide your ratified security incident response plan/procedure (IRP) outlining + how your organization responds to incidents, showing how it is maintained, + and that it includes:

(i) Details of the incident response team including + contact information,
(ii) An internal communication plan during the incident + and external communication to relevant parties such as key stakeholders, payment + brands and acquirers, regulatory bodies (for example 72 hours for GDPR), supervisory + authorities, directors, customers,
(iii) Steps for activities such as + incident classification, containment, mitigation, recovery and returning to + normal business operations depending on the type of incident.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-incident-response-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_26\",\"controlName\":\"Provide + evidence of all members of the incident response team have received annual + training that enables them to respond to incidents\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + \ evidence that:

A) All members of the incident response team have + received annual training which enables them to respond to incidents\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control26\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_26_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that all members of the incident response team have + received annual training that enables them to respond to incidents\",\"responsibilityDescription\":\"Please + provide evidence which shows that:

All members of the incident response + team have received annual training that enables them to respond to incidents.

Evidence + should be provided which demonstrates training has been carried out by means + of sharing the training content, and records showing who attended (which should + include all the incident response team). Alternatively, or as well as, records + showing that a tabletop exercise has been carried out. All this must have + been completed within a 12-month period from when the evidence is submitted.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-incident-response-team-annual-training\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_27\",\"controlName\":\"Provide + evidence of reviewing and updating the incident response strategy and documentation + based on the lessons learned from exercise or incident\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The incident response strategy and supporting documentation + is reviewed and updated based on either:

(i) lessons learned from a + table top exercise
(ii) lessons learned from responding to an incident
(iii) + organizational changes\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control27\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_27_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence to show the incident response strategy and supporting + documentation is reviewed and updated based on the lessons learned from exercise + or incident\",\"responsibilityDescription\":\"Please provide evidence that:

The + incident response strategy and supporting documentation is reviewed and updated + based on either:

(i) Lessons learned from a tabletop exercise
+ (ii) Lessons learned from responding to an incident
(iii) Organizational + changes\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-security-irp-updated-lessons-learned\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Business + Continuity Plan (BCP) and Disaster Recovery Plan\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Operational_Security_28\",\"controlName\":\"Provide + evidence of maintained Business Continuity plan documenting personnel, contingency + requirements, recovery procedures, and system restoration\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists, and is maintained, which outlines + the Business Continuity plan and includes:

i) details of relevant personnel + including their roles and responsibilities\_
ii) business functions with + associated contingency requirements and objectives
iii) system and data + backup procedures, configuration, and schedueling/retention
iv) recovery + priority and timeframe targets
v) a contingency plan detailing actions, + steps, and procedures to be followed to return critical information systems, + business functions and services to operation in the event of an unexpected + and unscheduled interruption
vi) an established process that covers the + eventual full system restoration and return to the original state\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control28\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_28_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that documentaion exists, and is maintained, which + outlines the business continuity plan\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Documentation exists, and is maintained, + which outlines the business continuity plan and includes:
(i) Details + of relevant personnel including their roles and responsibilities
(ii) + Business functions with associated contingency requirements and objectives
+ (iii) System and data backup procedures, configuration, and scheduling/retention
+ (iv) Recovery priority and timeframe targets
(v) A contingency plan detailing + actions, steps, and procedures to be followed to return critical information + systems, business functions and services to operation in the event of an unexpected + and unscheduled interruption
(vi) An established process that covers the + eventual full system restoration and return to the original state\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-business-continuity-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_29\",\"controlName\":\"Provide + evidence of documented Disaster Recovery plan with personnel roles, inventory, + backup procedures, and recovery plan\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) Documentation exists, and is maintained, which outlines + the Disaster Recovery plan and includes at a minimum:

(i) personnel + \ their roles, responsibilities, and escalation process
(ii) inventory + of the information systems used to support critical business functions and + services
(iii) system and data backup procedures and configuration
(iv) + a recovery plan detailing actions and procedures to be followed to restore + critical information systems and data to operation
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control29\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_29_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that documentation exists, and is maintained, which + outlines the disaster recovery plan\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Documentation exists, and is maintained, + which outlines the disaster recovery plan and includes at a minimum:
(i) + Details of relevant personnel including their roles and responsibilities
+ (ii) Business functions with associated contingency requirements and objectives
+ (iii) System and data backup procedures, configuration, and scheduling/retention
+ (iv) Recovery priority and timeframe targets
(v) A contingency plan detailing + actions, steps, and procedures to be followed to return critical information + systems, business functions and services to operation in the event of an unexpected + and unscheduled interruption
(vi) An established process that covers the + eventual full system restoration and return to the original state\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-disaster-recovery-plan\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Operational_Security_30\",\"controlName\":\"Provide + evidence of annual review, personnel training, exercise testing, and documentation + of BCP and DRP\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) The Business Continuity plan and the Disaster Recovery + Plan are being reviewed at least every 12 months to ensure that it remains + valid and effective during adverse situations, and is updated based on:

i) + annual reveiw of the plan
ii) all relevant personnel receiving training + on their roles and responsibilitties assigned in the contingency plans
iii) + the plan/s are being tested through business continuity or Disaster Recovery + exercises\_
iv) test results are documented including lessons learned from + the excercise or organizational changes\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/operational/control30\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Operational_Security_30_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the business continuity plan and the disaster + recovery plan are being reviewed and updated at least every 12 months to ensure + that it remains valid and effective\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

The business continuity plan and + the disaster recovery plan are being reviewed at least every 12 months to + ensure that it remains valid and effective during adverse situations, and + is updated based on:
(i) Annual review of the plan.
(ii) All relevant + personnel receive training on their roles and responsibilities assigned in + the contingency plans.
(iii) The plan/s are tested through business continuity + or disaster recovery exercises.
(iv) Test results are documented including + lessons learned from exercises or organizational changes.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-bcp-drp-annual-review\",\"justification\":\"\",\"evidenceFiles\":[]}]}]}]},{\"categoryName\":\"Data + Security & Privacy\",\"categoryStatus\":\"Failed\",\"controlFamilies\":[{\"controlFamilyName\":\"Data + in Transit\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_1\",\"controlName\":\"Please + provide evidence demonstrating that your TLS configuration is TLS1.2 or higher + and an inventory of trusted keys and certificates is kept and maintained\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence for all of the following which:

A) Validates that your TLS + Configuration is TLS1.2 or higher within the TLS Profile Configuration Requirements
B) + Shows that an inventory of trusted keys and certificates is kept and maintained
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control1\",\"controlStatus\":\"NotApplicable\",\"responsibilities\":[{\"responsibilityId\":\"app_service_app_slots_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"App + Service app slots should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_app_slots_should_require_ftps_only\",\"responsibilityTitle\":\"App + Service app slots should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_app_slots_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"App + Service app slots should use the latest TLS version\",\"responsibilityDescription\":\"Periodically, + newer versions are released for TLS either due to security flaws, include + additional functionality, and enhance speed. Upgrade to the latest TLS version + for App Service apps to take advantage of security fixes, if any, and/or new + functionalities of the latest version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-slots-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"App + Service apps should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_require_ftps_only\",\"responsibilityTitle\":\"App + Service apps should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_apps_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"App + Service apps should use the latest TLS version\",\"responsibilityDescription\":\"Upgrade + to the latest TLS version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-app-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"app_service_environment_should_disable_tls_1_dot_0_and_1_dot_1\",\"responsibilityTitle\":\"App + Service Environment should disable TLS 1.0 and 1.1\",\"responsibilityDescription\":\"TLS + 1.0 and 1.1 are out-of-date protocols that do not support modern cryptographic + algorithms. Disabling inbound TLS 1.0 and 1.1 traffic helps secure apps in + an App Service Environment.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-tls-1.0-and-1.1-are-out-of-date-protocols\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"aad_domain_services_managed_domains_should_use_tls_1_dot_2_only_mode\",\"responsibilityTitle\":\"Azure + Active Directory Domain Services managed domains should use TLS 1.2 only mode\",\"responsibilityDescription\":\"Use + TLS 1.2 only mode for your managed domains. By default, Azure AD Domain Services + enables the use of ciphers such as NTLM v1 and TLS v1. These ciphers may be + required for some legacy applications, but are considered weak and can be + disabled if you don't need them. When TLS 1.2 only mode is enabled, any client + making a request that is not using TLS 1.2 will fail. Learn more at https://docs.microsoft.com/azure/active-directory-domain-services/secure-your-domain + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_aad_domains\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"front_door_standard_and_premium_should_be_running_minimun_tls_version_1_dot_2\",\"responsibilityTitle\":\"Azure + Front Door Standard and Premium should be running minimum TLS version of 1.2\",\"responsibilityDescription\":\"Setting + minimal TLS version to 1.2 improves security by ensuring your custom domains + are accessed from clients using TLS 1.2 or newer. Using versions of TLS less + than 1.2 is not recommended since they are weak and do not support modern + cryptographic algorithms.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_front_door\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"sql_database_should_be_running_tls_version_1_dot_2_or_newer\",\"responsibilityTitle\":\"Azure + SQL Database should be running TLS version 1.2 or newer\",\"responsibilityDescription\":\"Setting + TLS version to 1.2 or newer improves security by ensuring your Azure SQL Database + can only be accessed from clients using TLS 1.2 or newer. Using versions of + TLS less than 1.2 is not recommended since they have well documented security + vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_sql_database\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"synapse_workspace_sql_server_should_be_running_tls_version_1_dot_2_or_newer\",\"responsibilityTitle\":\"Azure + Synapse Workspace SQL Server should be running TLS version 1.2 or newer\",\"responsibilityDescription\":\"Setting + TLS version to 1.2 or newer improves security by ensuring your Azure Synapse + workspace SQL server can only be accessed from clients using TLS 1.2 or newer. + Using versions of TLS less than 1.2 is not recommended since they have well + documented security vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_synapse_sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"container_apps_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"Container + Apps should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks. Disabling 'allowInsecure' will result + in the automatic redirection of requests from HTTP to HTTPS connections for + container apps.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-use-container-apps-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"enforce_ssl_connection_should_be_enabled_for_mysql_database_servers\",\"responsibilityTitle\":\"Enforce + SSL connection should be enabled for MySQL database servers\",\"responsibilityDescription\":\"Azure + Database for MySQL supports connecting your Azure Database for MySQL server + to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections + between your database server and your client applications helps protect against + 'man in the middle' attacks by encrypting the data stream between the server + and your application. This configuration enforces that SSL is always enabled + for accessing your database server.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enforcing-my_sql_ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"enforce_ssl_connection_should_be_enabled_for_postgresql_database_servers\",\"responsibilityTitle\":\"Enforce + SSL connection should be enabled for PostgreSQL database servers\",\"responsibilityDescription\":\"Azure + Database for PostgreSQL supports connecting your Azure Database for PostgreSQL + server to client applications using Secure Sockets Layer (SSL). Enforcing + SSL connections between your database server and your client applications + helps protect against 'man in the middle' attacks by encrypting the data stream + between the server and your application. This configuration enforces that + SSL is always enabled for accessing your database server.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enforcing-postgresql-ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ftps_only_should_be_required_in_your_function_app\",\"responsibilityTitle\":\"FTPS + only should be required in your Function App\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-app-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_should_only_be_accessible_over_https\",\"responsibilityTitle\":\"Function + App should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_only_accessible_over_https\",\"responsibilityTitle\":\"Function + app slots should only be accessible over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures server/service authentication and protects data in transit + from network layer eavesdropping attacks.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-slots-use-of-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_require_ftps_only\",\"responsibilityTitle\":\"Function + app slots should require FTPS only\",\"responsibilityDescription\":\"Enable + FTPS enforcement for enhanced security.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-app-slots-enable-ftps-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"function_app_slots_should_use_the_latest_tls_version\",\"responsibilityTitle\":\"Function + app slots should use the latest TLS version\",\"responsibilityDescription\":\"Periodically, + newer versions are released for TLS either due to security flaws, include + additional functionality, and enhance speed. Upgrade to the latest TLS version + for Function apps to take advantage of security fixes, if any, and/or new + functionalities of the latest version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-slot-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"hdinsight_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"HDInsight + should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your HSInsight cluster is public facing, then TLS latest version should be + used to secure your cluster.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure-your-hdinsight-cluster\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"iot_hub_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Iot + Hub should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your Iot Hub is public facing, then TLS latest version should be used to secure + your resource.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-if-your-iot-hub-is-public-facing-then-use-tls-latest-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"kubernetes_clusters_should_be_accessible_only_over_https\",\"responsibilityTitle\":\"Kubernetes + clusters should be accessible only over HTTPS\",\"responsibilityDescription\":\"Use + of HTTPS ensures authentication and protects data in transit from network + layer eavesdropping attacks. This capability is currently generally available + for Kubernetes Service (AKS), and in preview for AKS Engine and Azure Arc + enabled Kubernetes. For more info, visit https://aka.ms/kubepolicydoc .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-use-of-k8s-https-ensures-authentication\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"latest_tls_version_should_be_used_in_your_function_app\",\"responsibilityTitle\":\"Latest + TLS version should be used in your Function App\",\"responsibilityDescription\":\"Upgrade + to the latest TLS version.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-func-upgrade-to-the-latest-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"mariadb_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"MariaDB + should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"If + your MariaDB is public facing, then TLS latest version should be used to secure + your DB.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure-your-db-with-tls-latest-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"only_secure_connections_to_your_azure_cache_for_redis_should_be_enabled\",\"responsibilityTitle\":\"Only + secure connections to your Azure Cache for Redis should be enabled\",\"responsibilityDescription\":\"Audit + enabling of only connections via SSL to Azure Cache for Redis. Use of secure + connections ensures authentication between the server and the service and + protects data in transit from network layer attacks such as man-in-the-middle, + eavesdropping, and session-hijacking.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-audit-enabling-of-ssl-connections\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_cache_for_redis_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible cache for Redis should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"This + policy enables you to check if the Redis instance's TLS version is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-check-redis-instance-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_mysql_database_should_enable_ssl_enforcement_and_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible MySQL Database should enable SSL enforcement and should have the + minimal TLS version of 1.2\",\"responsibilityDescription\":\"This policy enables + you to check if the MySQL instance's sslEnforcement enabled and TLS version + is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-this-policy-enables-you-to-check-if-the-mysql-instance-ssl-enforcement-enabled\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"publicly_accessible_postgresql_server_should_enable_ssl_enforcement_and_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"Publicly + accessible PostgreSQL server should enable SSL enforcement and should have + the minimal TLS version of 1.2\",\"responsibilityDescription\":\"This policy + enables you to check if the PostgreSQL instance's sslEnforcement enabled and + TLS version is the latest.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-check-postgresql-instance-ssl-enforcement\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"secure_transfer_to_storage_accounts_should_be_enabled\",\"responsibilityTitle\":\"Secure + transfer to storage accounts should be enabled\",\"responsibilityDescription\":\"Audit + requirement of Secure transfer in your storage account. Secure transfer is + an option that forces your storage account to accept requests only from secure + connections (HTTPS). Use of HTTPS ensures authentication between the server + and the service and protects data in transit from network layer attacks such + as man-in-the-middle, eavesdropping, and session-hijacking.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-audit-requirement-of-secure-transfer\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"sql_managed_instance_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"SQL + Managed Instance should have the minimal TLS version of 1.2\",\"responsibilityDescription\":\"Setting + minimal TLS version to 1.2 improves security by ensuring your SQL Managed + Instance can only be accessed from clients using TLS 1.2. Using versions of + TLS less than 1.2 is not recommended since they have well documented security + vulnerabilities.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-setting-minimal-tls-version-for-sql-managed-instance\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"ssl_policy_of_application_gateway_listener_should_have_the_minimal_tls_version_of_1_dot_2\",\"responsibilityTitle\":\"SSL + Policy of Application gateway listener should have the minimal TLS version + of 1.2\",\"responsibilityDescription\":\"This policy enables you to check + if the TLS version of the listener's SSL policy is the latest, designed for + the application gateway.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-this-policy-enables-you-to-check-if-the-tls-version\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_accounts_should_have_the_specified_minimum_tls_version\",\"responsibilityTitle\":\"Storage + accounts should have the specified minimum TLS version\",\"responsibilityDescription\":\"Configure + a minimum TLS version for secure communication between the client application + and the storage account. To minimize security risk, the recommended minimum + TLS version is the latest released version, which is currently TLS 1.2.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-configure-minimum-tls-version-for-storage-accounts\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"tls_protocol_1_dot_2_must_be_used_for_arc_sql_managed_instances\",\"responsibilityTitle\":\"TLS + protocol 1.2 must be used for Arc SQL managed instances\",\"responsibilityDescription\":\"As + a part of network settings, Microsoft recommends allowing only TLS 1.2 for + TLS protocols in SQL Servers. Learn more on network settings for SQL Server + at https://aka.ms/TlsSettingsSQLServer + .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-secure_your_arc_sql\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"windows_web_servers_should_be_configured_to_use_secure_communication_protocols\",\"responsibilityTitle\":\"Windows + web servers should be configured to use secure communication protocols\",\"responsibilityDescription\":\"To + protect the privacy of information communicated over the Internet, your web + servers should use the latest version of the industry-standard cryptographic + protocol, Transport Layer Security (TLS). TLS secures communications over + a network by using security certificates to encrypt a connection between machines.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds1_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-protect-the-privacy\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_2\",\"controlName\":\"Provide + evidence demonstrating TLS compression is disabled for public web services + to avoid CRIME, and TLS HSTS is enabled for 180-days site-wide\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence for all of the following which:

A) Shows TLS compression is + diasbled for all public facing services handling web requests to prevent Compression + Ratio Info-leak Made Easy (CRIME)
B) Validates that TLS HSTS is enabled + and configured to 180-days across all sites\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control2\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"validate-that-TLS-compression-is-disabled\",\"responsibilityTitle\":\"Provide + demonstrable evidence that TLS compression is disabled across all public-facing + services that handle web requests\",\"responsibilityDescription\":\"There + is a specific TLS vulnerability, CRIME (CVE-2012-4929), which affects TLS Compression. For this + reason, industry recommendations are to turn this functionality off. ACAT + will leverage the python module sslyze(https://pypi.org/project/sslyze/) to check the TLS compression + status.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"validate-that-TLS-compression-is-disabled\",\"recommendationShortName\":\"hostname + is missing\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds2_1\",\"recommendationSolutionContent\":\"1.Go + to the ACAT portal and click your report.

2. Click 'Edit Microsoft + 365 Certification configuration' under Settings on the top menues of the report + detail page.

3. Input your public facing service's hostname and save.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-disable-tls-compression\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"validate-that-HSTS-header-is-configured-and-greater-than-180-days\",\"responsibilityTitle\":\"Validate + that TLS HSTS is enabled and configured to >= 15552000 across all sites\",\"responsibilityDescription\":\"HTTP + Strict Transport Security (HSTS) is a security mechanism designed to protect + websites against man-in-the-middle attacks by forcing TLS connections by way + of an HTTPS response header field named \\\"Strict-Transport-Security\\\". + ACAT will call the hostname which ISVs provide to check the response headers + whether enable the HSTS header correctly.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"validate-that-HSTS-header-is-configured-and-greater-than-180-days\",\"recommendationShortName\":\"hostname + is missing\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds2_1\",\"recommendationSolutionContent\":\"1.Go + to the ACAT portal and click your report.

2. Click 'Edit Microsoft + 365 Certification configuration' under Settings on the top menues of the report + detail page.

3. Input your public facing service's hostname and save.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-tls-hsts\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + At Rest\",\"controlFamilyStatus\":\"Passed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_3\",\"controlName\":\"Provide + evidence that data at rest is encrypted in line with the encryption profile + requirements, using encryption algorithms such as AES, Blowfish, TDES and + encryption key sizes of 128-bit, and 256-bit\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that data at rest is encrypted in line with the encryption profile + requirements, using encryption algorithms such as Advanced Encryption Standard + (AES), Blowfish, Triple Data Encryption Standard (TDES) and encryption key + sizes of 128-bit, and 256-bit\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control3\",\"controlStatus\":\"Passed\",\"responsibilities\":[{\"responsibilityId\":\"automation_account_variables_should_be_encrypted\",\"responsibilityTitle\":\"Automation + account variables should be encrypted\",\"responsibilityDescription\":\"It + is important to enable encryption of Automation account variable assets when + storing sensitive data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-encrypt-automation-account-variables\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_hdinsight_cluster_should_enable_double_encryption\",\"responsibilityTitle\":\"Azure + HDInsight clusters should use encryption at host to encrypt data at rest\",\"responsibilityDescription\":\"Enabling + encryption at host helps protect and safeguard your data to meet your organizational + security and compliance commitments. When you enable encryption at host, data + stored on the VM host is encrypted at rest and flows encrypted to the Storage + service.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-hdinsight-cluster-encryption-data-at-rest\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_synapse_analytics_dedicated_sql_pools_should_enable_encryption\",\"responsibilityTitle\":\"Azure + Synapse Analytics dedicated SQL pools should enable encryption\",\"responsibilityDescription\":\"Enable + transparent data encryption for Azure Synapse Analytics dedicated SQL pools + to protect data-at-rest and meet compliance requirements. Please note that + enabling transparent data encryption for the pool may impact query performance. + More details can refer to https://go.microsoft.com/fwlink/?linkid=2147714 .\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-synapse-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"disk_encryption_should_be_enabled_on_azure_data_explorer\",\"responsibilityTitle\":\"Disk + encryption should be enabled on Azure Data Explorer\",\"responsibilityDescription\":\"Enabling + disk encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-enable-disk-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"double_encryption_should_be_enabled_on_azure_data_explorer\",\"responsibilityTitle\":\"Double + encryption should be enabled on Azure Data Explorer\",\"responsibilityDescription\":\"Enabling + double encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments. When double encryption has been enabled, + data in the storage account is encrypted twice, once at the service level + and once at the infrastructure level, using two different encryption algorithms + and two different keys.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-data-explorer-double-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"eventhub_namespace_should_enable_double_encryption\",\"responsibilityTitle\":\"Event + Hub namespaces should have double encryption enabled\",\"responsibilityDescription\":\"Enabling + double encryption helps protect and safeguard your data to meet your organizational + security and compliance commitments. When double encryption has been enabled, + data in the storage account is encrypted twice, once at the service level + and once at the infrastructure level, using two different encryption algorithms + and two different keys.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-synapse-enable-custom-key-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"most_storages_in_azure_are_encrypted_by_default_with_microsoft_managed_keys_encryption\",\"responsibilityTitle\":\"Most + storages in Azure are encrypted by default with Microsoft-managed keys encryption\",\"responsibilityDescription\":\"Azure + Database for MySQL, Azure PostgreSQL, SQL Database, Azure SQL Managed Instance, + SQL Server, Azure Cosmos DB, Event Hubs, SQL managed instances, Storage account, + Azure Synapse Analytics, Azure Batch accounts, Azure Kubernetes Service (AKS), + Virtual Machines, Azure Container registries, Azure HPC Cache, etc., are encrypted + by default with Microsoft-managed keys encryption. More resource types can + refer to this doc.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Passed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":1,\"resourceList\":[{\"resourceId\":\"/subscriptions/00000000-0000-0000-0000-000000000000\",\"resourceType\":\"microsoft.resources/subscriptions\",\"resourceOrigin\":\"Azure\",\"accountId\":null,\"resourceStatus\":\"Healthy\",\"resourceStatusChangeDate\":\"2024-06-17T23:03:08.287Z\",\"recommendationIds\":[\"ds3_1\"]}],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"No + need to remediate.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-azure-encryption-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"queue_storage_should_use_customer_managed_key_for_encryption\",\"responsibilityTitle\":\"Queue + Storage should use customer-managed key for encryption\",\"responsibilityDescription\":\"Secure + your queue storage with greater flexibility using customer-managed keys. When + you specify a customer-managed key, that key is used to protect and control + access to the key that encrypts your data. Using customer-managed keys provides + additional capabilities to control rotation of the key encryption key or cryptographically + erase data.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-queue-storage-customer-key-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"require_encryption_on_data_lake_store_accounts\",\"responsibilityTitle\":\"Require + encryption on Data Lake Store accounts\",\"responsibilityDescription\":\"This + policy ensures encryption is enabled on all Data Lake Store accounts.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-datalake-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"storage_account_encryption_scopes_should_use_double_encryption_for_data_at_rest\",\"responsibilityTitle\":\"Storage + account encryption scopes should use double encryption for data at rest\",\"responsibilityDescription\":\"Enable + infrastructure encryption for encryption at rest of your storage account encryption + scopes for added security. Infrastructure encryption ensures that your data + is encrypted twice.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-storage-account-scope-double-encryption\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"transparent_data_encryption_on_sql_databases_should_be_enabled\",\"responsibilityTitle\":\"Transparent + Data Encryption on SQL databases should be enabled\",\"responsibilityDescription\":\"Transparent + data encryption should be enabled to protect data-at-rest and meet compliance + requirements.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds3_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-enable-transparency-data-encryption\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + Retention, Back-up and Disposal\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_4\",\"controlName\":\"Provide + evidence of documented, approved data retention period\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + proof that an approved data retention period is formally established and documented\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control4\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_4_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that an approved and documented data retention period + is formally established\",\"responsibilityDescription\":\"Please provide proof + that an approved data retention period is formally established and documented.

Supply + the full data retention policy which clearly details how long data (must cover + all data types) should be kept for so the business can perform its business + functions.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-establish-retention-policy\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_5\",\"controlName\":\"Provide + evidence for data retention within controlled retention period as per control + 4\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence that + data is retained only for the defined\_retention period as discussed in control + 4\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control5\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_5_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that retained data matches defined retention period\",\"responsibilityDescription\":\"Provide + screenshot evidence (or via screenshare) showing that stored data (in all + the various data locations, i.e., databases, file shares, archives, etc.) + does not exceed the defined data retention policy. Examples could be screenshots + of:

(i) Database records with a date field, searched in oldest record + order, and/or
(ii) File storage locations showing timestamps that are within + the retention period Note: Any personal/sensitive customer data should be + redacted within the screenshot.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-validate-retention-periods\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_6\",\"controlName\":\"Provide + evidence of secure data deletion processes after retention period\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that processes are in place to securely delete data after its retention + period\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control6\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_6_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that processes are in place to securely delete data + after its retention period\",\"responsibilityDescription\":\"If the deletion + process is done programmatically, then provide a screenshot of the script + that is used to perform this. If it is executed on a schedule, provide a screenshot + showing the schedule. For example, a script to delete files within a file + share may be configured as a CRON job, screenshot the CRON job showing the + schedule and the script which is executed; and provide the script showing + the command used.\",\"responsibilityType\":\"ScopedManual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-data-deletion\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure_database_retention_period_meet_retention_policy\",\"responsibilityTitle\":\"Provide + demonstrable evidence that the retention policy of your Azure resources meet + your data deletion tetention period\",\"responsibilityDescription\":\"Most + Azure databses (i.e., CosmosDB, Azure SQL Database, MySQL Database, etc.) + have default retention period for the backup data and it can also be configured. + The retention period of Azure backup data should also be considered in your + defined data retention policy. Please provide screenshot showing the backup + retention period of your Azure database services (i.e., databases, file shares, + archives, etc.)\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Medium\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"azure_database_retention_period_meet_retention_policy\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds6_1\",\"recommendationSolutionContent\":\"
ACAT + can collect your backup policies from Azure Backup Center.
To collect backup + policy from Azure Backup Center:
1. Create Recovery Service Vault or Backup + Vault in the Azure Backup Center
2. Set backup policies in the related + vaults
3. Please make sure to include the backup resources and its backup + vaults to the report resources. You can modify the report resources by clicking + 'Settings' > 'Edit resources' to update ACAT report resources.

Once + you've included your backup resources to the ACAT report, click 'Collect evidence + by ACAT' button to collect evidence. ACAT will summarize your backup policies + into a csv file. Then, you can view ACAT evidence in the 'ACAT collected evidence' + below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_7\",\"controlName\":\"Provide + evidence of automated backup system, backup testing, and access controls for + backup data\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) An automated backup system is in place and configured to perform + backups at scheduled times

B) Backup information is tested in line + with the backup scheduling procedure and restored periodically to confirm + the reliability and integrity of the data

C) Appropriate access controls + and protection mechanisms (i.e immunable backups) are implemented to ensure + backups / system snapshots are secured against unauthorized access and to + ensure the confidentiality, integrity, and availability of the backup data\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control7\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_7_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that appropriate access controls and protection mechanisms + are implemented to ensure backups are secured against unauthorized access\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

Appropriate access controls and + protection mechanisms (i.e., immutable backups) are implemented to ensure + backups/ system snapshots are secured against unauthorized access and to ensure + the confidentiality, integrity, and availability of the backup data.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-database-for-mysql-flexible-server-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + Database for MySQL Flexible Server instance should be configured to backup + automatically\",\"responsibilityDescription\":\"By default, Azure Database + for MySQL flexible server enables automated backups of your entire server + (encompassing all databases created) with a default 7-day retention period. + You can also trigger a manual backup using On-Demand backup feature.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-mysql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-database-for-postgresql-flexible-server-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + Database for PostgreSQL Flexible Server instance should be configured to backup + automatically\",\"responsibilityDescription\":\"Azure Database for PostgreSQL + flexible server automatically performs regular backups of your server. You + can then do a point-in-time recovery (PITR) within a retention period that + you specify.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-postgresql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-sql-database-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Azure + SQL Database should be configured to backup automatically\",\"responsibilityDescription\":\"Azure + SQL Database comes with a core resiliency and reliability promise that protects + it against software or hardware failures. Database backups are automated to + protect your data from corruption or accidental deletion.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sql-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"cosmos-db-should-be-configured-to-backup-automatically\",\"responsibilityTitle\":\"Cosmos + DB should be configured to backup automatically\",\"responsibilityDescription\":\"Azure + Cosmos DB automatically takes backups your data at regular intervals. The + automatic backups are taken without affecting the performance or availability + of the database operations.\",\"responsibilityType\":\"Automated\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"NotApplicable\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"default_recommendation_id\",\"recommendationShortName\":\"Default + Recommendation Name\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"There + is no applicable resource, skip this responsibility.\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-cosmosdb-backup-default\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"azure-backup-system-in-place-and-test-inline\",\"responsibilityTitle\":\"Provide + demonstrable evidence that automated backup system is in place and backup + infromation is tested in line with backup scheduling\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that:

(i) An automated backup system + is in place and configured to perform backups at scheduled times.
(ii) + Backup information is tested in line with the backup scheduling procedure + and restored periodically to confirm the reliability and integrity of the + data.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"Azure\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"azure-backup-system-in-place-and-test-inline\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds7_1\",\"recommendationSolutionContent\":\"
ACAT + can collection backup policy from Azure Backup Center(If applicable) to help + you demonstrate that an automated backup system is in place and configured + to perform backups at scheduled times.

To collect backup policy from + Azure Backup Center:
Please make sure to include the backup resources and + its backup vaults from Azure Backup Center to the report resources. You can + modify the report resources by clicking 'Settings' > 'Edit resources' to update + ACAT report resources.

Once you've included your backup resources to + the ACAT report, click 'Collect evidence by ACAT' button to collect evidence. + ACAT will summarize your backup data retention period into a csv file. Then, + you can view ACAT evidence in the 'ACAT collected evidence' below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-automated-backup-system\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Data + Access Management\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_8\",\"controlName\":\"Provide + evidence that individuals with access to data/keys are approved & configured + based on job\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) A list of users with access to data and/or encryption keys + is maintained including the business justification for each person
B) This + list of users was formally approved based on access privileges required for + their job function
C) Users are configured with the privileges outlined + in the approval\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control8\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_8_1_manual_cr\",\"responsibilityTitle\":\"Provide + a list of all individuals with access to data or encryption keys, including + the business justification\",\"responsibilityDescription\":\"Provide evidence + to demonstrate that a list of individuals with access to data and/or encryption + keys is maintained including the business justification for each individual.\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-access-list\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Data_Security_Privacy_8_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that the individuals with access to data or encryption + keys were formally approved and outlined with documentation\",\"responsibilityDescription\":\"Provide + evidence to demonstrate that a list of individuals with access to data and/or + encryption keys:

(i) Were formally approved based on access privileges + required for their job function.
(ii) Are configured with the privileges + outlined in the approval.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-secure-approval-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_9\",\"controlName\":\"Provide + evidence of maintaining third-party list and having data sharing agreements + with them\",\"controlFullName\":\"\",\"controlDescription\":\"Provide evidence + that:

A) A list of all third-parties that data is shared with is maintained.
B) + Data sharing agreements are in place with all third-parties consuming data
\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control9\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_9_manual_cr\",\"responsibilityTitle\":\"Provide + demonstratable evidence that a list of all third parties that data is shared + with is maintained and data sharing agreements are in place with all third-parties + consuming data\",\"responsibilityDescription\":\"Provide evidence that:

(i) + A list of all third parties that data is shared with is maintained.
(ii) + Data sharing agreements are in place with all third-parties consuming data.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-list-third-parties\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"Privacy\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_10\",\"controlName\":\"Provide + evidence of established PIM system with leadership commitment, roles and responsibilities + defined\",\"controlFullName\":\"\",\"controlDescription\":\"Does your organization + have a Privacy Information Management (PIM) system established, implemented + and maintained that:

A) Holds leadership commitment by way of a policy + or other form of documentation/computerised system for how your privacy information + management efforts are maintained for system confidentiality and integrity
B) + Determines roles, responsibilities and authorities of each person maintaining + the system, including PII Processors and Controllers\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control10\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_10_manual_cr\",\"responsibilityTitle\":\"Provide + evidence demonstrating that your organization have a Privacy Information Management + (PIM) system established, implemented, and maintained\",\"responsibilityDescription\":\"Please + provide evidence demonstrating that your organization have a Privacy Information + Management (PIM) system established, implemented, and maintained that:

(i) + Holds leadership commitment by way of a policy or other form of documentation/computerized + system for how your privacy information management efforts are maintained + for system confidentiality and integrity.
(ii) Determines roles, responsibilities + and authorities of each person maintaining the system, including PII Processors + and Controllers.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-sar-process\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_11\",\"controlName\":\"Provide + evidence for following PII security processes: minimize, deidentify, control + transmission & record transfer\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence of processes to show that:

i) PII minimization is taking place

ii) + PII de-identification and deletion is being done at the end of the processing + period

iii) Controls are in place for PII transmission including any + confidentiality

iv) Record of transfer of PII from one country/region + to another exists with expressed consent to do so\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control11\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_11_manual_cr\",\"responsibilityTitle\":\"Provide + evidence demonstrating that PII minimization is taking place, PII de-identification + and deletion is being done, and controls & record are in place for PII transmission\",\"responsibilityDescription\":\"Provide + evidence of processes to show that:

(i) PII minimization is taking + place.
(ii) PII de-identification and deletion is being done at the end + of the processing period.
(iii) Controls are in place for PII transmission + including any confidentiality.
(iv) Record of transfer of PII from one + country/region to another exists with expressed consent to do so.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"Low\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-privacy-notice\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"GDPR\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_12\",\"controlName\":\"Provide + evidence of SARs ability, identifying data and retention period for backups\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

(i) Data subjects are able to raise SARs
(ii) That + you (the ISV) are able to identify all locations of data subjects' data when + responding to a SARs request.
(iii)That there is a retention period for + backups which allows clients requesting removal of data via SAR's to be removed + as rolling backups over a period are removed (lifecycle of oldest back up + deletions/rewritten over)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control12\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_12_1_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that data subjects are able to raise SARs and you (the + ISV) are able to identify all locations of data subjects' data when responding + to a SARs request\",\"responsibilityDescription\":\"Provide evidence demonstrating + that:

(i) Data subjects are able to raise SARs.
(ii) Validate + that you (the ISV) are able to identify all locations of data subjects' data + when responding to a SARs request.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-sars-ability-identifying-data\",\"justification\":\"\",\"evidenceFiles\":[]},{\"responsibilityId\":\"Data_Security_Privacy_12_2_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that there is a retention period for backups which allows + clients requesting removal of data via SARs to be removed as rolling backups + over a period are removed\",\"responsibilityDescription\":\"Provide evidence + demonstrating that:

That there is a retention period for backups which + allows clients requesting removal of data via SARs to be removed as rolling + backups over a period are removed (lifecycle of oldest back up deletions/rewritten + over).\",\"responsibilityType\":\"AutoEvidence\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[{\"recommendationId\":\"Data_Security_Privacy_12_2_manual_cr\",\"recommendationShortName\":\"Evidence + not upload\",\"recommendationSolutions\":[{\"recommendationSolutionIndex\":\"ds12_1\",\"recommendationSolutionContent\":\"
ACAT + can collect your resource backup data retention period from Azure Backup Center + (If applicable).
To collect backup data retention period from Azure Backup + Center:
Please make sure to include the backup resources and its backup + vaults from Azure Backup Center to the report resources. You can modify the + report resources by clicking 'Settings' > 'Edit resources' to update ACAT + report resources.

ACAT can also collect your backup data retention + period from Azure Cosmos DB, Azure SQL Database, Azure Database for PostgreSQL, + Azure Database for MySQL (If applicable).
To collect backup data retention + period from the above Azure resources, please make sure to include the backup + resources to the report resources. You can modify the report resources by + clicking 'Settings' > 'Edit resources' to update ACAT report resources.

Once + you've included your backup resources to the ACAT report, click 'Collect evidence + by ACAT' button to collect evidence. ACAT will summarize your backup data + retention period into a csv file. Then, you can view ACAT evidence in the + 'ACAT collected evidence' below.

\",\"isRecommendSolution\":\"true\"}]}],\"guidance\":\"https://aka.ms/acat-cr-sars-ability-identifying-data\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_13\",\"controlName\":\"Provide + evidence of a privacy notice with essential information, including entities, + data types, and data subject rights\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + the privacy notice which should contain all the required elements as follows:

A) + Attributes details (Name, Address, and other personal identifiable information)
B) + Details of the type of personal data being processed
C) Details how long + personal data will be kept for.
D) Details of the lawfulness of processing + personal data.
E) Details of:
- Data subject's rights
- + Right to be informed
- Right of access by the data subject
- Right + to erasure
- Right to restriction of processing
- Right to data + portability
- Right to object
- Rights in relation to automated + decision-making including profiling\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control13\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_13_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that a privacy notice with essential information, including + details of personal data types, and data subject rights are provided\",\"responsibilityDescription\":\"Please + provide the privacy notice which should contain all the required elements + as follows:

(i) Entities details (Name, Address, etc.)
(ii) Details + of the type of personal data being processed.
(iii) Details how long personal + data will be kept for.
(iv) Details of the lawfulness of processing personal + data.
(v) Details of data subject's rights:
- Right to be informed
+ \ - Right of access by the data subject
- Right to erasure
- + Right to restriction of processing
- Right to data portability
- + Right to object
- Rights in relation to automated decision-making, including + profiling\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-privacy-notice-essential-information\",\"justification\":\"\",\"evidenceFiles\":[]}]}]},{\"controlFamilyName\":\"HIPAA\",\"controlFamilyStatus\":\"Failed\",\"controls\":[{\"controlId\":\"Data_Security_Privacy_14\",\"controlName\":\"Provide + evidence of HIPAA policy existence, ePHI confidentiality, integrity, availability + assurance, and security protection\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that:

A) A policy exists for HIPAA and HIPAA handling within + your organization for staff, contractors, vendors, etc.
B) Your organization + ensures confidentiality, integrity, and availability of ePHI that it creates, + receives, maintains, or transmits
C) Your organization ensures protection + against any reasonably anticipated threats and hazards to the security or + integrity
of ePHI\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control14\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_14_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that HIPAA policy existence, ePHI confidentiality, integrity, + availability assurance, and security protection are provided\",\"responsibilityDescription\":\"Please + provide demonstratable evidence that:

(i) A policy exists for HIPAA + and HIPAA handling within your organization for staff, contractors etc.
(ii) + ISV is ensuring the confidentiality, integrity, and availability of ePHI that + it creates, receives, maintains, or transmits.
(iii) Protect against any + reasonably anticipated threats and hazards to the security or integrity of + ePHI.\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-hipaa-policy-existence\",\"justification\":\"\",\"evidenceFiles\":[]}]},{\"controlId\":\"Data_Security_Privacy_15\",\"controlName\":\"Provide + evidence that you protect private information, ensure staff follows security + rules, and backup data\",\"controlFullName\":\"\",\"controlDescription\":\"Provide + evidence that you:

A) Provide protection against reasonably anticipated + uses or disclosures of such information that are not permitted by the privacy + rule
B) Ensure compliance with the security rule by its workforce
C) + Provide Data backup and Disaster recovery plan under 164.308 (a)(7)(ii)(A) + and 164.308 (a)(7)(ii)(B)\",\"controlDescriptionHyperLink\":\"https://aka.ms/acat/m365cert2/data/control15\",\"controlStatus\":\"Failed\",\"responsibilities\":[{\"responsibilityId\":\"Data_Security_Privacy_15_manual_cr\",\"responsibilityTitle\":\"Provide + demonstrable evidence that you protect private information, ensure staff follows + security rules, and data backup and disaster recovery plan are in place\",\"responsibilityDescription\":\"Please + provide evidence that you (ISV):

(i) Protects against reasonably anticipated + uses or disclosures of such information that are not permitted by the Privacy + Rule; and
(ii) Ensure compliance with the Security Rule by its workforce.
(iii) + Data backup and Disaster recovery plan under 164..308 (a)(7)(ii)(A) and 164.308 + (a)(7)(ii)(B).\",\"responsibilityType\":\"Manual\",\"responsibilitySeverity\":\"High\",\"responsibilityStatus\":\"Failed\",\"responsibilityEnvironment\":\"General\",\"failedResourceCount\":0,\"totalResourceCount\":0,\"resourceList\":[],\"recommendationList\":[],\"guidance\":\"https://aka.ms/acat-cr-protect-private-information\",\"justification\":\"\",\"evidenceFiles\":[]}]}]}]}]}]}}],\"nextLink\":\"https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240617200351/snapshots?%24skipToken=1&%24top=1&api-version=2024-06-27\"}" + headers: + cache-control: + - no-store, no-cache + content-length: + - '240069' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:27:36 GMT + mise-correlation-id: + - e4e231c3-570b-42c6-8257-a80204181386 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T062735Z-r15f4699bb72nqhjn157r3ds4s00000005e0000000009s32 + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - d9da18cea082c10ec28a8dfe595ed0c1 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 8AFFFF8A75024CE5A002A8CFF784033B Ref B: TYO201100115029 Ref C: 2024-06-18T06:27:35Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +version: 1 diff --git a/src/acat/azext_acat/tests/latest/recordings/test_get_control_assessments_no_snapshot.yaml b/src/acat/azext_acat/tests/latest/recordings/test_get_control_assessments_no_snapshot.yaml new file mode 100644 index 00000000000..f251ee9936f --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_get_control_assessments_no_snapshot.yaml @@ -0,0 +1,647 @@ +interactions: +- request: + body: '{"subscriptionIds": ["f744fbde-a95f-437e-8fcf-38f9324e3d9c"]}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Content-Length: + - '61' + Content-Type: + - application/json + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: POST + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/onboard?api-version=2024-06-27 + response: + body: + string: '{"subscriptionIds":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"]}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/aabbb7bb-7009-4493-bc17-2ff9d2bd64bd*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542874815585979&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=DRTawE-pcncmFhINiHrgff1_dwdKX1IC550dlMfcaMsoR33rblaWwqEBv_-xQa1qMtICETRQj3j2qDZPfCKPeVxA-mL3fMR5jNJM0k8-nqQBXiuH43gSnDPjp7gtNFDLtKrnyUt_Vs27Sv7eXP24Ck2mO0Duk6jSFYrDtqklLbjWe-CKeLkBb0jwmo9L85ShHsN7CsvbS5tXv6Lnr8Mp4nkkLCiTqgfYEKD99qFXMqhzULhypDQ7WM036CRLBEryP2ysfOmSaW97kV50jjAVnZArYKdPvzHWU-TzuafWHdakaahyOlackDZLEqkrho1rRuUBvvcSrXKvBl1pUZLusQ&h=4iiSznSVbmPp3xsCr5QHRIvDSDniJoeGhoO0QANiF-A + cache-control: + - no-store, no-cache + content-length: + - '60' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:04:41 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/aabbb7bb-7009-4493-bc17-2ff9d2bd64bd*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542874815585979&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=DRTawE-pcncmFhINiHrgff1_dwdKX1IC550dlMfcaMsoR33rblaWwqEBv_-xQa1qMtICETRQj3j2qDZPfCKPeVxA-mL3fMR5jNJM0k8-nqQBXiuH43gSnDPjp7gtNFDLtKrnyUt_Vs27Sv7eXP24Ck2mO0Duk6jSFYrDtqklLbjWe-CKeLkBb0jwmo9L85ShHsN7CsvbS5tXv6Lnr8Mp4nkkLCiTqgfYEKD99qFXMqhzULhypDQ7WM036CRLBEryP2ysfOmSaW97kV50jjAVnZArYKdPvzHWU-TzuafWHdakaahyOlackDZLEqkrho1rRuUBvvcSrXKvBl1pUZLusQ&h=4iiSznSVbmPp3xsCr5QHRIvDSDniJoeGhoO0QANiF-A + mise-correlation-id: + - 4e400e4a-2e07-4db3-b3f9-0e8d16b1b6e9 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T060440Z-r15f4699bb7g5btzecbvvg9d4000000006ag00000000bwxa + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 2d4a3ebcdc8f8564e7ed0210c3ed5027 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1197' + x-msedge-ref: + - 'Ref A: 737F79DAE8EE44DEBDFB9F476EEDF12A Ref B: TYO201100115053 Ref C: 2024-06-18T06:04:40Z' + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/aabbb7bb-7009-4493-bc17-2ff9d2bd64bd*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542874815585979&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=DRTawE-pcncmFhINiHrgff1_dwdKX1IC550dlMfcaMsoR33rblaWwqEBv_-xQa1qMtICETRQj3j2qDZPfCKPeVxA-mL3fMR5jNJM0k8-nqQBXiuH43gSnDPjp7gtNFDLtKrnyUt_Vs27Sv7eXP24Ck2mO0Duk6jSFYrDtqklLbjWe-CKeLkBb0jwmo9L85ShHsN7CsvbS5tXv6Lnr8Mp4nkkLCiTqgfYEKD99qFXMqhzULhypDQ7WM036CRLBEryP2ysfOmSaW97kV50jjAVnZArYKdPvzHWU-TzuafWHdakaahyOlackDZLEqkrho1rRuUBvvcSrXKvBl1pUZLusQ&h=4iiSznSVbmPp3xsCr5QHRIvDSDniJoeGhoO0QANiF-A + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/aabbb7bb-7009-4493-bc17-2ff9d2bd64bd*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"aabbb7bb-7009-4493-bc17-2ff9d2bd64bd*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Accepted","startTime":"2024-06-18T06:04:40.3066308Z"}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/aabbb7bb-7009-4493-bc17-2ff9d2bd64bd*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542874819023652&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=PqqYk1H4D7ZDgrW8qQ8_rh5axhKovc_pcPT1ULDBpqWxSgdE1kflyWOaZ8AbcOJzwqbyrc3e3hBha1EC_2dZXRJq9yjwc7J3jccD9T_tL3k59H2hRzW8tRDP4JDrzW3a-ZjotbA_dl6oBLCX3ZMbEuFO5w1rWLOWK6ghjQYOO0ZfDrM-JzpfpI7t5nLUf6mrvtBeYQvNOgVaIpaASc9QceTspuzeLA8Gw28zujlmzkdAeBPbcofeycwRmqEFsSN_FsGW69yuOksodtj10hITZa_es0DWyyWYmR9co5QgB3jgFEf05XOh7vbxmwlgdDESmx0nZ8WYoIu6espfHhsfIQ&h=CCqeuQh7gt09fWlTva_pXoW9VbwNz5SG2hKag4MCsmE + cache-control: + - no-cache + content-length: + - '392' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:04:41 GMT + etag: + - '"0800ecd5-0000-4d00-0000-667123780000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/aabbb7bb-7009-4493-bc17-2ff9d2bd64bd*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542874819179885&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=CpW27IQ5p79gH8qhoYuWBVK4IKDZz5g_7xaeXAPUuYdnQpWTHEwkrwDiW2Fyn_V2Tq_2rdIkcSKcTzfytertMvc67vCHr-bLhhyE89gjg5dwtqzALj7M73ILg78sCIZcSbUEqKxvj4FvC3UMnPyeqSAgQbNrF_rnSxUc2ohbyNbUXLdq4vq1tvQB571UvRflYpN1wTQ2-MX1VS4WuYAhoIGzREXlOQabk4ui-NXN_NDwlYUxiHdphHrkxDvnxm9nrQGzbPO_qV3fU0VALYgVA80V1IWGQd2nRY06jPKp5iVGCOO5QBBW4EPgDyzMaHF_mhyaGFDFQXHq0Jjh384UTw&h=AIydJsYDLCHB0HOyq97qerSwg4rn3QMkcHauSQ0IyN0 + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 9AC33D3FFF294A84A3B451D533947F64 Ref B: TYO201100115053 Ref C: 2024-06-18T06:04:41Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/aabbb7bb-7009-4493-bc17-2ff9d2bd64bd*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542874815585979&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9DTzFQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA1LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQ08xUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNS5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0NPMVBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3J0MB0GA1UdDgQWBBShTe46dn7V-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=DRTawE-pcncmFhINiHrgff1_dwdKX1IC550dlMfcaMsoR33rblaWwqEBv_-xQa1qMtICETRQj3j2qDZPfCKPeVxA-mL3fMR5jNJM0k8-nqQBXiuH43gSnDPjp7gtNFDLtKrnyUt_Vs27Sv7eXP24Ck2mO0Duk6jSFYrDtqklLbjWe-CKeLkBb0jwmo9L85ShHsN7CsvbS5tXv6Lnr8Mp4nkkLCiTqgfYEKD99qFXMqhzULhypDQ7WM036CRLBEryP2ysfOmSaW97kV50jjAVnZArYKdPvzHWU-TzuafWHdakaahyOlackDZLEqkrho1rRuUBvvcSrXKvBl1pUZLusQ&h=4iiSznSVbmPp3xsCr5QHRIvDSDniJoeGhoO0QANiF-A + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/aabbb7bb-7009-4493-bc17-2ff9d2bd64bd*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"aabbb7bb-7009-4493-bc17-2ff9d2bd64bd*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Succeeded","startTime":"2024-06-18T06:04:40.3066308Z","endTime":"2024-06-18T06:04:42.2947642Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '463' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:05:12 GMT + etag: + - '"0800f0d5-0000-4d00-0000-6671237a0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: A362EC5E0CA64A38AF80950466DE1D5C Ref B: TYO201100115053 Ref C: 2024-06-18T06:05:11Z' + status: + code: 200 + message: OK +- request: + body: '{"properties": {"resources": [{"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08"}], + "timeZone": "UTC", "triggerTime": "2021-09-01T00:00:00.000Z"}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Content-Length: + - '273' + Content-Type: + - application/json + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: PUT + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_no_snapshot?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_no_snapshot","name":"CLI_test_report_no_snapshot","type":"microsoft.appcomplianceautomation/reports","systemData":{"createdBy":"huiquanjiang@microsoft.com","createdByType":"User","createdAt":"2024-06-18T06:05:13.2325517Z","lastModifiedBy":"huiquanjiang@microsoft.com","lastModifiedByType":"User","lastModifiedAt":"2024-06-18T06:05:13.2325517Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-19T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Accepted"}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/6f8aeb53-b8c3-43ec-96bc-14f90c3413bb*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954?api-version=2024-06-27&t=638542875144825817&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=QDyg8q9O3JbJfIZddfCzj9qLL1ZFnqlS1e9MsQC3XSehkqLXwt09FYHXjsxkMVg_fWaEik-TZ9_eBEcVaZzeIigwo6e2SEjukRmqFIyN2YXJZ6Bt1A-c8f-bMF0YFLPcfLueVklcm4uffw1tSUSw1tFuEG837VF8rZttPn9HY00geKd9KpE_oS-rh3qc7q_X4AElwd5kZgC4wsXVzFUUA2yIeuF-X1HZOreG6LdqpTl1n4oMjZWtDHCpCbsYkCDc9KzRf4vJevzxPDubIpZF4C7bhvTpSax15YUY0cL_5p_LCKAmdFdZL8imSxcnetE43QUSXFJloFRjVLCICOQLjQ&h=IxwKEz5nVEk68JNleedl-yWVnUqssqZe7oPJfQ8vBJ4 + cache-control: + - no-store, no-cache + content-length: + - '1092' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:05:14 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/6f8aeb53-b8c3-43ec-96bc-14f90c3413bb*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954?api-version=2024-06-27&t=638542875144825817&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=QDyg8q9O3JbJfIZddfCzj9qLL1ZFnqlS1e9MsQC3XSehkqLXwt09FYHXjsxkMVg_fWaEik-TZ9_eBEcVaZzeIigwo6e2SEjukRmqFIyN2YXJZ6Bt1A-c8f-bMF0YFLPcfLueVklcm4uffw1tSUSw1tFuEG837VF8rZttPn9HY00geKd9KpE_oS-rh3qc7q_X4AElwd5kZgC4wsXVzFUUA2yIeuF-X1HZOreG6LdqpTl1n4oMjZWtDHCpCbsYkCDc9KzRf4vJevzxPDubIpZF4C7bhvTpSax15YUY0cL_5p_LCKAmdFdZL8imSxcnetE43QUSXFJloFRjVLCICOQLjQ&h=IxwKEz5nVEk68JNleedl-yWVnUqssqZe7oPJfQ8vBJ4 + mise-correlation-id: + - bed0e6ff-9736-427d-8d27-4f3d975b56c8 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T060513Z-168779fcbd6dl2pz86e0qrh0ns000000068g000000014rmy + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 56cbb2b1861a986c50e8143778fad628 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: 28AAF2F46B694B4AB66482B027191201 Ref B: TYO201151002025 Ref C: 2024-06-18T06:05:13Z' + x-powered-by: + - ASP.NET + status: + code: 201 + message: Created +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/6f8aeb53-b8c3-43ec-96bc-14f90c3413bb*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954?api-version=2024-06-27&t=638542875144825817&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=QDyg8q9O3JbJfIZddfCzj9qLL1ZFnqlS1e9MsQC3XSehkqLXwt09FYHXjsxkMVg_fWaEik-TZ9_eBEcVaZzeIigwo6e2SEjukRmqFIyN2YXJZ6Bt1A-c8f-bMF0YFLPcfLueVklcm4uffw1tSUSw1tFuEG837VF8rZttPn9HY00geKd9KpE_oS-rh3qc7q_X4AElwd5kZgC4wsXVzFUUA2yIeuF-X1HZOreG6LdqpTl1n4oMjZWtDHCpCbsYkCDc9KzRf4vJevzxPDubIpZF4C7bhvTpSax15YUY0cL_5p_LCKAmdFdZL8imSxcnetE43QUSXFJloFRjVLCICOQLjQ&h=IxwKEz5nVEk68JNleedl-yWVnUqssqZe7oPJfQ8vBJ4 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/6f8aeb53-b8c3-43ec-96bc-14f90c3413bb*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954","name":"6f8aeb53-b8c3-43ec-96bc-14f90c3413bb*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_no_snapshot","status":"Accepted","startTime":"2024-06-18T06:05:13.3540227Z"}' + headers: + cache-control: + - no-cache + content-length: + - '461' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:05:14 GMT + etag: + - '"08000ad6-0000-4d00-0000-667123990000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 0CD2051713A540499EF4B8B80CFAFD7A Ref B: TYO201151002025 Ref C: 2024-06-18T06:05:14Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/6f8aeb53-b8c3-43ec-96bc-14f90c3413bb*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954?api-version=2024-06-27&t=638542875144825817&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=QDyg8q9O3JbJfIZddfCzj9qLL1ZFnqlS1e9MsQC3XSehkqLXwt09FYHXjsxkMVg_fWaEik-TZ9_eBEcVaZzeIigwo6e2SEjukRmqFIyN2YXJZ6Bt1A-c8f-bMF0YFLPcfLueVklcm4uffw1tSUSw1tFuEG837VF8rZttPn9HY00geKd9KpE_oS-rh3qc7q_X4AElwd5kZgC4wsXVzFUUA2yIeuF-X1HZOreG6LdqpTl1n4oMjZWtDHCpCbsYkCDc9KzRf4vJevzxPDubIpZF4C7bhvTpSax15YUY0cL_5p_LCKAmdFdZL8imSxcnetE43QUSXFJloFRjVLCICOQLjQ&h=IxwKEz5nVEk68JNleedl-yWVnUqssqZe7oPJfQ8vBJ4 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/6f8aeb53-b8c3-43ec-96bc-14f90c3413bb*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954","name":"6f8aeb53-b8c3-43ec-96bc-14f90c3413bb*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_no_snapshot","status":"Succeeded","startTime":"2024-06-18T06:05:13.3540227Z","endTime":"2024-06-18T06:05:15.1640936Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '532' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:05:44 GMT + etag: + - '"08000cd6-0000-4d00-0000-6671239b0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: F079173966E74FDC8FDD623C2BE714BE Ref B: TYO201151002025 Ref C: 2024-06-18T06:05:44Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_no_snapshot?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_no_snapshot","name":"CLI_test_report_no_snapshot","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-18T05:43:36.9116489Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-18T05:43:36.9116489Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-19T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1041' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:05:45 GMT + mise-correlation-id: + - ad42735e-218e-4816-8a1e-204a1f7af13d + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T060545Z-168779fcbd6bmff59zma1wnp9w00000003m000000000ba4x + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - e153147f83ed91aa085936f49833d0b9 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 4A7FE9308C1341CA9A815612B1914B70 Ref B: TYO201151002025 Ref C: 2024-06-18T06:05:44Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report get-control-assessments + Connection: + - keep-alive + ParameterSetName: + - --report-name + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_no_snapshot/snapshots?$skipToken=0&$top=1&api-version=2024-06-27 + response: + body: + string: '{"value":[]}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '12' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:05:46 GMT + mise-correlation-id: + - febd1bfc-b833-4790-82e3-6f252c2d2e62 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240618T060546Z-168779fcbd6bmff59zma1wnp9w00000003m000000000ba8g + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 648f75041b1cc502f7ac465a2976cddf + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: A820686A28D6496396AC52067F07DABC Ref B: TYO201100116049 Ref C: 2024-06-18T06:05:46Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Content-Length: + - '0' + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: DELETE + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_no_snapshot?api-version=2024-06-27 + response: + body: + string: 'null' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/5b8d4acd-e602-4ac5-9d31-b9a1efe6cc59*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954?api-version=2024-06-27&t=638542875478627050&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=K9cvBHHKa1_UgIXU4npyLBSpiaaczy15Elqa6zzHr2ME8Dcoi8lbGGxVmOLvvqREzcxZouoalz6ZRBa8QC1Y7-XaVuAAxLC-fn659snu4dJOQBviEDwfY02YGesk62VCNRchTIMG2CPIr2F0hIhYJYnx8d3CsYrKvJBT8hcm9IXk89QJmUseudGJLiSyiftFKBU_PceRs7GSHaWUyrimWrS2rfbMwGnCGZSbavgIScU0NgeTgJCq4-yFjQE_SZwCIj31tE-oTqVjAV4SH5-UJk1OcwutkKxzCIkszez_A_uOopF_IG-oRs165azLYT8jpqg6-vp6rLHJNeQ2SzqMXA&h=XC7anhCCwWhHxa6xavuA12LVRXHcLs3h8yGMQBUq4O0 + cache-control: + - no-store, no-cache + content-length: + - '4' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:05:47 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/5b8d4acd-e602-4ac5-9d31-b9a1efe6cc59*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954?api-version=2024-06-27&t=638542875478627050&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=K9cvBHHKa1_UgIXU4npyLBSpiaaczy15Elqa6zzHr2ME8Dcoi8lbGGxVmOLvvqREzcxZouoalz6ZRBa8QC1Y7-XaVuAAxLC-fn659snu4dJOQBviEDwfY02YGesk62VCNRchTIMG2CPIr2F0hIhYJYnx8d3CsYrKvJBT8hcm9IXk89QJmUseudGJLiSyiftFKBU_PceRs7GSHaWUyrimWrS2rfbMwGnCGZSbavgIScU0NgeTgJCq4-yFjQE_SZwCIj31tE-oTqVjAV4SH5-UJk1OcwutkKxzCIkszez_A_uOopF_IG-oRs165azLYT8jpqg6-vp6rLHJNeQ2SzqMXA&h=XC7anhCCwWhHxa6xavuA12LVRXHcLs3h8yGMQBUq4O0 + mise-correlation-id: + - 7ab58540-9f89-4c98-ac77-d5e8a74ed1fd + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + x-azure-ref: + - 20240618T060547Z-168779fcbd6bmff59zma1wnp9w00000003m000000000baca + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 2bf76ed99787ce3d16d29617debb6373 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-deletes: + - '14999' + x-msedge-ref: + - 'Ref A: 6A8EB1494D4845F0871420D6C926D46C Ref B: TYO201100115009 Ref C: 2024-06-18T06:05:47Z' + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/5b8d4acd-e602-4ac5-9d31-b9a1efe6cc59*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954?api-version=2024-06-27&t=638542875478627050&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=K9cvBHHKa1_UgIXU4npyLBSpiaaczy15Elqa6zzHr2ME8Dcoi8lbGGxVmOLvvqREzcxZouoalz6ZRBa8QC1Y7-XaVuAAxLC-fn659snu4dJOQBviEDwfY02YGesk62VCNRchTIMG2CPIr2F0hIhYJYnx8d3CsYrKvJBT8hcm9IXk89QJmUseudGJLiSyiftFKBU_PceRs7GSHaWUyrimWrS2rfbMwGnCGZSbavgIScU0NgeTgJCq4-yFjQE_SZwCIj31tE-oTqVjAV4SH5-UJk1OcwutkKxzCIkszez_A_uOopF_IG-oRs165azLYT8jpqg6-vp6rLHJNeQ2SzqMXA&h=XC7anhCCwWhHxa6xavuA12LVRXHcLs3h8yGMQBUq4O0 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/5b8d4acd-e602-4ac5-9d31-b9a1efe6cc59*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954","name":"5b8d4acd-e602-4ac5-9d31-b9a1efe6cc59*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_no_snapshot","status":"Deleting","startTime":"2024-06-18T06:05:47.3241585Z"}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/5b8d4acd-e602-4ac5-9d31-b9a1efe6cc59*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954?api-version=2024-06-27&t=638542875481409923&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=EIYCqdBeDcFdOH832L_rfhZpWsdCvBTLEyoUYoobibkfYiNaHFcIbhTc25Ak9N7Nk3qS9yvlmn5DzMG2NQiTAboCH1wn2vtgNflD2UKoa3PQHWxemIQX6oOYdyZzZlO-6MW7BWbDtga5pbDfUlGnoiX8UvN0YYpYE6mV2IraaZlVrd15kulCVpjcnn-1eEU6txNoPTveDXHuHa0Jf2wNc7IewHTgbpCuhie8BsqASlVXrqrkRm8btImPsIZ75Xe5X7iMZjFvHtnWtsrcCNa2U3kZ3l7wAbgciAhNoIB-hE5923lMi7dieqRsUlllUHsvqMVHXyUkqeHbqVTS2JIPWw&h=TrTkVJ0iMxLplSWHCxW9BHzgVXNXpCJ9VsQLaoaVoWw + cache-control: + - no-cache + content-length: + - '461' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:05:47 GMT + etag: + - '"080030d6-0000-4d00-0000-667123bb0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/5b8d4acd-e602-4ac5-9d31-b9a1efe6cc59*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954?api-version=2024-06-27&t=638542875481409923&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=EIYCqdBeDcFdOH832L_rfhZpWsdCvBTLEyoUYoobibkfYiNaHFcIbhTc25Ak9N7Nk3qS9yvlmn5DzMG2NQiTAboCH1wn2vtgNflD2UKoa3PQHWxemIQX6oOYdyZzZlO-6MW7BWbDtga5pbDfUlGnoiX8UvN0YYpYE6mV2IraaZlVrd15kulCVpjcnn-1eEU6txNoPTveDXHuHa0Jf2wNc7IewHTgbpCuhie8BsqASlVXrqrkRm8btImPsIZ75Xe5X7iMZjFvHtnWtsrcCNa2U3kZ3l7wAbgciAhNoIB-hE5923lMi7dieqRsUlllUHsvqMVHXyUkqeHbqVTS2JIPWw&h=TrTkVJ0iMxLplSWHCxW9BHzgVXNXpCJ9VsQLaoaVoWw + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 05C920D244D0469CBEED2AB4DB1720B7 Ref B: TYO201100115009 Ref C: 2024-06-18T06:05:47Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/5b8d4acd-e602-4ac5-9d31-b9a1efe6cc59*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954?api-version=2024-06-27&t=638542875478627050&c=MIIHhzCCBm-gAwIBAgITfATx9zsPw1I9YGkl0gAABPH3OzANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDUwHhcNMjQwNTMwMTczNjA1WhcNMjUwNTI1MTczNjA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANxGONFw--IVcl5OtWGai8lHroJZhoaunVc_C9ZYorjD8hqvtcsW0ZpbxNhcCW8_1nvPkcc1PhMhJS1jFUjmrft-_eXLMexGTluaAu9AtfN1jx2AIEYg5nhsE_X2wx1REm1Qrhv052_6TUHRXOS-FIpEPxnwfwbQOzGvHdJFoaHuyM-ebkGnP_wKWRGBFwcTzJOGC_VRvfozQT-XjN0nFXPpEhccYtIWaOj-dbh2j8RQaDROjmBa6vj_CwnXJ0M20JQOK5oTR6up6bv2acP0l63DrfJSNyCbsfD7iuuF7tuI4YtCuWijFHoqF3HQ3bkL1j3SwaX89uPOCHkloV9tXrECAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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-bl6jWWD4XBEpDijSzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDUuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBR61hmFKHlscXYeYPjzS--iBUIWHTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAJDuWt5qdH1owAjgNECXm_nAymDaa63x9bMOySgC6oSiKCv5GxLMOwkXwvJ0Sw-yOjsWhzKxMyIiwDWn8PiCAILE1odr4YI4k3PaM_U8he0jz-gQsdhP_6oAT5ahB55mjBAt5nNFrnKYP0_SVgnAFDo1PcMno76eInO4l1itiZGknPinozmNt-_Dg0KqXeWXwcOJK8YsLBUIGlWiXlSDTXPFm8VBUhsUQNJlg8Q-1SkNDhi6x2AIDIDYcfLgVW-8DkpiAw5CGNrUQJzxhP54SWta8uSE_t6AR3871MdiRIH6UPtOUIli78k4ddwVfX1FhjdA0sre6uZdHMIYl2q9r5M&s=K9cvBHHKa1_UgIXU4npyLBSpiaaczy15Elqa6zzHr2ME8Dcoi8lbGGxVmOLvvqREzcxZouoalz6ZRBa8QC1Y7-XaVuAAxLC-fn659snu4dJOQBviEDwfY02YGesk62VCNRchTIMG2CPIr2F0hIhYJYnx8d3CsYrKvJBT8hcm9IXk89QJmUseudGJLiSyiftFKBU_PceRs7GSHaWUyrimWrS2rfbMwGnCGZSbavgIScU0NgeTgJCq4-yFjQE_SZwCIj31tE-oTqVjAV4SH5-UJk1OcwutkKxzCIkszez_A_uOopF_IG-oRs165azLYT8jpqg6-vp6rLHJNeQ2SzqMXA&h=XC7anhCCwWhHxa6xavuA12LVRXHcLs3h8yGMQBUq4O0 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/5b8d4acd-e602-4ac5-9d31-b9a1efe6cc59*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954","name":"5b8d4acd-e602-4ac5-9d31-b9a1efe6cc59*495842A3FE4812800034F1E7315A111140478275B77E713BF94DC3AA3F88B954","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_no_snapshot","status":"Succeeded","startTime":"2024-06-18T06:05:47.3241585Z","endTime":"2024-06-18T06:05:48.9816036Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '532' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:06:17 GMT + etag: + - '"080032d6-0000-4d00-0000-667123bc0000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 4A3A4BB3F46940CF807E269ABE658B3E Ref B: TYO201100115009 Ref C: 2024-06-18T06:06:18Z' + status: + code: 200 + message: OK +version: 1 diff --git a/src/acat/azext_acat/tests/latest/recordings/test_list_report.yaml b/src/acat/azext_acat/tests/latest/recordings/test_list_report.yaml new file mode 100644 index 00000000000..9cf6f125742 --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_list_report.yaml @@ -0,0 +1,69 @@ +interactions: +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report list + Connection: + - keep-alive + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports?api-version=2024-06-27 + response: + body: + string: '{"value":[{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update","name":"CLI_test_report_update","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-14T04:47:28.3982219Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-14T04:49:06.5477146Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"b8a0a0a0-0000-0000-0000-000000000000","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-15T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.AppComplianceAutomation/reports/huiquan-CLI-test","name":"huiquan-CLI-test","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-14T04:15:15.8930588Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-14T04:15:15.8930588Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"0b1f6471-1bf0-4dda-aec3-cb9272f09590","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-15T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mcatsandbox/providers/Microsoft.insights/components/mcatsandboxai","resourceType":"microsoft.insights/components","resourceOrigin":null,"accountId":null},{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mcatsandbox/providers/Microsoft.DocumentDB/databaseAccounts/mcatsandboxcmdb","resourceType":"microsoft.documentdb/databaseaccounts","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.AppComplianceAutomation/reports/crstatustest-prod-20240613200321","name":"crstatustest-prod-20240613200321","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-13T20:05:53.5077518Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-13T20:05:53.5077518Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-14T23:00:00Z","lastTriggerTime":"2024-06-13T23:04:36.677Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CRStatusRG-prod-20240613200321/providers/Microsoft.Storage/storageAccounts/appprod20240613200321","resourceType":"Microsoft.Storage/storageAccounts","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.AppComplianceAutomation/reports/ACATE2ETest-FileUploadReport","name":"ACATE2ETest-FileUploadReport","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-13T08:39:02.9312502Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-13T08:39:18.1805008Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-14T23:00:00Z","lastTriggerTime":"2024-06-13T23:04:24.737Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/acat-aws/providers/Microsoft.HybridCompute/machines/i-0f85f65e4741defab","resourceType":"Microsoft.HybridCompute/machines","resourceKind":"Test","resourceOrigin":"Azure","accountId":null}],"storageInfo":{"subscriptionId":"120b982f-6bd3-4b60-98d2-a7b7ecd6c78e","resourceGroup":"E2EFileUploadRG","accountName":"e2efileuploadtest","location":"eastus"},"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.AppComplianceAutomation/reports/E2ETest-ScopedManualStatus-20240613082824","name":"E2ETest-ScopedManualStatus-20240613082824","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-13T08:28:24.5696156Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-13T08:28:50.6536356Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-14T23:00:00Z","lastTriggerTime":"2024-06-13T23:04:14.575Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/acat-aws/providers/Microsoft.HybridCompute/machines/i-0f85f65e4741defab","resourceType":"Microsoft.HybridCompute/machines","resourceKind":"Test","resourceOrigin":"Azure","accountId":null},{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/testresourcegroup/providers/Microsoft.Storage/storageAccounts/storageaccountname","resourceType":"Microsoft.Storage/storageAccounts","resourceKind":"Test","resourceOrigin":"Azure","accountId":null}],"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.AppComplianceAutomation/reports/E2EAPITest-MultipleOfferGuid-20240613082748","name":"E2EAPITest-MultipleOfferGuid-20240613082748","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-13T08:27:48.451994Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-13T08:27:56.2955756Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"2c2b3107-6433-4bc9-adb1-1d65c52f966a,8bb5df08-eebd-439d-bfd8-dc7faeb70d6f","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-14T23:00:00Z","lastTriggerTime":"2024-06-13T23:04:03.448Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/acat-aws/providers/Microsoft.HybridCompute/machines/i-0f85f65e4741defab","resourceType":"Microsoft.HybridCompute/machines","resourceKind":"Test","resourceOrigin":"Azure","accountId":null}],"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.AppComplianceAutomation/reports/E2EAPITest-UpdateOptionalParamerter-20240613082714","name":"E2EAPITest-UpdateOptionalParamerter-20240613082714","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-13T08:27:14.7377215Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-13T08:27:38.501531Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"a95a5aee-f2c3-4468-99cc-25c392cb06ea","timeZone":"China + Standard Time","triggerTime":"2023-01-08T22:00:00Z","nextTriggerTime":"2024-06-14T22:00:00Z","lastTriggerTime":"2024-06-13T22:02:20.068Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/acat-aws/providers/Microsoft.HybridCompute/machines/i-0f85f65e4741defab/extensions/MDE.Linux","resourceType":"Microsoft.HybridCompute/machines/extensions","resourceKind":"TestUpdate","resourceOrigin":"Azure","accountId":null}],"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.AppComplianceAutomation/reports/E2EAPITest-MultipleSubs-20240613082702","name":"E2EAPITest-MultipleSubs-20240613082702","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-13T08:27:02.1873855Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-13T08:27:02.1873855Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-14T23:00:00Z","lastTriggerTime":"2024-06-13T23:03:53.746Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/acat-aws/providers/Microsoft.HybridCompute/machines/i-0f85f65e4741defab","resourceType":"Microsoft.HybridCompute/machines","resourceKind":"Test","resourceOrigin":"Azure","accountId":null},{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/acat-aws/providers/Microsoft.HybridCompute/machines/i-0f85f65e4741defab/extensions/MDE.Linux","resourceType":"Microsoft.HybridCompute/machines/extensions","resourceKind":"Test","resourceOrigin":"Azure","accountId":null}],"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.AppComplianceAutomation/reports/E2EAPITest-ReadCanNotCreateEvidence-20240613082534","name":"E2EAPITest-ReadCanNotCreateEvidence-20240613082534","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-13T08:25:34.4774893Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-13T08:25:42.2347438Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-14T23:00:00Z","lastTriggerTime":"2024-06-13T23:03:40.286Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/acat-aws/providers/Microsoft.HybridCompute/machines/i-0f85f65e4741defab","resourceType":"Microsoft.HybridCompute/machines","resourceKind":"Test","resourceOrigin":"Azure","accountId":null}],"storageInfo":{"subscriptionId":"120b982f-6bd3-4b60-98d2-a7b7ecd6c78e","resourceGroup":"E2EFileUploadRG","accountName":"e2efileuploadtest","location":"eastus"},"complianceStatus":{"m365":{"passedCount":1,"failedCount":36,"manualCount":0,"notApplicableCount":6,"pendingCount":2}},"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.AppComplianceAutomation/reports/E2ETest-ScopedManualStatus-20240613082006","name":"E2ETest-ScopedManualStatus-20240613082006","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-13T08:20:07.0162332Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-13T08:20:31.5675416Z"},"properties":{"status":"Active","errors":[],"tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"e21cdb71-97a7-43cf-9bca-b3602cdf4eaf","timeZone":"China + Standard Time","triggerTime":"2023-01-08T23:00:00Z","nextTriggerTime":"2024-06-14T23:00:00Z","lastTriggerTime":"2024-06-13T23:03:31.025Z","subscriptions":["120b982f-6bd3-4b60-98d2-a7b7ecd6c78e"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/acat-aws/providers/Microsoft.HybridCompute/machines/i-0f85f65e4741defab","resourceType":"Microsoft.HybridCompute/machines","resourceKind":"Test","resourceOrigin":"Azure","accountId":null},{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/testresourcegroup/providers/Microsoft.Storage/storageAccounts/storageaccountname","resourceType":"Microsoft.Storage/storageAccounts","resourceKind":"Test","resourceOrigin":"Azure","accountId":null}],"complianceStatus":{"m365":{"passedCount":1,"failedCount":37,"manualCount":0,"notApplicableCount":6,"pendingCount":1}},"provisioningState":"Succeeded"}}]}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '13149' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:50:26 GMT + mise-correlation-id: + - 40b3d3ac-63e0-479b-9bed-f1754d509cd1 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045026Z-168779fcbd67zbdsz0xfssy1cs0000000n9g00000001cuq4 + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 90aa460ac82c7a3d53be243d52fd700e + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: 3C846CFB7FF04E1280B4E244676E73D8 Ref B: TYO201151005036 Ref C: 2024-06-14T04:50:26Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +version: 1 diff --git a/src/acat/azext_acat/tests/latest/recordings/test_quick_evaluation.yaml b/src/acat/azext_acat/tests/latest/recordings/test_quick_evaluation.yaml new file mode 100644 index 00000000000..2695862ea48 --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_quick_evaluation.yaml @@ -0,0 +1,1035 @@ +interactions: +- request: + body: '{"resourceIds": ["/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/mcatsandbox/providers/Microsoft.Web/sites/mcatsandboxapp"]}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Content-Length: + - '144' + Content-Type: + - application/json + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6InE3UDFOdnh1R1F3RE4yVGFpTW92alo4YVp3cyIsImtpZCI6InE3UDFOdnh1R1F3RE4yVGFpTW92alo4YVp3cyJ9.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.g9Olc83hDU2LwkRIkAm8cYT5SQPt05luBgdyw7ppEzHfdcrHzsy2f5lJfLiojTtSux_s1dagOtdjljJXpZFJIiLe55E_8TwVOajvfH2vk4vBljhWYcVVs3rirf7XRcBASPzkWrEF9vMdJ3V8isD0ofIv2TgJB4A9mijKQrMavAXHw2Ass9D0eJwBMCy7ttKM0xiwS6PjzeudlgkQAVr8QCmkrPqV2HoM_P9f2aTFCmLhXjr8xbtyEO9FAHHglNeCL6vn6oGOJUb4MOHMgh0N30LFcn98cms18QpSxanp4DDnrAAc4s-0cllNJ0JnMqig7EKuaZKo2U1IltmKPWDVOA + method: POST + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/triggerEvaluation?api-version=2024-06-27 + response: + body: + string: 'null' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + cache-control: + - no-store, no-cache + content-length: + - '4' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:31:07 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681219242&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=7yKkDqHJLvPsJvsVfFoT7-INCGPFDy-yIgalJb1dkaKf6tfPpADSTSue-dg9BhNtGnRnXZBe4T_bdCDvgXI5gJMOrGZYB7mKD9Aq-YpwOhrcaPhAPQ-rw3cwDIz1W7GzZ2dY7Gnc9IsDYdsJujQGGk_jDKlqI2XLik0r0uX7AJoOtkPBwiZ5c1AISHKiqOjuzK0RdkwsKi5g288CBQ8-4GEEO_CdV2U2O5P1JRsuFcb2ks9V2cIaVUVdxWswMZM9_lWGUCsnPHHpo8N47EG0FFpmHhwhma6_W0O_lZF9E1N9Dme8QS0WaJqMIyB_ne6Nb1eIyzex7qtOEwz0AfSRkg&h=hVe2KcBsfMqaN47rxMrhcQQBDwE7HtJ3NHSHPyrFY2c + mise-correlation-id: + - de9d1813-e030-4ec2-8b4c-ce8377e09957 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + x-azure-ref: + - 20240618T063107Z-168779fcbd68xng9w0bge41uvs000000035g000000016f2x + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 1204c35b189a5c870d2e998b9b51e9b3 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: E35EC1DF4BB14202949595E699B595BB Ref B: TYO201151006062 Ref C: 2024-06-18T06:31:06Z' + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Accepted","startTime":"2024-06-18T06:31:06.7885714Z"}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890682836901&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=fKcHY4vAUYYJ_bWjN6s_OvF8gZ2qzwFLtEC-YOdn4JfNFhu-8oVkYf26MZ3vJDGA2r9j7_iKlpkhtk9F5U4mIJkRzI5XZV7QX3uIvOvahbObs2E3daM6buNGRR9pfiVQTaSd-K7pvSicZWR5D0R91C_zKKlmZF65r5KpEikURIIX7jN1OjjdvZ3p1SW7bZNyDIXTxC8WRN66JDsD0uvMl3C7kRPBZZAsG7DsnVj2q-xSn9SyZN8FN6MKlJpEb51qZeoy7RxJmQMbvjPNpYs-vvA2SdlwLIeulSonLoAEo0C3HwwnDsLrVjJudzuhLeaOksN7ygFK6tgqXSedS7-TaA&h=m8WzhYMLbkZD1D7EvvDyyb_oF1TCoXSA-FX0oySfPUM + cache-control: + - no-cache + content-length: + - '392' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:31:07 GMT + etag: + - '"080005e6-0000-4d00-0000-667129aa0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890682994194&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=V-H_1enLXeaHM2UVQhW2Fu3PSyLI41ivqFEjcipewtzpuZLBuDMbpmWoi5SBBeLDcOZEwxt8fePmVkN3teYVglKPskqMutQ3W-bhBfrjUfHbjY7J159EvVijzFfBERcPlUMkpuz74asW68JQZmOE_ec_x2oznvd-_P-7Q7zrH9AKj0Q6GrX8LgxdkX9SLi8jh-_uC1KgZrWM9XHdDFkDbhMwLSRqJ3Jsn1pd-AV4ZTHTo3q3uURSfWm6E2pFCp4clVgW6jubQPXjYDp4pZV2UGyRspg1zyXgWCobK8V0YuA7quxzPU_6k9lZd302EpllNU4fGQ_yhitRuel02fFwJw&h=5UDcN9wsb_Gpg1PCwR1RqDdXcFeBa3suzASIExGY9tU + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 1BCB0377F44D4BB88BCBC76333E05394 Ref B: TYO201151006062 Ref C: 2024-06-18T06:31:08Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890987030782&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=IhW2BBax5DsF6Tcz0_f1495e_1nocM0CdhG8xt4vLIcgenkf3SvKxbAQNUMi7skZlqWMpyNGbVARRX_aD8AfqDdJM6SRGsKuoPiNGUmqdQ2kWUiq4eY-K44Yel10_M7cHHNFB_lIqPpeVgfTX74sNzIuDgWGQtc9Yiyl9SNx5RVVoiFcFV9XIIdTu_kIxBoXcz5pFlddsA-HhZTkzAHKN5uTote7kvgSfiKIH2EqQxbHKZ-AcnFCKKWTvMFu5GxP8hV-FLiOuh7RMKNxcocYb7y5eVqsGVIIgAVUz92vKM-O20aGihgMp-jGL1mWu4izzHniS_LcMPgGo_U9eWb-LQ&h=OVkIkp9Ug_OxmkiC_AIOqXrb4Www88X-Jxv1mq-R0ZM + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:31:38 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890987187056&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=I2rUyNqh-tL9PMdYRdM9TVqsWBtfeNJlmTEg2nnP_GTTJPWjeu4HLIVOYFCQoWVwVgKzxSLXP2FQprFeb-Tbz0P0G7W9KuJZfRq_r_6ahdeUno2CaUPIIhFbHCS1E9FB7iK2JoMjLPmewYPzysGoK5MtgzPgI1fGYcDnLxbBmPo9DYNlBMTUSpowFONVTwNiqq9iRQKvx_3Bj87QQcdOdSQTirJb5NGDcsdIOZ2dAOh77wMYwr8Q6yL0CrRt7Qr9ILp7dNikpBsHXjUDn52p5-ZSLIo_kZN2Wzm_BtyyGDS8Nrl6mylUkOZ49suksVnobFEJOjvpXeKVPxxEBJDQtw&h=OGMZOX0gM74Sooh3BT81ZiCc-c8knUcUaxMN4p2y9UE + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 5E592EF32C3C497299135D6893062ACB Ref B: TYO201151006062 Ref C: 2024-06-18T06:31:38Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542891291279798&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=lt002qEcVClm58HWwWgGP1kZFPNTlqewk-7eyB9syoPY9TN1vVkabnP628LtQ6EAz7udCOy6lZFEtAl30786Swiw4tLdMzyT9KI2Qjbe5aVi4_p0G6Pj0HsYPi3TsMphgQkV0v_GHdTVpAkHrfKmqVgQNObCK9hc_czyQYS-gL6ONH3tEdlcMR2NmtK1DMCZbfIAMy0ywYaftgrW0NCZPBvJNwt0Smf8Z_J79QJQUA-WXp8YcGx-DW6e7evm2dPAsQbu7MSKiAQXHFwOfY-wGcPU3QQmJKQ_t0Wvaj89yWTJQcc7qcvpvcKvvLfLM4I908KhCp8o61yoMnLBj25L5Q&h=_YxWPTPNPikIWGv6iPMJkucbDtz04P2FzkquWr9XgPo + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:32:08 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542891291279798&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=lt002qEcVClm58HWwWgGP1kZFPNTlqewk-7eyB9syoPY9TN1vVkabnP628LtQ6EAz7udCOy6lZFEtAl30786Swiw4tLdMzyT9KI2Qjbe5aVi4_p0G6Pj0HsYPi3TsMphgQkV0v_GHdTVpAkHrfKmqVgQNObCK9hc_czyQYS-gL6ONH3tEdlcMR2NmtK1DMCZbfIAMy0ywYaftgrW0NCZPBvJNwt0Smf8Z_J79QJQUA-WXp8YcGx-DW6e7evm2dPAsQbu7MSKiAQXHFwOfY-wGcPU3QQmJKQ_t0Wvaj89yWTJQcc7qcvpvcKvvLfLM4I908KhCp8o61yoMnLBj25L5Q&h=_YxWPTPNPikIWGv6iPMJkucbDtz04P2FzkquWr9XgPo + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 6CDFEAF1B206404A934F220D34FF4C5E Ref B: TYO201151006062 Ref C: 2024-06-18T06:32:08Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542891592887079&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=ksi6T4UQkEpQFnjr_wfmndoogI6DI-eR1IAyDB4N0UQlXwJ8BZfTcUN9Bcd3tKF4UVSRiwKPC7D_ZTF-XXAi1y_7KFllpYOESCDeK9kj-nbEmxkXNbq6norT90Kd_35eIHp8pSnzK-exxz856rVjOO9XuNUk_VcNGfwWnsRF3NikrbcBAXcd9HwgnLtsOE8ugpK46fl6QheYyi1hvCFj5iHG3idl1Nv9XsboCW-yrLISZoiUTABLEU107m1Eb80H-EEx2Cw9UCL1ROlsvk8Ol-0gvrBqNrc25dJeZVTIiU-eoZbjGHqELSjxPN9ofsolhFRbpQfcnMeB0pC1Ic0sNQ&h=jcQcD-9WDmdEdqo8wLgrJ2jTrk_OyXSer0IIqqPoDQg + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:32:38 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542891592887079&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=ksi6T4UQkEpQFnjr_wfmndoogI6DI-eR1IAyDB4N0UQlXwJ8BZfTcUN9Bcd3tKF4UVSRiwKPC7D_ZTF-XXAi1y_7KFllpYOESCDeK9kj-nbEmxkXNbq6norT90Kd_35eIHp8pSnzK-exxz856rVjOO9XuNUk_VcNGfwWnsRF3NikrbcBAXcd9HwgnLtsOE8ugpK46fl6QheYyi1hvCFj5iHG3idl1Nv9XsboCW-yrLISZoiUTABLEU107m1Eb80H-EEx2Cw9UCL1ROlsvk8Ol-0gvrBqNrc25dJeZVTIiU-eoZbjGHqELSjxPN9ofsolhFRbpQfcnMeB0pC1Ic0sNQ&h=jcQcD-9WDmdEdqo8wLgrJ2jTrk_OyXSer0IIqqPoDQg + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: A6542C7127344F0CAA978BF941B4CAD8 Ref B: TYO201151006062 Ref C: 2024-06-18T06:32:39Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542891894277495&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=t5yuCzZSF3WK62i9_bQtl1_rpb971VMSCpZMwYBuWV1elIauri3oeQlYQ7ZfWg-nUdkB885pjfJnVUwQTJ2VQoOXsr3ocEqYS5K74OnPgz2cgVWBRh85fKj7uu92P0fmjlcOPtE-JKY_3gy6yB9jf_d4bKNVxxONApEyIERc2TLiiX7EGxGKFgpihpmw9A7IMUqW6x616IvUw9Ny88sdaAaRVh68zTyRJ0URpr9hwDGXALVoqkuJtSxEM4aBFBRJ0cAETVdvEOVFU8fUbGb1cTuNCQ7gjmHIxkyfwmdvrYImVBzP6guyZVZ2rjOM1K1dAhjrCnAp-b50a6e_w8bKoA&h=x-FYMR2PCoPY7Au0rYf4jWU3O3uQESlOgdJsgHtFxsk + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:33:08 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542891894433606&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=7Rx0cMOYYXHA5PFYX9__9I7ebrcm65xpqg0boNZ5l5RhhfBdI_x1HkF6xLAlP0RVO4dWGX1wrFONEXEGlpPXl3W2jBK6FkltYeFgZltZUyw9ZeQDYtLWJCP4gXxuOWzQ6NIMVeIyanWoflKYmZ0Ce_oC3i4gaT7QIHcHAscLAgM3lARL7MDJYqsGlySGa9OXL8nNrn6Kmka3fA_h-L3a2ccJG6dzC_grm0_8BMdbGDRdEluCajoGBwoBivbVHN80Bl-nU62NRGKRJwmmY7gHl_38W77K6kqu8e3KBFVoOSO1ZrVIA_CsvQmW7J7mfquH2JQmYksfbFbWAhVCdgRV5w&h=RlB9Ub-IfmBBzqZxBkgXSI8qcJ_8Kd--gPRpcEilDMU + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: A6F23FD0D6C848B4AE718B7D7D2051B5 Ref B: TYO201151006062 Ref C: 2024-06-18T06:33:09Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542892195821690&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=IlZfdWaVhdpI1gzH0rcxptOi2d3dTJDnW3pgYrCFmE0OhfVvRLS0D1z7dK1B6sdD-5ulq7VhsFMPMePCSosRBsmHP_0PFmSUj9t0ci4WYWIoQcWy3gOPsTyfsTXraeyJdf9nddz1ls2bsAKdQwCiCYurpfqJ14mMLcKzp4k855ROf3Y5BC1nfqiGrv9he1-3e0-PKEEVZ6E6D3mfet9aBQ4gbGL2zH6KmwcgSdQA8m_7dHrSMZCD8eXh8KHJAzlzTWbrX4e5pH5aqY2NesNDYanrI90RnXO2RQF-zksAxz_vzWkK9vq7rwd-ZsHc8WpkDm7LPJ5CeJ0XI3b4x5K7Xg&h=_q5C5wy0xfFPGkqfkW5jc8qr7FCi2-FUEu9H3EVF_G0 + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:33:39 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542892195977954&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=6C4p7IJ5ehkfla6iU_t8p4DhxQQ25H5yKJuGqaG7MyywOH_klQFYvP2rMq2SgS5cNUQmpMO399gA0PjHdsHZgx386bb6lH03dyPav9QRtqWua3Apdjc6F_yjWtBeTHLb3UmTiUYb1syKoRFxDl02T7uTMx3BXv0uw_MZ_RRPwDq2qnrQjt76QwxASAFqGuEevACsUXZZLpQDuMe2qQYqzvK0R_VRwemIGIqhA7nKXPytv0KkXTjEgCIhbZi3U7LPqASPdd_boVzxG69R46Ui8-dqeFt8fnbccYIS66oyNcV-BX-5UoEiyIOJuWBTk2TV73Cpj3qFu31LkFfSY3eUyQ&h=QKiKYGB7ZwRMY_-Ma9pKRDUmgzNwFdhqh1ellzQO5H0 + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 14F005360DC74603B063A4C3F0A79A12 Ref B: TYO201151006062 Ref C: 2024-06-18T06:33:39Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542892497613366&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=4oALrd3kbX1xV1W0E4timlnZHtM9lJINFHGCndkseVNpglDhAvCkUFjs5CZpJLLBSZ9_9oQYsaYUsHnGSDMXJcQc1tZ1uG_EJ77czZqGg8AuGCEs38TYWsGvUFqEm0rIMSr_Z7lBXj0B_HfDK9srEe6S14oWmK8WolGNFsm2584gzp1y0eVVxdPW3eMlLXLc9oEL08HJr3Z4NzK8Xtahg_xRrid3KWyV_QyejWCMGowX1S4t7HBdIuV_Eua3QM5oVyv_dxa4G6GjTLhBiJlXUB-zGWqXdhSp1hfh758hLGezkcT7w5FeEQNfZKqJteFXjoyZDPBcebYunhQEyo4pPA&h=mxrBVxtuwV6BhykZNiQc9tIwnvC_7WkfcAdK3bc-VmQ + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:34:09 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542892497613366&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=4oALrd3kbX1xV1W0E4timlnZHtM9lJINFHGCndkseVNpglDhAvCkUFjs5CZpJLLBSZ9_9oQYsaYUsHnGSDMXJcQc1tZ1uG_EJ77czZqGg8AuGCEs38TYWsGvUFqEm0rIMSr_Z7lBXj0B_HfDK9srEe6S14oWmK8WolGNFsm2584gzp1y0eVVxdPW3eMlLXLc9oEL08HJr3Z4NzK8Xtahg_xRrid3KWyV_QyejWCMGowX1S4t7HBdIuV_Eua3QM5oVyv_dxa4G6GjTLhBiJlXUB-zGWqXdhSp1hfh758hLGezkcT7w5FeEQNfZKqJteFXjoyZDPBcebYunhQEyo4pPA&h=mxrBVxtuwV6BhykZNiQc9tIwnvC_7WkfcAdK3bc-VmQ + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: C044A1C755784660BED90910E4AB2014 Ref B: TYO201151006062 Ref C: 2024-06-18T06:34:09Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542892799302220&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=WOS7oPzbWmE9N7FFDLQ-RtIszhwpk_tLdWOA0ScHaPEuMcPdmqMD0PlKGzOirO0Zg099mk-lXartnTHs208K-bqHfVs2ROmlTckUIYzGlyeru61wbWIeVzh8wUTmSfx2LkAx6tFbHkWmow7jjcP2m-M6B1M3Qi99pUqQremNsRq4O-FM0mFh6UDAJQDMEEQaMKbhQWT1gWRM9jZgB9jYeV4i0fehwih5otDqeF1ARB44z2utcxZj2J48GCPCOd13LbqmWKbp8P5SW1lggEN9h-TqS4-54fHClxm_cIUJ_L4EjwOukr8B941a9kzCzV_WWqpobM4fIGuUAxQ2eJO2Xw&h=or7Be2LwCn65q0VsfDSueNRnbl4yBD2tgDOoVV-JkuM + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:34:39 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542892799458521&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=0AYO7_zGy37iZcRrh47iPwBE84y5lTACSnugt0q8iPohnCNNTkHWeQecEfSi9tr36nHd9xCeNuG7kFOGCPblTaMl75FEwTKZNI3x05S26ZqjSIRq7fNiPYX_-yZgDEr2fmHnUr7gH3JMxoBMpjquDOTiIVgFyFGQOGkZF4jtyXAA_F9ar071qeYgG0cKzLjQsMmshr0Px3Fiu5E4Jn_OvZnOirHT5LDH-UHttuEsCix6xp0diocq7VuNyQZ7xRWTyfDBSUKMYcV2xtVli7gYgvpOhRwFd50f8wbisVdpsckiA5YcHQemaDmL45gjoEW6j918uDkzYmMfCVes12sMPg&h=H5p80jFKlHWVRr6xJBCmybKiOqckTo5_QE3krtY8lEM + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: D48E415EED45474A8BF5ADDB936A7ED0 Ref B: TYO201151006062 Ref C: 2024-06-18T06:34:39Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542893100897147&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=rSsRyIz0VbrtLIWcPardcHUaXIYtDWhFbwhOHkEZ3RQR3MAEANREw5D2wCnDlTPJuOOolhxxaWTOI4LDS2kEO-uqkSk0JNSDRvxeJzdXHHPDZoL56ABJGYAyK2cUSUsTko-nSi-btjYVrlgIB4meCOKzAvFAwIDYxMV1oSgCi_EaYOPtHUh32D45aB56ljU2YRXEWrF7d-MKRZclZ1JEF_zz52qjVXyXBWcR2GKzDldH5PMJKkRNc74SLOsRj02WURmHycnVLWKuRikzJqs-DHX2RoJV35GHD8jAGNRC7Mj3HiEfEmZrtYUUiPtaTBeodE1yrAJXhlriFh_QXJA9EQ&h=RxArO0PW3VCt5cUxyZQTgINlgARLZcvJLzGJ5LyDcJ4 + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:35:09 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542893101053216&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=eYEI5B8x7yzQdivlcQ5YNGY4LNs6E00VY6xvKuBzOL-KP6Uy2B6RQWHmap3k0w38tzqbuJIsr8b9em-V9V29xiIAPB2bCuyUFg2NcLypeKy-MpXhVgLZ27ZwZpbb41YbrPN2lcXGJKcBRWSNXdcd_Jz_5m2t2hIiz-IXNROrmrH1roZNpeiH6dynRvuaVgVYrAvvKeJ3MoiOCfICTF_Z-lbYdJKGYOhcnZ_-TXxT9CJaM97RXP5IjG9M9XvQqUBd--zewjCLj0pYZkXR7iHHJHvNiPHGFXHIk5I5hMFqsXxncgsEP3VqZvoGcoxDXGsRS9ydh_jgNxNFiVbB41rs0g&h=Qmm2thNOYd16IDGSslLbcWRGaeCOLsRNo14eUZ2EJ_M + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: C4A655EBCADE4134A24B447F63C6CC56 Ref B: TYO201151006062 Ref C: 2024-06-18T06:35:09Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542893405340670&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=dXB_afMCyBgm6sDjJfE2mOhsZFYb1CPBAG6bCEtC2F-5qZIjHV6dJzkjjpVn69bBf-ty_AasEU-CQnfcMcpW1WUiigzWAxLnlG8Y_wkwu7uSBz6HhEdLrS0xp-BE7CwwjWrBV0HoQOuwWdi15mvTxM7OCrXFuXh6TURwiVXlA7hsXupGcWAHk1cF7c_-Am4M9Pps8NKDuXeLtkQfV86gRRlE0ZnasL2UBte3bF0TzNGB3-qSRpdmAL4xfI3M_3F4E_kl4Z9DHJyHUtOtdjMJ0TwvONDh0Tu1OtdlrzaK1z5xHhmJq-hgC_ygQJWaGtKsOGHLX4NCAW1cu4ps-8JMYA&h=PqwFSYrsy54K16q-x8egSH7NaUgBV6Zzilr8pmw9Pxc + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:35:39 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542893405340670&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=dXB_afMCyBgm6sDjJfE2mOhsZFYb1CPBAG6bCEtC2F-5qZIjHV6dJzkjjpVn69bBf-ty_AasEU-CQnfcMcpW1WUiigzWAxLnlG8Y_wkwu7uSBz6HhEdLrS0xp-BE7CwwjWrBV0HoQOuwWdi15mvTxM7OCrXFuXh6TURwiVXlA7hsXupGcWAHk1cF7c_-Am4M9Pps8NKDuXeLtkQfV86gRRlE0ZnasL2UBte3bF0TzNGB3-qSRpdmAL4xfI3M_3F4E_kl4Z9DHJyHUtOtdjMJ0TwvONDh0Tu1OtdlrzaK1z5xHhmJq-hgC_ygQJWaGtKsOGHLX4NCAW1cu4ps-8JMYA&h=PqwFSYrsy54K16q-x8egSH7NaUgBV6Zzilr8pmw9Pxc + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: F8048A89BE0E4C359B617A9F5E80FD43 Ref B: TYO201151006062 Ref C: 2024-06-18T06:35:40Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542893709667458&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=bTUiqZK80G-kZhHrFW90QDOjrTtwIeTAgA5ZcNUjFhPsQ5nfsMGb9f7iBNYoFJx60btPsdNYbBHNQlC1tfepeOKfyFdse4x9MPq6b_ph9iX5XamO2CW8E_UsAFlNODrYiVfJK5e32Jcy1t0n_etvuBRIISJLsxhFNGQobgj5EbQwTKmkDW0R6hbWAombN6DXGqcVLvP2bC5Do5xdrQCn8x0mOv45klS4aaO2nT3YqUQymwe3tMRNPDaMURfpS-QDpBkz6dpzUHN2wNf8ytThrLDOj_f0GyqbE5BPGTPsnnxoFCMGVvZqzWXr_W8b3aOLFcJk6jA0Vdtrq3wma1stRg&h=Cpo0e1mece2lodgMjl4GyJdMPG2KdVWFU7H7GcFv2_Q + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:36:10 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542893709667458&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=bTUiqZK80G-kZhHrFW90QDOjrTtwIeTAgA5ZcNUjFhPsQ5nfsMGb9f7iBNYoFJx60btPsdNYbBHNQlC1tfepeOKfyFdse4x9MPq6b_ph9iX5XamO2CW8E_UsAFlNODrYiVfJK5e32Jcy1t0n_etvuBRIISJLsxhFNGQobgj5EbQwTKmkDW0R6hbWAombN6DXGqcVLvP2bC5Do5xdrQCn8x0mOv45klS4aaO2nT3YqUQymwe3tMRNPDaMURfpS-QDpBkz6dpzUHN2wNf8ytThrLDOj_f0GyqbE5BPGTPsnnxoFCMGVvZqzWXr_W8b3aOLFcJk6jA0Vdtrq3wma1stRg&h=Cpo0e1mece2lodgMjl4GyJdMPG2KdVWFU7H7GcFv2_Q + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 4E1F0236AF274B84906F502869190F6A Ref B: TYO201151006062 Ref C: 2024-06-18T06:36:10Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542894011107923&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=kQZ_YLA4VMCfsaq-oCAok1HR-WiQsW5OxULRxzCm5kezhqYns78N-xIvDekMmcErk69iYQDiUL96oJyTK6_aG_olPYl8ZjTaJwkLDRWQ9ST35z2hxwJeTLCll7YlOOOl8SCGINxLiNx2xmqMsdfBJzm5X5jnDQQwVXvYofo25C6ORVdXsXHtt3ziCWtpHehfHwLTWVN855qXpQDFg8uhD9RjNw5FdVoJVAB23_zeqGXbPR5Ck_3ONcAYpD6eht9b0Bl0OycT67cRMjZn8vRhPqeJHbDoJd3HP4FD8oMt21f-2DL_lrVrZYStbCJTlBPHJm-48S8GtoXz2s_nm-yy9g&h=q90VNDQSDKINhFQhk21x63Cc4Yyh2bNPJgHgnCtzNUs + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:36:40 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542894011264811&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=vjcAlcNca7t2yOdbjzhDSnjs0MghJgw52IxmpxJ-wM417M5ahSdG4Onwhy4yCamd6pdqcEkVWCZKMDTbWTHSr7CQP78qI6XwL12DnukTnKQDEZg-8q9pNljyXVlV5uvFJYuE8oJOXoUmThx0oJSsbECKPBaXjUbau3yIwNeDUSqL3pxVfyanBmgqjo6QQ3fNEFFTHht4CURCJ6H7yw3WWMOjHipruyeXRc-ws4skMzmpncOR0aAZLtdkhnbTadjQZCQs5NBwVww0lVfNtoiS-VtlnFlnlgQF1z-IaMwVCF7v168Pj5hJyWNFJ-VePp_XdgAjWXWljjGYTN-KK4YDmg&h=sX3T1eWUaL2duDjKDJcMoXkf9zXLpBgkJvueIT_AW7s + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 37635CD016CB4EAF8A4314923BCD6611 Ref B: TYO201151006062 Ref C: 2024-06-18T06:36:40Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542894312731860&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=lQhkGDiNkGxkI-jvHBslMaxzzN4lN-4kLtx9Yb8DZlDKTrQ8kj0DEXb8wD2m-1Dk0HY7BNSpofKGc81q2nEbRO7m09_TMr1p6WQU8yJmNxXSGxH1CtvGguhq0tSIE33k5BDob894mLasVUpK-3qVsdZME8DnJmUkEYkitxfuTx6LPfW7i4ww_m6csVNqymTlkrzgQgudO00CWV5R5BH9zgmj6tVnKv0wqwaUhX2TU905Qxoi9qw78-SF6twngQulqxrDdxFaE60ZxShNmbY67c9q6kIGdB88tUVXB1fZGEPOOY-iUjthID88yf-Nmq6LKgoBy-i29RphEnz3gQ_COg&h=SSH0qK9o5amcaX_qtkDyDCFvBKykc0jhg75EYZKCAVY + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:37:10 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542894312731860&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=lQhkGDiNkGxkI-jvHBslMaxzzN4lN-4kLtx9Yb8DZlDKTrQ8kj0DEXb8wD2m-1Dk0HY7BNSpofKGc81q2nEbRO7m09_TMr1p6WQU8yJmNxXSGxH1CtvGguhq0tSIE33k5BDob894mLasVUpK-3qVsdZME8DnJmUkEYkitxfuTx6LPfW7i4ww_m6csVNqymTlkrzgQgudO00CWV5R5BH9zgmj6tVnKv0wqwaUhX2TU905Qxoi9qw78-SF6twngQulqxrDdxFaE60ZxShNmbY67c9q6kIGdB88tUVXB1fZGEPOOY-iUjthID88yf-Nmq6LKgoBy-i29RphEnz3gQ_COg&h=SSH0qK9o5amcaX_qtkDyDCFvBKykc0jhg75EYZKCAVY + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: B2C2D59DBE47421499B33EEF6AC8EE92 Ref B: TYO201151006062 Ref C: 2024-06-18T06:37:11Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542894617793734&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=vY4pqHHbWtc9p_Jv4lkjF5x3tqBnB6MofyKVawykEZmH-GTvBi0ye8cT1YQgQmeN2YJKeJFAIzP0B_Pq1oBXl5ImEGoJGv6MQb2XZaUvP57wHQvEYmaMpyOLXtWOqNhi_QjhjrSoXZ21bXCSKHdhthVOvEimgMzBCrnLwQH_-b-CiS79Xv3ZXSCp_Z-g0vQpQr-tDSrurbFO50BHoVGb6yzZelBadXwBg0xGRdJFlGDg5lcBMZTKpoHjsqvCDtFO9j518O9riiF4UEqwD-H3hXvO54FDCd0dKoRMcCiZyvy1aGAQj4nG0d4qjDc5gMvAEW0BFawVfgiu_rSdin0HTg&h=2baeyt0dLlQTC83c2eI080xcqLrrjbhv6Pu8Y_iBa0M + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:37:41 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542894617793734&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=vY4pqHHbWtc9p_Jv4lkjF5x3tqBnB6MofyKVawykEZmH-GTvBi0ye8cT1YQgQmeN2YJKeJFAIzP0B_Pq1oBXl5ImEGoJGv6MQb2XZaUvP57wHQvEYmaMpyOLXtWOqNhi_QjhjrSoXZ21bXCSKHdhthVOvEimgMzBCrnLwQH_-b-CiS79Xv3ZXSCp_Z-g0vQpQr-tDSrurbFO50BHoVGb6yzZelBadXwBg0xGRdJFlGDg5lcBMZTKpoHjsqvCDtFO9j518O9riiF4UEqwD-H3hXvO54FDCd0dKoRMcCiZyvy1aGAQj4nG0d4qjDc5gMvAEW0BFawVfgiu_rSdin0HTg&h=2baeyt0dLlQTC83c2eI080xcqLrrjbhv6Pu8Y_iBa0M + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 5C8C137AF8F64421BAF14A04391839EC Ref B: TYO201151006062 Ref C: 2024-06-18T06:37:41Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542894922391570&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=WtY9mE4ozYbYlktFyW-HfQiTIVp4tiI57KyGA030DSG7a8-4pl5KMliVN5o3F7G4qZIezynL2raaH0ueRhgfW-Jh_ImMt37u6GX9gmH_osZPVPED5-CpS9D-RgA0pfTRH6Jw7Sx7NVLPTH4hmzn2GL_WoddytnxB4uPcYp-Na_QD8xREpaq2lTJiZvkwCoZs5RN-k_rT39E4VN6A0fmcNS2KZ368AtOPTucAASGavr30f_u-DpLgHDIR-CuNx5rk5sqaiMFyCqh6ZZiH8d_XcwfXNlgNBHhyyDwfJV8YdkSB0Bwuke_R-1Vq7hABZ1BMzK5D0dMBDDP49V3BmScvDQ&h=7xPJitVY_5rdbeWZKkUuCTG4EV2KfHA-1Y8lUzIK8So + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:38:11 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542894922548337&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=yOJ_HVsY4kzciHLB8b25yGfD5q--cpuMCbK-7gSAt8COs90fJBtaN5Ha9H05ZVPyeJXZTPRVdhRGktm1sd-0-UXEMydYg-aj3kbwrguytuTwDTSF6HK1nsMsRbDsrG9dnaFBJX1t1PyRXpzJiEFaw6xaN9o-fe2oLzTMA-SjR96ysiMgDkY60gTNDJa1T-24x0MYPRdLw2qaK3zt4ZVgGhEsna0Vr1t60FaTOIoUxdf1mJAbSEzaSOUpoI5BTrIKhQBgQa-4cf0klgVfn8QmEKzaiYgIlvBO9SSnSWGi4yY35bhRmO9B1E5e4gl2L6QXXMVgSxHYtpCiOrU77TyY9A&h=CDJ2y9q4UN9VFe9HWKRbtHK0cVwTPcu1DSv7ZO1sKr8 + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 6778198AD3214B9C84B4482D0BD53B0B Ref B: TYO201151006062 Ref C: 2024-06-18T06:38:11Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Running","startTime":"2024-06-18T06:31:06.7885714Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542895223976928&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=QfbTQ-L1yhZgPCk2QiUNaZiPA4YoJSCz94aJwezMzX44yNsaxk0JKcvO9SRsaEzjgLRwJSJgg1nx8eHj7h89iSpMuj0JnwxuAUxCB7s5USsZb8yxruG2hM7b2kkKAU5kjkBHdbpk_6gLi9zHTr7XizhbuwKkqKkLgqDakat9vUKPv9ih8vk8wF1U2pzRxPmA2sjxVloRnC-LWX19uAAQ5ZsRgODiQkxwFNjqVUFYRKPZVD--KZV-CbebsVpVTpiKkQlQxITFLERdWKDuaIuXBBcDSGlTCQnHx27tEbNuILlciKhnY3dnj4A2-fDOnSDNDHt05yNZesXKYggpWshLDg&h=z15lFNmO17yZSefESYJy2d4uTl5SMVduTVfjSOi92Kw + cache-control: + - no-cache + content-length: + - '402' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:38:41 GMT + etag: + - '"080012e6-0000-4d00-0000-667129ad0000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542895224133185&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=qkASlXebnXBYQkEh45x2_q1RsqBgna_KTJPQ-orCp1kWa0cf-Ga926uxfYvUsgGv4JYHbw-NA_7Oq-Y_WKOPoo-RJX_42PA98VCPfEwYbmpCLWJitmmSpwVZhHrpuxBDkPuKBXbvh6UTczSRvADq0T8JQEZpmseKQ7QK4HmAWFAttM_WFPchODg7iH4qHcdFd2sgEFejxr58Lg_eCZuUBC6tW3U-GEs3vadneMjOsWzLMbGTQKCmADVk4pyZvcCxis4hLj7ENJdTFEyyCvTgTNx4wXDSPmydgrpf7h3sL0VwwMO-lgM3YiJvqiVkwrxDr34xQy42E120ZqCgTbt4lA&h=sH0EbPaB5jsSO35sM1ZRhpps_ODe0ZXV98668dLoK1U + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 38BAA73423564E03B072B36F423A6E97 Ref B: TYO201151006062 Ref C: 2024-06-18T06:38:42Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681062965&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CYKatd6spcP9htqYciVL87w1yX1eNzY2ScD_fRmZMI2XrZo1hQAtSTpZ-vDWOT2C8xlVp7dPqDq_TsblXj-m-QZfkeRuLMItXzEaAHo99ufmijpf9NjjD_A0LBEOc4vVP0gVBr4xUbzk--WezBBYXR5l0S9bJ4ryI_QuCKChrvjrgc-8UXxh9l7GXe37UcJM5uzFxgIDNpUXEYHnko4_e_a4JYh47WSkVqhHAQHwiUkPElUPuqELCp6ht_pLV0rbbLUp1OyjiFyb09DEy_XkTKR-ufAa_UXHiwNfSiABZueZo_xy8TXeJqjmR9fVyeZIsFUrNMgfw9INZaxsnaU6Xw&h=8JV6qzUBd_Bo39Q38xyR8Q8c86SzfvA4RCBBkZvtvUk + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Succeeded","startTime":"2024-06-18T06:31:06.7885714Z","endTime":"2024-06-18T06:39:03.4530554Z","error":{},"properties":{"triggerTime":"2024-06-18T06:31:08.059Z","resourceIds":["/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp"],"quickAssessments":[{"timestamp":"2024-06-18T06:33:11.2579883Z","resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp","resourceStatus":"Compliant","responsibilityId":"","displayName":"App + Service logs in App Services should be enabled","description":"","remediationLink":"1.Go + to related unhealthy App Service instance, click ''App Service logs'' in the + left blade under ''Monitoring'' clip.
2.Enable ''Web server logging''. + ''Retention Period'' is mandatory and ''Storage Container'' is required if + you select ''Storage''
3.''Detailed error messages, and ''Failed request + tracing''.
4.Click ''Save'' to save the new settings."},{"timestamp":"2024-06-18T06:33:11.1459181Z","resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp","resourceStatus":"Compliant","responsibilityId":"","displayName":"App + Service apps should require FTPS only","description":"","remediationLink":""},{"timestamp":"2024-06-18T06:33:11.0804017Z","resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp","resourceStatus":"Compliant","responsibilityId":"","displayName":"App + Service apps should use the latest TLS version","description":"","remediationLink":""},{"timestamp":"2024-06-18T06:33:08.1629782Z","resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp","resourceStatus":"Compliant","responsibilityId":"","displayName":"App + Service apps should only be accessible over HTTPS","description":"","remediationLink":""}]}}' + headers: + cache-control: + - no-cache + content-length: + - '2368' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:39:11 GMT + etag: + - '"080054eb-0000-4d00-0000-66712b870000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 603D6540196E461C8DFBEF8366F8187A Ref B: TYO201151006062 Ref C: 2024-06-18T06:39:12Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat quick-evaluation + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --resource-ids + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638542890681219242&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=7yKkDqHJLvPsJvsVfFoT7-INCGPFDy-yIgalJb1dkaKf6tfPpADSTSue-dg9BhNtGnRnXZBe4T_bdCDvgXI5gJMOrGZYB7mKD9Aq-YpwOhrcaPhAPQ-rw3cwDIz1W7GzZ2dY7Gnc9IsDYdsJujQGGk_jDKlqI2XLik0r0uX7AJoOtkPBwiZ5c1AISHKiqOjuzK0RdkwsKi5g288CBQ8-4GEEO_CdV2U2O5P1JRsuFcb2ks9V2cIaVUVdxWswMZM9_lWGUCsnPHHpo8N47EG0FFpmHhwhma6_W0O_lZF9E1N9Dme8QS0WaJqMIyB_ne6Nb1eIyzex7qtOEwz0AfSRkg&h=hVe2KcBsfMqaN47rxMrhcQQBDwE7HtJ3NHSHPyrFY2c + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"ef803153-c46b-4796-a187-d4f6e2837a66*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Succeeded","startTime":"2024-06-18T06:31:06.7885714Z","endTime":"2024-06-18T06:39:03.4530554Z","error":{},"properties":{"triggerTime":"2024-06-18T06:31:08.059Z","resourceIds":["/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp"],"quickAssessments":[{"timestamp":"2024-06-18T06:33:11.2579883Z","resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp","resourceStatus":"Compliant","responsibilityId":"","displayName":"App + Service logs in App Services should be enabled","description":"","remediationLink":"1.Go + to related unhealthy App Service instance, click ''App Service logs'' in the + left blade under ''Monitoring'' clip.
2.Enable ''Web server logging''. + ''Retention Period'' is mandatory and ''Storage Container'' is required if + you select ''Storage''
3.''Detailed error messages, and ''Failed request + tracing''.
4.Click ''Save'' to save the new settings."},{"timestamp":"2024-06-18T06:33:11.1459181Z","resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp","resourceStatus":"Compliant","responsibilityId":"","displayName":"App + Service apps should require FTPS only","description":"","remediationLink":""},{"timestamp":"2024-06-18T06:33:11.0804017Z","resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp","resourceStatus":"Compliant","responsibilityId":"","displayName":"App + Service apps should use the latest TLS version","description":"","remediationLink":""},{"timestamp":"2024-06-18T06:33:08.1629782Z","resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp","resourceStatus":"Compliant","responsibilityId":"","displayName":"App + Service apps should only be accessible over HTTPS","description":"","remediationLink":""}]}}' + headers: + cache-control: + - no-cache + content-length: + - '2368' + content-type: + - application/json; charset=utf-8 + date: + - Tue, 18 Jun 2024 06:39:12 GMT + etag: + - '"080054eb-0000-4d00-0000-66712b870000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 86EA2BE04E21414C88A348C74F26EF50 Ref B: TYO201151006062 Ref C: 2024-06-18T06:39:12Z' + status: + code: 200 + message: OK +version: 1 diff --git a/src/acat/azext_acat/tests/latest/recordings/test_update_report.yaml b/src/acat/azext_acat/tests/latest/recordings/test_update_report.yaml new file mode 100644 index 00000000000..6483a42189c --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_update_report.yaml @@ -0,0 +1,823 @@ +interactions: +- request: + body: '{"subscriptionIds": ["f744fbde-a95f-437e-8fcf-38f9324e3d9c"]}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Content-Length: + - '61' + Content-Type: + - application/json + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: POST + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/onboard?api-version=2024-06-27 + response: + body: + string: '{"subscriptionIds":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"]}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/308c22ff-861e-4d6c-b89c-53c75b307328*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374297980776&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=fipO9sKZfmN1jiIPvVTCmYkwig3__WKc9JeThAY_EF1pYTHGYIyAbJHVrXE7SXRJEvxrA_Iaql-oNKPWo7ETSHPHHApVFVEhsjeKftpDh7Q13Sx9Hr1K7R929TtXhrgfvrfaoZlLKGOPGfJ8M7wCmcIfqgRUlTjvCk8VodU2rf39ih3k2Z-cLk7GyNI5NyRKwDQa5DrhiC0sln1dUmC4czSTGCFO1207M8Yg5_QX1YLOB2qU-EYyL6qJruilyR2cmwnNbk0n1SvDCdFFKaMySq1i8CZZGRfUNjAogd9lgg-UlGAjYzWDRTaqJHGi-lR8KbB-CinnXB4Ja8HaaGv9hw&h=yPJemQZxPOvU3Cae_igGDzAvnQQPy90QqsOBvzboMi8 + cache-control: + - no-store, no-cache + content-length: + - '60' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:50:28 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/308c22ff-861e-4d6c-b89c-53c75b307328*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374297980776&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=fipO9sKZfmN1jiIPvVTCmYkwig3__WKc9JeThAY_EF1pYTHGYIyAbJHVrXE7SXRJEvxrA_Iaql-oNKPWo7ETSHPHHApVFVEhsjeKftpDh7Q13Sx9Hr1K7R929TtXhrgfvrfaoZlLKGOPGfJ8M7wCmcIfqgRUlTjvCk8VodU2rf39ih3k2Z-cLk7GyNI5NyRKwDQa5DrhiC0sln1dUmC4czSTGCFO1207M8Yg5_QX1YLOB2qU-EYyL6qJruilyR2cmwnNbk0n1SvDCdFFKaMySq1i8CZZGRfUNjAogd9lgg-UlGAjYzWDRTaqJHGi-lR8KbB-CinnXB4Ja8HaaGv9hw&h=yPJemQZxPOvU3Cae_igGDzAvnQQPy90QqsOBvzboMi8 + mise-correlation-id: + - 148b8a68-7c41-432e-b315-d572b3e2e513 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045029Z-168779fcbd66p5whxbd86ka08n0000000gwg000000007r8p + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 2a49794a0e6efffa7ea7a49b3630cca4 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: 7EDFA0DBE22C46A89E6F5FB072DC2129 Ref B: TYO201151005042 Ref C: 2024-06-14T04:50:26Z' + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/308c22ff-861e-4d6c-b89c-53c75b307328*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374297980776&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=fipO9sKZfmN1jiIPvVTCmYkwig3__WKc9JeThAY_EF1pYTHGYIyAbJHVrXE7SXRJEvxrA_Iaql-oNKPWo7ETSHPHHApVFVEhsjeKftpDh7Q13Sx9Hr1K7R929TtXhrgfvrfaoZlLKGOPGfJ8M7wCmcIfqgRUlTjvCk8VodU2rf39ih3k2Z-cLk7GyNI5NyRKwDQa5DrhiC0sln1dUmC4czSTGCFO1207M8Yg5_QX1YLOB2qU-EYyL6qJruilyR2cmwnNbk0n1SvDCdFFKaMySq1i8CZZGRfUNjAogd9lgg-UlGAjYzWDRTaqJHGi-lR8KbB-CinnXB4Ja8HaaGv9hw&h=yPJemQZxPOvU3Cae_igGDzAvnQQPy90QqsOBvzboMi8 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/308c22ff-861e-4d6c-b89c-53c75b307328*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"308c22ff-861e-4d6c-b89c-53c75b307328*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Accepted","startTime":"2024-06-14T04:50:27.1670108Z"}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/308c22ff-861e-4d6c-b89c-53c75b307328*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374299855836&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=cUYVzwGx4lyYfqd0NogNgtrf9eNuuiwVAnCV5KRm6DpiZiplYnNJ9RtVGltgKM0PRI-qCXkC-DmeHlxcKcemff3SUP3RCq7hOdGNaw9hCMNjsriUiNM-NeIo0heb2OCmKtCkZX-LMC_-B4387tSl1Wvz1RdUmbuNNuprHMI4tEL_2CzImK0Xqbc3DeMlc6bpVTJi3uLwNOu6ykFULgSPxpuCSOx8PzRlZbns-QPNkAYLewke55DrVF9cuhlBwykKdHecI4hRLehFWGiccwUcN6oDd-dJWNDXSCI6Yg9ZO4zzwbMNKkizvaWt-Hrf-6xQkaYxYUwFpYyTrLPLDSI1fQ&h=BWYCWYvuAHLie5Bojd5etB1Gk8w7naLNmVIgnzjqnuA + cache-control: + - no-cache + content-length: + - '392' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:50:29 GMT + etag: + - '"0b01e800-0000-4d00-0000-666bcc150000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/308c22ff-861e-4d6c-b89c-53c75b307328*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374299855836&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=cUYVzwGx4lyYfqd0NogNgtrf9eNuuiwVAnCV5KRm6DpiZiplYnNJ9RtVGltgKM0PRI-qCXkC-DmeHlxcKcemff3SUP3RCq7hOdGNaw9hCMNjsriUiNM-NeIo0heb2OCmKtCkZX-LMC_-B4387tSl1Wvz1RdUmbuNNuprHMI4tEL_2CzImK0Xqbc3DeMlc6bpVTJi3uLwNOu6ykFULgSPxpuCSOx8PzRlZbns-QPNkAYLewke55DrVF9cuhlBwykKdHecI4hRLehFWGiccwUcN6oDd-dJWNDXSCI6Yg9ZO4zzwbMNKkizvaWt-Hrf-6xQkaYxYUwFpYyTrLPLDSI1fQ&h=BWYCWYvuAHLie5Bojd5etB1Gk8w7naLNmVIgnzjqnuA + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 43F594A33B7A4CA7BAC9C9059E75B4A2 Ref B: TYO201151005042 Ref C: 2024-06-14T04:50:29Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/308c22ff-861e-4d6c-b89c-53c75b307328*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9?api-version=2024-06-27&t=638539374297980776&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=fipO9sKZfmN1jiIPvVTCmYkwig3__WKc9JeThAY_EF1pYTHGYIyAbJHVrXE7SXRJEvxrA_Iaql-oNKPWo7ETSHPHHApVFVEhsjeKftpDh7Q13Sx9Hr1K7R929TtXhrgfvrfaoZlLKGOPGfJ8M7wCmcIfqgRUlTjvCk8VodU2rf39ih3k2Z-cLk7GyNI5NyRKwDQa5DrhiC0sln1dUmC4czSTGCFO1207M8Yg5_QX1YLOB2qU-EYyL6qJruilyR2cmwnNbk0n1SvDCdFFKaMySq1i8CZZGRfUNjAogd9lgg-UlGAjYzWDRTaqJHGi-lR8KbB-CinnXB4Ja8HaaGv9hw&h=yPJemQZxPOvU3Cae_igGDzAvnQQPy90QqsOBvzboMi8 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/308c22ff-861e-4d6c-b89c-53c75b307328*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","name":"308c22ff-861e-4d6c-b89c-53c75b307328*0695451AAD461519B883EC5EB132DB4348D55DEDE2D9C17F3709E26D9E21EDB9","resourceId":"/providers/","status":"Succeeded","startTime":"2024-06-14T04:50:27.1670108Z","endTime":"2024-06-14T04:50:30.4234031Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '463' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:50:59 GMT + etag: + - '"0b01f600-0000-4d00-0000-666bcc160000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 35A8A0F03B73417AB14664851071D2B5 Ref B: TYO201151005042 Ref C: 2024-06-14T04:51:00Z' + status: + code: 200 + message: OK +- request: + body: '{"properties": {"resources": [{"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08"}], + "timeZone": "UTC", "triggerTime": "2021-09-01T00:00:00.000Z"}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Content-Length: + - '273' + Content-Type: + - application/json + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: PUT + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update","name":"CLI_test_report_update","type":"microsoft.appcomplianceautomation/reports","systemData":{"createdBy":"huiquanjiang@microsoft.com","createdByType":"User","createdAt":"2024-06-14T04:51:00.6865292Z","lastModifiedBy":"huiquanjiang@microsoft.com","lastModifiedByType":"User","lastModifiedAt":"2024-06-14T04:51:00.6865292Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"b8a0a0a0-0000-0000-0000-000000000000","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-15T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Accepted"}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/e4d0a05a-9f33-4895-9740-cd309b481063*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539374618271727&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=cS1tZVlHZPGXLpyDBlk_IRe1vz9qKcjaTCyQVbCAGqwZFxPrx3QgyL524Eoun27f2Qz4fsQDJf38BuHsDtYDeI-XA_w6QuCgkoobx7ySSOPUXPe54V3xQZPn4C-WYwaQWmN1XtFHQmmkIULE_F-gXe4_gt0eIEF3Cd-P6U5mAQU_MNVX76UTIXXwk0-FCOfZpaw0zFjTu_2lwpCQNh7QKSiQDErGMUw1X6xGcnxpKlhpgDDLBEE0hLzImkh9F_zN-vr7T93O6-ChD2cCX_jPwSjN2UuBzmSshrNn_T8YUkNP6bZ8kwsamTYTPNDz48LcnmFiQoe_lbkWLIIC9xO04g&h=bqIQR6CBBCXOwptxBd3s3UrM_dSxUPPmIn9U8VDGBOY + cache-control: + - no-store, no-cache + content-length: + - '1118' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:01 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/e4d0a05a-9f33-4895-9740-cd309b481063*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539374618427989&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=mKwu4xkJC2w6M5E2WKGAbJBGiyGKU2ew7YcSeOvevlJXyvd1sispFgPcatTVpFynb3IKfECHJ53bvLwXU7jFFrCVKAdlEU5nXV0i8cz5GQENDQNJaUn3kJDEIyHHNOU9_TUJ85_rZEurG6-es78hWgokHexQ5yVNGmn-t4LNH9yZn3_MvI-QemmAYpRyFfAUbDoZYIY3rw_BhG6iui7fY64ednbdMp287RWLQVIBBPr3HTL1s_8Kg8BLYVLDBHfs54OuyDQkDb9zpxLRVcBeLEDj8g3-lnRjnrlp6CJpcJ-gQyadzW1KayG7McnB7K_OUMFmJQ4hCDKeM1JdLi_JVg&h=xwNaFF1e6PSXSvQr1rJmYFxQXa4Q33HiYplhYEAP66E + mise-correlation-id: + - 7091b353-602e-4cf7-92d0-f47b08bb5f27 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045101Z-168779fcbd62qqz6d9ebhg58xc0000000ngg00000000x4vz + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 6c4da04f0ffda2d2037bdf484924a4d9 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: EBC9DD1F9A7E452DA76D6734C3A8464E Ref B: TYO201151006036 Ref C: 2024-06-14T04:51:00Z' + x-powered-by: + - ASP.NET + status: + code: 201 + message: Created +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/e4d0a05a-9f33-4895-9740-cd309b481063*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539374618271727&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=cS1tZVlHZPGXLpyDBlk_IRe1vz9qKcjaTCyQVbCAGqwZFxPrx3QgyL524Eoun27f2Qz4fsQDJf38BuHsDtYDeI-XA_w6QuCgkoobx7ySSOPUXPe54V3xQZPn4C-WYwaQWmN1XtFHQmmkIULE_F-gXe4_gt0eIEF3Cd-P6U5mAQU_MNVX76UTIXXwk0-FCOfZpaw0zFjTu_2lwpCQNh7QKSiQDErGMUw1X6xGcnxpKlhpgDDLBEE0hLzImkh9F_zN-vr7T93O6-ChD2cCX_jPwSjN2UuBzmSshrNn_T8YUkNP6bZ8kwsamTYTPNDz48LcnmFiQoe_lbkWLIIC9xO04g&h=bqIQR6CBBCXOwptxBd3s3UrM_dSxUPPmIn9U8VDGBOY + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/e4d0a05a-9f33-4895-9740-cd309b481063*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","name":"e4d0a05a-9f33-4895-9740-cd309b481063*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update","status":"Accepted","startTime":"2024-06-14T04:51:00.7856947Z"}' + headers: + cache-control: + - no-cache + content-length: + - '456' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:01 GMT + etag: + - '"0b018f02-0000-4d00-0000-666bcc340000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 86FCB90DB09B4C02AB37D59ADAE83F45 Ref B: TYO201151006036 Ref C: 2024-06-14T04:51:01Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/e4d0a05a-9f33-4895-9740-cd309b481063*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539374618271727&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=cS1tZVlHZPGXLpyDBlk_IRe1vz9qKcjaTCyQVbCAGqwZFxPrx3QgyL524Eoun27f2Qz4fsQDJf38BuHsDtYDeI-XA_w6QuCgkoobx7ySSOPUXPe54V3xQZPn4C-WYwaQWmN1XtFHQmmkIULE_F-gXe4_gt0eIEF3Cd-P6U5mAQU_MNVX76UTIXXwk0-FCOfZpaw0zFjTu_2lwpCQNh7QKSiQDErGMUw1X6xGcnxpKlhpgDDLBEE0hLzImkh9F_zN-vr7T93O6-ChD2cCX_jPwSjN2UuBzmSshrNn_T8YUkNP6bZ8kwsamTYTPNDz48LcnmFiQoe_lbkWLIIC9xO04g&h=bqIQR6CBBCXOwptxBd3s3UrM_dSxUPPmIn9U8VDGBOY + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/e4d0a05a-9f33-4895-9740-cd309b481063*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","name":"e4d0a05a-9f33-4895-9740-cd309b481063*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update","status":"Succeeded","startTime":"2024-06-14T04:51:00.7856947Z","endTime":"2024-06-14T04:51:02.614162Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '526' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:31 GMT + etag: + - '"0b019802-0000-4d00-0000-666bcc360000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 79930062233E47C3AD071514D215F81D Ref B: TYO201151006036 Ref C: 2024-06-14T04:51:32Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report create + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --resources --time-zone --trigger-time + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update","name":"CLI_test_report_update","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-14T04:47:28.3982219Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-14T04:49:06.5477146Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"b8a0a0a0-0000-0000-0000-000000000000","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-15T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1067' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:32 GMT + mise-correlation-id: + - 5e2f264b-674a-4ce5-880b-0a4561ee5ef2 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045132Z-r15f4699bb7z4vrvkkyy6vu91g0000000ne000000000p52c + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - a91215eefd2c13adaa496cd2574aa260 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: C698B860071E4DE287FC7C6D0D99B55C Ref B: TYO201151006036 Ref C: 2024-06-14T04:51:32Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"properties": {"offerGuid": "b8a0a0a0-0000-0000-0000-000000000000"}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report update + Connection: + - keep-alive + Content-Length: + - '69' + Content-Type: + - application/json + ParameterSetName: + - --report-name --offer-guid + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: PATCH + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update?api-version=2024-06-27 + response: + body: + string: 'null' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/006c9c60-6f8c-4969-b09e-e69ab5c6aee4*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539374951021361&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=kcP03jsG2LPbLg21UoxsV-69WPCRAsdwZmENSQwpSbSfTHEfWGqb6qv2QnJt-gnuzgsLFDlPaAjSHDp3E0S9JXi9gtXR56exrLi9K1HebX5TcQ12pjFhT3Hor6Ka05XFU1DhLgcwANUZSOjGNKo4yVR_r1MahuRYD4qd0WtMpJTVZtgr8yqmR6eRpEIVY9iKyJeKdI9JbfObPhsH2xPQtobT4yK10AxCd5M0fg6Jnw_iUmsn5hKxAQ8MN1SHuc2SN-YluGeGqQgyE-FsNojkOJM36J8zOaNTYWu9lek9jwGFKaAG8qfn_9l5WiChiQAVWoePLWxpZ9U1MK_rnURe1g&h=cAS6TC6blG-l_pXaYg1e_TBLKTjyxGtWBeyAJM4wuSM + cache-control: + - no-store, no-cache + content-length: + - '4' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:35 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/006c9c60-6f8c-4969-b09e-e69ab5c6aee4*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539374951176435&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=CdT6quLCnJJZG2eUnNbgUyTMkFZwhu1KloxmUcehjCfjiAeJdeplI0dRXpAlDz8ZAe6GUG3zm2zT6En437Nqe8kyKIcML8-B13IYsJQfqF3uZWq3AZc3r5L6CGLy0qbqoy9DdDPqWHfQJJJiuRnwX5cvkjhNAGIwcks4qbKl_J9cgUKSIA4df-6NSV6EEdKJNCwqJb9MqRzsyoLXzfGlH1ENnSt24_MuOCfNKqaMWcRWVPCRkSuoQGLIwGRnA_fojy1vuvGlHr9GYc_60Opp-lH6QlXX-qdHD9B62vVzTCptYYNVT8PAoUua5mDQerPFiocMS2mUDXjb35JYY7IMWg&h=cAab5x7JaRn7HYAvkt20ezFDs7YQx0mJsCLivmcvbgM + mise-correlation-id: + - ceee65a7-584e-45ea-a6ea-13d55319e64a + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045134Z-r15f4699bb7rfjmjupqcm1ntd800000001zg00000000vprh + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 0af32babcc92ea5729507c5352fb5f4a + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: FF2E84ECA51D4DC4A4D73427367FBE43 Ref B: TYO201151006060 Ref C: 2024-06-14T04:51:33Z' + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report update + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --offer-guid + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/006c9c60-6f8c-4969-b09e-e69ab5c6aee4*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539374951021361&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=kcP03jsG2LPbLg21UoxsV-69WPCRAsdwZmENSQwpSbSfTHEfWGqb6qv2QnJt-gnuzgsLFDlPaAjSHDp3E0S9JXi9gtXR56exrLi9K1HebX5TcQ12pjFhT3Hor6Ka05XFU1DhLgcwANUZSOjGNKo4yVR_r1MahuRYD4qd0WtMpJTVZtgr8yqmR6eRpEIVY9iKyJeKdI9JbfObPhsH2xPQtobT4yK10AxCd5M0fg6Jnw_iUmsn5hKxAQ8MN1SHuc2SN-YluGeGqQgyE-FsNojkOJM36J8zOaNTYWu9lek9jwGFKaAG8qfn_9l5WiChiQAVWoePLWxpZ9U1MK_rnURe1g&h=cAS6TC6blG-l_pXaYg1e_TBLKTjyxGtWBeyAJM4wuSM + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/006c9c60-6f8c-4969-b09e-e69ab5c6aee4*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","name":"006c9c60-6f8c-4969-b09e-e69ab5c6aee4*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update","status":"Accepted","startTime":"2024-06-14T04:51:34.0270603Z"}' + headers: + cache-control: + - no-cache + content-length: + - '456' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:51:35 GMT + etag: + - '"0b014904-0000-4d00-0000-666bcc560000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: D661B2361D62466EB2FC6A65881E5AC4 Ref B: TYO201151006060 Ref C: 2024-06-14T04:51:35Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report update + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --offer-guid + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/006c9c60-6f8c-4969-b09e-e69ab5c6aee4*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539374951021361&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=kcP03jsG2LPbLg21UoxsV-69WPCRAsdwZmENSQwpSbSfTHEfWGqb6qv2QnJt-gnuzgsLFDlPaAjSHDp3E0S9JXi9gtXR56exrLi9K1HebX5TcQ12pjFhT3Hor6Ka05XFU1DhLgcwANUZSOjGNKo4yVR_r1MahuRYD4qd0WtMpJTVZtgr8yqmR6eRpEIVY9iKyJeKdI9JbfObPhsH2xPQtobT4yK10AxCd5M0fg6Jnw_iUmsn5hKxAQ8MN1SHuc2SN-YluGeGqQgyE-FsNojkOJM36J8zOaNTYWu9lek9jwGFKaAG8qfn_9l5WiChiQAVWoePLWxpZ9U1MK_rnURe1g&h=cAS6TC6blG-l_pXaYg1e_TBLKTjyxGtWBeyAJM4wuSM + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/006c9c60-6f8c-4969-b09e-e69ab5c6aee4*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","name":"006c9c60-6f8c-4969-b09e-e69ab5c6aee4*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update","status":"Succeeded","startTime":"2024-06-14T04:51:34.0270603Z","endTime":"2024-06-14T04:51:36.3828848Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '527' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:52:05 GMT + etag: + - '"0b016a04-0000-4d00-0000-666bcc580000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 74D0325F12F14F15827309902D1256D9 Ref B: TYO201151006060 Ref C: 2024-06-14T04:52:05Z' + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report update + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --offer-guid + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update","name":"CLI_test_report_update","type":"Microsoft.AppComplianceAutomation/reports","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-14T04:47:28.3982219Z","lastModifiedBy":"","lastModifiedByType":"User","lastModifiedAt":"2024-06-14T04:49:06.5477146Z"},"properties":{"status":"Active","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","offerGuid":"b8a0a0a0-0000-0000-0000-000000000000","timeZone":"UTC","triggerTime":"2021-09-01T00:00:00Z","nextTriggerTime":"2024-06-15T00:00:00Z","subscriptions":["f744fbde-a95f-437e-8fcf-38f9324e3d9c"],"resources":[{"resourceId":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08","resourceType":"microsoft.compute/disks","resourceOrigin":null,"accountId":null}],"complianceStatus":{"m365":{"passedCount":0,"failedCount":0,"manualCount":0,"notApplicableCount":0,"pendingCount":0}},"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '1067' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:52:06 GMT + mise-correlation-id: + - 368d2a5e-453c-471d-958f-bcefe802ca43 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240614T045205Z-r15f4699bb7z4vrvkkyy6vu91g0000000nc000000000wmug + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - eff7a8af7ad01411209b193feb9dee01 + x-ms-providerhub-traffic: + - 'True' + x-msedge-ref: + - 'Ref A: CE2616528DC14CD1B38571FF7E3B2205 Ref B: TYO201151006060 Ref C: 2024-06-14T04:52:05Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Content-Length: + - '0' + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: DELETE + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update?api-version=2024-06-27 + response: + body: + string: 'null' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/05f2b2fc-7be0-491c-b032-b558c06440ff*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539375282256734&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=BN1pQoMKC2vYt8x6lviQm6dm5QIJrzVF1qp2N88mbBSWm3I_324bMktb0WkRReVRoV7s-WAs8H-oRUruzZ3BUq8Yy0QKgUbef90T209ID2V6tD8GE37XOBC03H7QFO7pLoMocuAqO8q7TnXAGE6ahOeIWDErevMvx9g72iR9v-ONy6ctB6n1jI-KoyStksDB5eDPOYfpugcHXCMDxyVgBojPCenVWUjcYg2oCJtugD-ADY1imK0IR6dO-hw-rHsWPPF6FF7gj0zGvjb57l9x4cbnG21xt5VY6nY9-Hkx2y9zpaz9ZI-2ws4IwXkG18Tpn5ETpvP3qo5cwAz05p6MDw&h=e2JmSU61kx8M-7TKp7uP1xjJ19HgS49Jzz2fH761C9o + cache-control: + - no-store, no-cache + content-length: + - '4' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:52:07 GMT + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/05f2b2fc-7be0-491c-b032-b558c06440ff*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539375282256734&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=BN1pQoMKC2vYt8x6lviQm6dm5QIJrzVF1qp2N88mbBSWm3I_324bMktb0WkRReVRoV7s-WAs8H-oRUruzZ3BUq8Yy0QKgUbef90T209ID2V6tD8GE37XOBC03H7QFO7pLoMocuAqO8q7TnXAGE6ahOeIWDErevMvx9g72iR9v-ONy6ctB6n1jI-KoyStksDB5eDPOYfpugcHXCMDxyVgBojPCenVWUjcYg2oCJtugD-ADY1imK0IR6dO-hw-rHsWPPF6FF7gj0zGvjb57l9x4cbnG21xt5VY6nY9-Hkx2y9zpaz9ZI-2ws4IwXkG18Tpn5ETpvP3qo5cwAz05p6MDw&h=e2JmSU61kx8M-7TKp7uP1xjJ19HgS49Jzz2fH761C9o + mise-correlation-id: + - 28c2342c-e62e-46cc-a1db-226483cde80f + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + x-azure-ref: + - 20240614T045207Z-168779fcbd6rx2r81454n660ps00000000c000000000059p + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 4b52edd41375c3ad6afa2e85355f7433 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-deletes: + - '14999' + x-msedge-ref: + - 'Ref A: 0EE913DD842045A0AD4A2DD176C1FE35 Ref B: TYO201151005060 Ref C: 2024-06-14T04:52:07Z' + x-powered-by: + - ASP.NET + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/05f2b2fc-7be0-491c-b032-b558c06440ff*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539375282256734&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=BN1pQoMKC2vYt8x6lviQm6dm5QIJrzVF1qp2N88mbBSWm3I_324bMktb0WkRReVRoV7s-WAs8H-oRUruzZ3BUq8Yy0QKgUbef90T209ID2V6tD8GE37XOBC03H7QFO7pLoMocuAqO8q7TnXAGE6ahOeIWDErevMvx9g72iR9v-ONy6ctB6n1jI-KoyStksDB5eDPOYfpugcHXCMDxyVgBojPCenVWUjcYg2oCJtugD-ADY1imK0IR6dO-hw-rHsWPPF6FF7gj0zGvjb57l9x4cbnG21xt5VY6nY9-Hkx2y9zpaz9ZI-2ws4IwXkG18Tpn5ETpvP3qo5cwAz05p6MDw&h=e2JmSU61kx8M-7TKp7uP1xjJ19HgS49Jzz2fH761C9o + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/05f2b2fc-7be0-491c-b032-b558c06440ff*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","name":"05f2b2fc-7be0-491c-b032-b558c06440ff*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update","status":"Running","startTime":"2024-06-14T04:52:07.1880004Z","error":{}}' + headers: + azure-asyncoperation: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/05f2b2fc-7be0-491c-b032-b558c06440ff*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539375284131720&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=TS-4SdS2-18ASfiykNcwsnQQZkmpQ4n6aA4-1S05VuG8yESCVtQJmMW0dayfJqrf4uP4cmqEVjx7JGBKSY1ke-2TASaXKrMizUNivLtShAOuBGleh7pNZEAL5MBU2ZeDjuLpyv57uRFK67JF4BmxWzL2kr8YCUxWqUb-PKdT-V8M5FEMpQzCaKZnSLGRs9HHmPZVuTmlhNprp9_NknsVn6muoYBmiuNrgsfk4keKYJAOYcmO9LEfM5OfXh0DwprFuJ8FiezudYT10kaSGApvQD69IuqJYm2Qb0Ucs4am7To2RuMSQbsNeVhmyocAHacLy5eUoHl1EuY046dwhXBADg&h=4_oYkU_JSbG55BxpK9SsGmvVNdYqndX1nLENAdPOg08 + cache-control: + - no-cache + content-length: + - '466' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:52:07 GMT + etag: + - '"0b012506-0000-4d00-0000-666bcc780000"' + expires: + - '-1' + location: + - https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/westus3/operationStatuses/05f2b2fc-7be0-491c-b032-b558c06440ff*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539375284131720&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=TS-4SdS2-18ASfiykNcwsnQQZkmpQ4n6aA4-1S05VuG8yESCVtQJmMW0dayfJqrf4uP4cmqEVjx7JGBKSY1ke-2TASaXKrMizUNivLtShAOuBGleh7pNZEAL5MBU2ZeDjuLpyv57uRFK67JF4BmxWzL2kr8YCUxWqUb-PKdT-V8M5FEMpQzCaKZnSLGRs9HHmPZVuTmlhNprp9_NknsVn6muoYBmiuNrgsfk4keKYJAOYcmO9LEfM5OfXh0DwprFuJ8FiezudYT10kaSGApvQD69IuqJYm2Qb0Ucs4am7To2RuMSQbsNeVhmyocAHacLy5eUoHl1EuY046dwhXBADg&h=4_oYkU_JSbG55BxpK9SsGmvVNdYqndX1nLENAdPOg08 + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: 9122B5E499C7470B8E28FE55777A9EB7 Ref B: TYO201151005060 Ref C: 2024-06-14T04:52:08Z' + status: + code: 202 + message: Accepted +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report delete + Connection: + - keep-alive + Cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390 + ParameterSetName: + - --report-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: GET + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/05f2b2fc-7be0-491c-b032-b558c06440ff*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932?api-version=2024-06-27&t=638539375282256734&c=MIIHhzCCBm-gAwIBAgITHgSTMYHP2krzC4KxewAABJMxgTANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwNTE3MTc0NjExWhcNMjUwNTEyMTc0NjExWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJUWS0ikqXTPq6avcNJnLuBoJVLLUjMZpNyvQilJ0RDJ4PRk8BRSNiwrkrKjeaE-epRUqAOsEasKTpi7j9Ax5NWjcRurexxj5QIMbCpLftpBwzkN9iBKyETYqOHQM_flgxIQF74OZD_Tiy2I1UCuXvt-m4ONdi5VEwEegjGUWmocxGlCQWRdPiY4Sw9P_MLOALop07i6j9OGlmo7euYrE-ft7bGA8aCTzrKrl8p1ih0_Xqm9OR4bm-nGBJM_V5ueUbLcV4sXcxGseaLDf_YX_ViaUHzx0DJEMYQahyQVK9YxwpT7U3z9Sm9PAFlrey08UWFcE4eFfY9RTceddPVPl0CAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBQWuWUI6AWtayBRWRM9dcR7rvVJIzAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMIGdBgNVHSAEgZUwgZIwDAYKKwYBBAGCN3sBATBmBgorBgEEAYI3ewICMFgwVgYIKwYBBQUHAgIwSh5IADMAMwBlADAAMQA5ADIAMQAtADQAZAA2ADQALQA0AGYAOABjAC0AYQAwADUANQAtADUAYgBkAGEAZgBmAGQANQBlADMAMwBkMAwGCisGAQQBgjd7AwEwDAYKKwYBBAGCN3sEATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBALmOEOSs0QwwDPea8xjQCTqaB0Oa1_yI1gSMhtRR1P0p_-LfmXqU_L0ZUrjWw8-cGr7sCaHcnc35GeM7thuGxqKS3eQBt7yuu8qWfnLiqX6VKZ2iDApMGJrZ-64pKwOcYgYnQ1juI2_gL5yB3GWIA3RyXfKBdvZcjvjoFRJKdHEmtBt_sKOT1J5eayOLUgP_ds8HgM9nkETomjdCuVahk8SXnCFrcqFNIuASV_pVdM1kdO_bRgKWaiISrE1ThDCa4q8OT3b1qHmqiBfW-GHjPJcJIG8xDR9Q-9_DtHh30Mf8IsYjotyzMexBPgd_c6AGQcZUYy8Mr_P7cHsbg9n8bfc&s=BN1pQoMKC2vYt8x6lviQm6dm5QIJrzVF1qp2N88mbBSWm3I_324bMktb0WkRReVRoV7s-WAs8H-oRUruzZ3BUq8Yy0QKgUbef90T209ID2V6tD8GE37XOBC03H7QFO7pLoMocuAqO8q7TnXAGE6ahOeIWDErevMvx9g72iR9v-ONy6ctB6n1jI-KoyStksDB5eDPOYfpugcHXCMDxyVgBojPCenVWUjcYg2oCJtugD-ADY1imK0IR6dO-hw-rHsWPPF6FF7gj0zGvjb57l9x4cbnG21xt5VY6nY9-Hkx2y9zpaz9ZI-2ws4IwXkG18Tpn5ETpvP3qo5cwAz05p6MDw&h=e2JmSU61kx8M-7TKp7uP1xjJ19HgS49Jzz2fH761C9o + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/locations/WESTUS3/operationStatuses/05f2b2fc-7be0-491c-b032-b558c06440ff*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","name":"05f2b2fc-7be0-491c-b032-b558c06440ff*656899527C01FF7A444939F1A69EB0F507F354FC69A749D44FDC6413D7DEC932","resourceId":"/providers/Microsoft.AppComplianceAutomation/reports/CLI_test_report_update","status":"Succeeded","startTime":"2024-06-14T04:52:07.1880004Z","endTime":"2024-06-14T04:52:08.598987Z","error":{},"properties":null}' + headers: + cache-control: + - no-cache + content-length: + - '526' + content-type: + - application/json; charset=utf-8 + date: + - Fri, 14 Jun 2024 04:52:37 GMT + etag: + - '"0b012e06-0000-4d00-0000-666bcc780000"' + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-msedge-ref: + - 'Ref A: AFD18B91F8D146128EFB05EDC864B7F1 Ref B: TYO201151005060 Ref C: 2024-06-14T04:52:38Z' + status: + code: 200 + message: OK +version: 1 diff --git a/src/acat/azext_acat/tests/latest/recordings/test_update_webhook.yaml b/src/acat/azext_acat/tests/latest/recordings/test_update_webhook.yaml new file mode 100644 index 00000000000..160bf0841f0 --- /dev/null +++ b/src/acat/azext_acat/tests/latest/recordings/test_update_webhook.yaml @@ -0,0 +1,204 @@ +interactions: +- request: + body: '{"properties": {"contentType": "application/json", "events": [], "payloadUrl": + "https://CLI-test", "sendAllEvents": "all", "enableSslVerification": "true", + "status": "enalbe", "webhookKey": "", "updateWebhookKey": "false"}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report webhook create + Connection: + - keep-alive + Content-Length: + - '223' + Content-Type: + - application/json + ParameterSetName: + - --report-name --webhook-name --payload-url + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: PUT + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_update?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_update","name":"CLI_test_webhook_update","type":"microsoft.appcomplianceautomation/reports/webhooks","systemData":{"createdBy":"huiquanjiang@microsoft.com","createdByType":"User","createdAt":"2024-06-17T02:40:53.0578099Z","lastModifiedBy":"huiquanjiang@microsoft.com","lastModifiedByType":"User","lastModifiedAt":"2024-06-17T02:40:53.0578099Z"},"properties":{"webhookId":"b804cd59-4530-4500-9443-8080e23169f8","status":"enalbe","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","sendAllEvents":"all","events":[],"payloadUrl":"https://CLI-test","contentType":"application/json","webhookKeyEnabled":"false","enableSslVerification":"true","deliveryStatus":"NotStarted","provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '824' + content-type: + - application/json; charset=utf-8 + date: + - Mon, 17 Jun 2024 02:40:53 GMT + mise-correlation-id: + - 97f71249-32ff-498d-b781-50e039c477ff + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240617T024053Z-168779fcbd6jws4h55a50s3m3n00000000p000000000y8ht + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - ed2ee5c6261dc5b9d915d63fc4069524 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: 988ABC2BD9B34830B5EEDE937E918E1D Ref B: TYO201100114027 Ref C: 2024-06-17T02:40:53Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: '{"properties": {"contentType": "application/json", "events": ["report_deletion"], + "payloadUrl": "https://CLI-test-update", "sendAllEvents": "false"}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report webhook update + Connection: + - keep-alive + Content-Length: + - '149' + Content-Type: + - application/json + ParameterSetName: + - --report-name --webhook-name --trigger-mode --events --payload-url + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: PATCH + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_update?api-version=2024-06-27 + response: + body: + string: '{"id":"/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_update","name":"CLI_test_webhook_update","type":"Microsoft.AppComplianceAutomation/reports/webhooks","systemData":{"createdBy":"","createdByType":"User","createdAt":"2024-06-17T02:36:34.2955592Z","lastModifiedBy":"","lastModifiedByType":"Application","lastModifiedAt":"2024-06-17T02:40:54.138Z"},"properties":{"webhookId":"b804cd59-4530-4500-9443-8080e23169f8","status":"enalbe","tenantId":"72f988bf-86f1-41af-91ab-2d7cd011db47","sendAllEvents":"false","events":["report_deletion"],"payloadUrl":"https://CLI-test-update","contentType":"application/json","webhookKeyEnabled":"false","enableSslVerification":"true","deliveryStatus":"NotStarted","provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-store, no-cache + content-length: + - '801' + content-type: + - application/json; charset=utf-8 + date: + - Mon, 17 Jun 2024 02:40:54 GMT + mise-correlation-id: + - d2808195-ea52-4257-9f78-8e6fe07656f3 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + vary: + - Accept-Encoding + x-azure-ref: + - 20240617T024054Z-168779fcbd6q9fsdpfkchp58as00000002ag000000013rrx + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 3a9a59dcb5a70e9dd6e9f205272e1ea7 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-writes: + - '1199' + x-msedge-ref: + - 'Ref A: F43798BA01BA4EF6A929DB5F4188B953 Ref B: TYO201100113051 Ref C: 2024-06-17T02:40:53Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +- request: + body: null + headers: + Accept: + - '*/*' + Accept-Encoding: + - gzip, deflate + CommandName: + - acat report webhook delete + Connection: + - keep-alive + Content-Length: + - '0' + ParameterSetName: + - --report-name --webhook-name --yes + User-Agent: + - AZURECLI/2.61.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + x-ms-aad-user-token: + - Bearer xxxxxxx + method: DELETE + uri: https://management.azure.com/providers/Microsoft.AppComplianceAutomation/reports/DoNotDelete-ExistingReportTesting-PROD/webhooks/CLI_test_webhook_update?api-version=2024-06-27 + response: + body: + string: 'null' + headers: + accept-ranges: + - bytes + cache-control: + - no-store, no-cache + content-length: + - '4' + content-type: + - application/json; charset=utf-8 + date: + - Mon, 17 Jun 2024 02:40:54 GMT + mise-correlation-id: + - e4227bfa-71da-401e-bd6a-aa4bf2a00cb7 + request-context: + - appId=cid-v1:7ecf4129-cb5b-4aab-a086-b332c76641c8 + set-cookie: + - ASLBSA=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + Path=/; Secure; HttpOnly; + - ASLBSACORS=0003e0d631e50fe5b18de31041272bd4dfc695db36017a24e6b4ca20c2747ec31390; + SameSite=none; Path=/; Secure; HttpOnly; + strict-transport-security: + - max-age=31536000; includeSubDomains + x-azure-ref: + - 20240617T024054Z-168779fcbd697tkrnxmggtfx4800000001w000000000h4ax + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-id: + - 2b94b191eb43e937c479fe8a6d400a00 + x-ms-providerhub-traffic: + - 'True' + x-ms-ratelimit-remaining-tenant-deletes: + - '14999' + x-msedge-ref: + - 'Ref A: D7E7A26528BA4F9AB4414CE1B4774B33 Ref B: TYO201100116017 Ref C: 2024-06-17T02:40:54Z' + x-powered-by: + - ASP.NET + status: + code: 200 + message: OK +version: 1 diff --git a/src/acat/azext_acat/tests/latest/test_acat.py b/src/acat/azext_acat/tests/latest/test_acat.py new file mode 100644 index 00000000000..0a3256ce833 --- /dev/null +++ b/src/acat/azext_acat/tests/latest/test_acat.py @@ -0,0 +1,13 @@ +# -------------------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# +# Code generated by aaz-dev-tools +# -------------------------------------------------------------------------------------------- + +from azure.cli.testsdk import * + + +class AcatScenario(ScenarioTest): + # TODO: add tests here + pass diff --git a/src/acat/azext_acat/tests/latest/test_acat_report.py b/src/acat/azext_acat/tests/latest/test_acat_report.py new file mode 100644 index 00000000000..8d40f6a08ee --- /dev/null +++ b/src/acat/azext_acat/tests/latest/test_acat_report.py @@ -0,0 +1,119 @@ +# -------------------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# +# Code generated by aaz-dev-tools +# -------------------------------------------------------------------------------------------- + +from azure.cli.testsdk import * +from azure.cli.testsdk.scenario_tests import AllowLargeResponse +import os.path + +class AcatReportScenario(ScenarioTest): + + def __init__(self, *args, **kwargs): + super(AcatReportScenario, self).__init__(*args, **kwargs) + self.kwargs.update({ + 'report_name_create': 'CLI_test_report_create', + 'report_name_update': 'CLI_test_report_update', + 'report_name_delete': 'CLI_test_report_delete', + 'report_name_snapshot': 'crstatustest-prod-20240617200351', + 'report_name_no_snapshot': 'CLI_test_report_no_snapshot', + 'offer_guid': 'b8a0a0a0-0000-0000-0000-000000000000', + 'resources': '[{"resource-id":"/subscriptions/f744fbde-a95f-437e-8fcf-38f9324e3d9c/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08"}]' + }) + + @AllowLargeResponse() + def test_list_report(self): + # acat report list + report_list = self.cmd('acat report list').get_output_in_json() + assert(len(report_list) > 0) + + def test_create_report(self): + # acat report create + report = self.cmd( + 'acat report create --report-name {report_name_create} --resources {resources} --time-zone "UTC" --trigger-time "2021-09-01T00:00:00Z"') + assert(report.get_output_in_json()[ + 'name'] == self.kwargs['report_name_create']) + report = self.cmd( + 'acat report show --report-name {report_name_create}') + assert(report.get_output_in_json()[ + 'name'] == self.kwargs['report_name_create']) + self.cmd('acat report delete --report-name {report_name_create} --yes') + + def test_update_report(self): + # acat report update + report = self.cmd( + 'acat report create --report-name {report_name_update} --resources {resources} --time-zone "UTC" --trigger-time "2021-09-01T00:00:00Z"') + assert(report.get_output_in_json()['name'] == self.kwargs['report_name_update']) + report = self.cmd( + 'acat report update --report-name {report_name_update} --offer-guid {offer_guid}') + assert(report.get_output_in_json()['offerGuid'] == self.kwargs['offer_guid']) + self.cmd('acat report delete --report-name {report_name_update} --yes') + + def test_delete_report(self): + # # acat report delete + report = self.cmd( + 'acat report create --report-name {report_name_delete} --resources {resources} --time-zone "UTC" --trigger-time "2021-09-01T00:00:00Z"') + assert(report.get_output_in_json()[ + 'name'] == self.kwargs["report_name_delete"]) + self.cmd('acat report delete --report-name {report_name_delete} --yes') + self.cmd( + 'acat report show --report-name {report_name_delete}', expect_failure=True) + + @AllowLargeResponse() + def test_download_report(self): + # acat report download + # prepare a report with a snapshot before running this case + report = self.cmd( + 'acat report show --report-name {report_name_snapshot}') + assert(report.get_output_in_json()['lastTriggerTime'] != None) + ret=self.cmd( + 'acat report download --report-name {report_name_snapshot} --download-type "CompliancePdfReport"') + # assest the downloaded file exists + assert(os.path.isfile(ret.output[20:-2])) + + report = self.cmd( + 'acat report show --report-name {report_name_snapshot}') + assert(report.get_output_in_json()['lastTriggerTime'] != None) + ret=self.cmd( + 'acat report download --report-name {report_name_snapshot} --download-type "ComplianceReport"') + # assest the downloaded file exists + assert(os.path.isfile(ret.output[20:-2])) + + report = self.cmd( + 'acat report show --report-name {report_name_snapshot}') + assert(report.get_output_in_json()['lastTriggerTime'] != None) + ret=self.cmd( + 'acat report download --report-name {report_name_snapshot} --download-type "ResourceList"') + # assest the downloaded file exists + assert(os.path.isfile(ret.output[20:-2])) + + @AllowLargeResponse() + def test_get_control_assessments(self): + # prepare a report with a snapshot before running this case + report = self.cmd( + 'acat report show --report-name {report_name_snapshot}') + assert(report.get_output_in_json()['lastTriggerTime'] != None) + ret=self.cmd( + 'acat report get-control-assessments --report-name {report_name_snapshot}') + output=ret.get_output_in_json() + assert(output != None) + assert(len(output) ==2) + assert(output[0]['controlFamilies'] != None) + assert(len(output[0]['controlFamilies']) ==13) + assert(output[1]['controlFamilies'] != None) + assert(len(output[1]['controlFamilies']) ==7) + + @AllowLargeResponse() + def test_get_control_assessments_no_snapshot(self): + report = self.cmd( + 'acat report create --report-name {report_name_no_snapshot} --resources {resources} --time-zone "UTC" --trigger-time "2021-09-01T00:00:00Z"') + assert(report.get_output_in_json().get('lastTriggerTime',None) == None) + ret=self.cmd( + 'acat report get-control-assessments --report-name {report_name_no_snapshot}') + print(ret) + output=ret.get_output_in_json() + assert(output != None) + assert(output=='No snapshot found') + self.cmd('acat report delete --report-name {report_name_no_snapshot} --yes') \ No newline at end of file diff --git a/src/acat/azext_acat/tests/latest/test_acat_trigger_evaluation.py b/src/acat/azext_acat/tests/latest/test_acat_trigger_evaluation.py new file mode 100644 index 00000000000..20a3a68f902 --- /dev/null +++ b/src/acat/azext_acat/tests/latest/test_acat_trigger_evaluation.py @@ -0,0 +1,31 @@ +# -------------------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# +# Code generated by aaz-dev-tools +# -------------------------------------------------------------------------------------------- + +from azure.cli.testsdk import * +from azure.cli.testsdk.scenario_tests import AllowLargeResponse + + +class AcatQuickEvaluationScenario(ScenarioTest): + + def __init__(self, *args, **kwargs): + super(AcatQuickEvaluationScenario, self).__init__(*args, **kwargs) + self.kwargs.update({ + 'resources': '["/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/mcatsandbox/providers/microsoft.web/sites/mcatsandboxapp"]' + }) + + @AllowLargeResponse() + def test_quick_evaluation(self): + # acat quick-evaluation + ret=self.cmd( + 'acat quick-evaluation --resource-ids {resources}') + output=ret.get_output_in_json() + print(output) + assert(output['properties'] != None) + assert(",".join(output['properties']['resourceIds']).lower() == ",".join(self.kwargs['resources'][2:-2].split('","')).lower()) + assert(len(output['properties']['quickAssessments']) >0) + assert(output['properties']['triggerTime'] != None) + diff --git a/src/acat/azext_acat/tests/latest/test_acat_webhook.py b/src/acat/azext_acat/tests/latest/test_acat_webhook.py new file mode 100644 index 00000000000..66a81421224 --- /dev/null +++ b/src/acat/azext_acat/tests/latest/test_acat_webhook.py @@ -0,0 +1,76 @@ +# -------------------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the MIT License. See License.txt in the project root for license information. +# +# Code generated by aaz-dev-tools +# -------------------------------------------------------------------------------------------- + +from azure.cli.testsdk import * +from azure.cli.testsdk.scenario_tests import AllowLargeResponse + + +class AcatReportScenario(ScenarioTest): + + # @ResourceGroupPreparer() + # @StorageAccountPreparer() + # def test_list_storage_accounts(self, storage_account): + # accounts = self.cmd('az storage account list').get_output_in_json() + # search = [account for account in accounts if account['name'] + # == storage_account] + # assert len(search) == 1 + + def __init__(self, *args, **kwargs): + super(AcatReportScenario, self).__init__(*args, **kwargs) + self.kwargs.update({ + 'report_name_webhook': 'DoNotDelete-ExistingReportTesting-PROD', + 'webhook_name_create': 'CLI_test_webhook_create', + 'webhook_name_update': 'CLI_test_webhook_update', + 'webhook_name_delete': 'CLI_test_webhook_delete', + 'resources': '[{"resource-id":"/subscriptions/25d4753f-341d-4ce7-8641-646cf928294c/resourceGroups/HQTESTRG/providers/Microsoft.Compute/disks/hqtestvm_OsDisk_1_90a1250135fa4cbca9b99f553b80fa08"}]' + }) + + + def test_create_webhook(self): + # acat report create + webhook = self.cmd( + 'acat report webhook create --report-name {report_name_webhook} --webhook-name {webhook_name_create} --payload-url https://CLI-test') + assert(webhook.get_output_in_json()[ + 'name'] == self.kwargs['webhook_name_create']) + webhook_list = self.cmd('acat report webhook list --report-name {report_name_webhook}').get_output_in_json() + assert(len(webhook_list) > 0) + webhook = self.cmd( + 'acat report webhook show --report-name {report_name_webhook} --webhook-name {webhook_name_create}') + assert(webhook.get_output_in_json()[ + 'name'] == self.kwargs['webhook_name_create']) + self.cmd( + 'acat report webhook delete --report-name {report_name_webhook} --webhook-name {webhook_name_create} --yes') + + def test_update_webhook(self): + # Arrange + webhook = self.cmd( + 'acat report webhook create --report-name {report_name_webhook} --webhook-name {webhook_name_update} --payload-url https://CLI-test') + + # Act + assert(webhook.get_output_in_json()[ + 'name'] == self.kwargs['webhook_name_update']) + assert(webhook.get_output_in_json()['payloadUrl'] == "https://CLI-test") + webhook = self.cmd( + 'acat report webhook update --report-name {report_name_webhook} --webhook-name {webhook_name_update} --trigger-mode customize --events ["report_deletion"] --payload-url https://CLI-test-update') + + # Assert + assert(webhook.get_output_in_json()['sendAllEvents'] == "false") + assert(webhook.get_output_in_json()['events'][0] == "report_deletion") + assert(webhook.get_output_in_json()['payloadUrl'] == "https://CLI-test-update") + self.cmd( + 'acat report webhook delete --report-name {report_name_webhook} --webhook-name {webhook_name_update} --yes') + + def test_delete_webhook(self): + # # acat report webhook delete + webhook = self.cmd( + 'acat report webhook create --report-name {report_name_webhook} --webhook-name {webhook_name_delete} --payload-url https://CLI-test') + assert(webhook.get_output_in_json()[ + 'name'] == self.kwargs["webhook_name_delete"]) + self.cmd( + 'acat report webhook delete --report-name {report_name_webhook} --webhook-name {webhook_name_delete} --yes') + self.cmd( + 'acat report webhook show --report-name {report_name_webhook} --webhook-name {webhook_name_delete}', expect_failure=True)