JSON
api-version=2023-04-01
Copy definition Copy definition 4 EPAC EPAC
{ 9 items displayName: "[Deprecated]: Azure Security Benchmark v1" , policyType: "BuiltIn" , description: "This initiative has been deprecated. The Azure Security Benchmark initiative now represents the Azure Security Benchmark v2 controls, and serves as the Azure Security Center default policy initiative. Please assign that initiative, or manage its policies and compliance results within Azure Security Center." , metadata: { 3 items version: "14.8.0-deprecated" , deprecated: true , category: "Regulatory Compliance" } , version: "14.8.0" , parameters: { 14 items IncludeArcMachines: { 4 items type: "String" , metadata: { 2 items displayName: "Include Arc connected servers for Guest Configuration policies" , description: "Optionally choose to audit settings inside Arc connected servers using Guest Configuration policies. By selecting this option, you agree to be charged monthly per Arc connected machine." } , allowedValues: [ 2 items ] , defaultValue: "false" } , listOfMembersToExcludeFromWindowsVMAdministratorsGroup: { 2 items type: "String" , metadata: { 2 items displayName: "List of users excluded from Windows VM Administrators group" , description: "A semicolon-separated list of members that should be excluded in the Administrators local group. Ex: Administrator; myUser1; myUser2" } } , listOfMembersToIncludeInWindowsVMAdministratorsGroup: { 2 items type: "String" , metadata: { 2 items displayName: "List of users that must be included in Windows VM Administrators group" , description: "A semicolon-separated list of members that should be included in the Administrators local group. Ex: Administrator; myUser1; myUser2" } } , listOfOnlyMembersInWindowsVMAdministratorsGroup: { 2 items type: "String" , metadata: { 2 items displayName: "List of users that Windows VM Administrators group must *only* include" , description: "A semicolon-separated list of all the expected members of the Administrators local group. Ex: Administrator; myUser1; myUser2" } } , listOfRegionsWhereNetworkWatcherShouldBeEnabled: { 3 items type: "Array" , metadata: { 4 items displayName: "[Deprecated]: List of regions where Network Watcher should be enabled" , description: "To see a complete list of regions use Get-AzLocation" , strongType: "location" , deprecated: true } , defaultValue: [ 41 items "australiacentral" , "australiacentral2" , "australiaeast" , "australiasoutheast" , "brazilsouth" , "canadacentral" , "canadaeast" , "centralindia" , "centralus" , "eastasia" , "eastus" , "eastus2" , "francecentral" , "francesouth" , "germanynorth" , "germanywestcentral" , "global" , "japaneast" , "japanwest" , "koreacentral" , "koreasouth" , "northcentralus" , "northeurope" , "norwayeast" , "norwaywest" , "southafricanorth" , "southafricawest" , "southcentralus" , "southeastasia" , "southindia" , "switzerlandnorth" , "switzerlandwest" , "uaecentral" , "uaenorth" , "uksouth" , "ukwest" , "westcentralus" , "westeurope" , "westindia" , "westus" , "westus2" ] } , NetworkWatcherResourceGroupName: { 3 items type: "String" , metadata: { 2 items displayName: "NetworkWatcher resource group name" , description: "Name of the resource group of NetworkWatcher, such as NetworkWatcherRG" } , defaultValue: "NetworkWatcherRG" } , approvedVirtualNetworkForVMs: { 2 items type: "String" , metadata: { 3 items displayName: "Virtual network where VMs should be connected" , description: "Example: /subscriptions/YourSubscriptionId/resourceGroups/YourResourceGroupName/providers/Microsoft.Network/virtualNetworks/Name" , strongType: "Microsoft.Network/virtualNetworks" } } , approvedNetworkGatewayforVirtualNetworks: { 2 items type: "String" , metadata: { 3 items displayName: "Network gateway that virtual networks should use" , description: "Example: /subscriptions/YourSubscriptionId/resourceGroups/YourResourceGroup/providers/Microsoft.Network/virtualNetworkGateways/Name" , strongType: "Microsoft.Network/virtualNetworkGateways" } } , listOfWorkspaceIDsForLogAnalyticsAgent: { 2 items type: "String" , metadata: { 2 items displayName: "List of workspace IDs where Log Analytics agents should connect" , description: "A semicolon-separated list of the workspace IDs that the Log Analytics agent should be connected to" } } , listOfResourceTypesWithDiagnosticLogsEnabled: { 4 items type: "Array" , metadata: { 2 items displayName: "List of resource types that should have resource logs enabled" , description: "Audit diagnostic setting for selected resource types" } , allowedValues: [ 46 items "Microsoft.AnalysisServices/servers" , "Microsoft.ApiManagement/service" , "Microsoft.Network/applicationGateways" , "Microsoft.Automation/automationAccounts" , "Microsoft.ContainerInstance/containerGroups" , "Microsoft.ContainerRegistry/registries" , "Microsoft.ContainerService/managedClusters" , "Microsoft.Batch/batchAccounts" , "Microsoft.Cdn/profiles/endpoints" , "Microsoft.CognitiveServices/accounts" , "Microsoft.DocumentDB/databaseAccounts" , "Microsoft.DataFactory/factories" , "Microsoft.DataLakeAnalytics/accounts" , "Microsoft.DataLakeStore/accounts" , "Microsoft.EventGrid/eventSubscriptions" , "Microsoft.EventGrid/topics" , "Microsoft.EventHub/namespaces" , "Microsoft.Network/expressRouteCircuits" , "Microsoft.Network/azureFirewalls" , "Microsoft.HDInsight/clusters" , "Microsoft.Devices/IotHubs" , "Microsoft.KeyVault/vaults" , "Microsoft.Network/loadBalancers" , "Microsoft.Logic/integrationAccounts" , "Microsoft.Logic/workflows" , "Microsoft.DBforMySQL/servers" , "Microsoft.Network/networkInterfaces" , "Microsoft.Network/networkSecurityGroups" , "Microsoft.DBforPostgreSQL/servers" , "Microsoft.PowerBIDedicated/capacities" , "Microsoft.Network/publicIPAddresses" , "Microsoft.RecoveryServices/vaults" , "Microsoft.Cache/redis" , "Microsoft.Relay/namespaces" , "Microsoft.Search/searchServices" , "Microsoft.ServiceBus/namespaces" , "Microsoft.SignalRService/SignalR" , "Microsoft.Sql/servers/databases" , "Microsoft.Sql/servers/elasticPools" , "Microsoft.StreamAnalytics/streamingjobs" , "Microsoft.TimeSeriesInsights/environments" , "Microsoft.Network/trafficManagerProfiles" , "Microsoft.Compute/virtualMachines" , "Microsoft.Compute/virtualMachineScaleSets" , "Microsoft.Network/virtualNetworks" , "Microsoft.Network/virtualNetworkGateways" ] , defaultValue: [ 46 items "Microsoft.AnalysisServices/servers" , "Microsoft.ApiManagement/service" , "Microsoft.Network/applicationGateways" , "Microsoft.Automation/automationAccounts" , "Microsoft.ContainerInstance/containerGroups" , "Microsoft.ContainerRegistry/registries" , "Microsoft.ContainerService/managedClusters" , "Microsoft.Batch/batchAccounts" , "Microsoft.Cdn/profiles/endpoints" , "Microsoft.CognitiveServices/accounts" , "Microsoft.DocumentDB/databaseAccounts" , "Microsoft.DataFactory/factories" , "Microsoft.DataLakeAnalytics/accounts" , "Microsoft.DataLakeStore/accounts" , "Microsoft.EventGrid/eventSubscriptions" , "Microsoft.EventGrid/topics" , "Microsoft.EventHub/namespaces" , "Microsoft.Network/expressRouteCircuits" , "Microsoft.Network/azureFirewalls" , "Microsoft.HDInsight/clusters" , "Microsoft.Devices/IotHubs" , "Microsoft.KeyVault/vaults" , "Microsoft.Network/loadBalancers" , "Microsoft.Logic/integrationAccounts" , "Microsoft.Logic/workflows" , "Microsoft.DBforMySQL/servers" , "Microsoft.Network/networkInterfaces" , "Microsoft.Network/networkSecurityGroups" , "Microsoft.DBforPostgreSQL/servers" , "Microsoft.PowerBIDedicated/capacities" , "Microsoft.Network/publicIPAddresses" , "Microsoft.RecoveryServices/vaults" , "Microsoft.Cache/redis" , "Microsoft.Relay/namespaces" , "Microsoft.Search/searchServices" , "Microsoft.ServiceBus/namespaces" , "Microsoft.SignalRService/SignalR" , "Microsoft.Sql/servers/databases" , "Microsoft.Sql/servers/elasticPools" , "Microsoft.StreamAnalytics/streamingjobs" , "Microsoft.TimeSeriesInsights/environments" , "Microsoft.Network/trafficManagerProfiles" , "Microsoft.Compute/virtualMachines" , "Microsoft.Compute/virtualMachineScaleSets" , "Microsoft.Network/virtualNetworks" , "Microsoft.Network/virtualNetworkGateways" ] } , PHPLatestVersion: { 3 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Latest PHP version" , description: "Latest supported PHP version for App Services" , deprecated: true } , defaultValue: "7.3" } , JavaLatestVersion: { 3 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Latest Java version" , description: "Latest supported Java version for App Services" , deprecated: true } , defaultValue: "11" } , WindowsPythonLatestVersion: { 3 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Latest Windows Python version" , description: "Latest supported Python version for App Services" , deprecated: true } , defaultValue: "3.6" } , LinuxPythonLatestVersion: { 3 items type: "String" , metadata: { 3 items displayName: "[Deprecated]: Latest Linux Python version" , description: "Latest supported Python version for App Services" , deprecated: true } , defaultValue: "3.8" } } , policyDefinitions: [ 107 items { 5 items policyDefinitionReferenceId: "013e242c-8828-4970-87b3-ab247555486d" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/013e242c-8828-4970-87b3-ab247555486d Azure Backup should be enabled for Virtual Machines , definitionVersion: 3.*.*3.0.0 , parameters: {} , groupNames: [ 2 items "Azure_Security_Benchmark_v1.0_9.1" , "Azure_Security_Benchmark_v1.0_9.2" ] } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items policyDefinitionReferenceId: "0b60c0b2-2dc2-4e1c-b5c9-abbed971de53" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/0b60c0b2-2dc2-4e1c-b5c9-abbed971de53 Key vaults should have deletion protection enabled , definitionVersion: 2.*.*2.1.0 , parameters: {} , groupNames: [ 2 items "Azure_Security_Benchmark_v1.0_7.11" , "Azure_Security_Benchmark_v1.0_9.4" ] } , { 5 items } , { 5 items policyDefinitionReferenceId: "0da106f2-4ca3-48e8-bc85-c638fe6aea8f" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/0da106f2-4ca3-48e8-bc85-c638fe6aea8f Function apps should use managed identity , definitionVersion: 3.*.*3.0.0 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_7.12" ] } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items policyDefinitionReferenceId: "2b9ad585-36bc-4615-b300-fd4435808332" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/2b9ad585-36bc-4615-b300-fd4435808332 App Service apps should use managed identity , definitionVersion: 3.*.*3.0.0 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_7.12" ] } , { 5 items } , { 5 items } , { 5 items } , { 5 items policyDefinitionReferenceId: "34f95f76-5386-4de7-b824-0d8478470c9d" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/34f95f76-5386-4de7-b824-0d8478470c9d Resource logs in Logic Apps should be enabled , definitionVersion: 5.*.*5.1.0 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_2.3" ] } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items policyDefinitionReferenceId: "383856f8-de7f-44a2-81fc-e5135b5c2aa4" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/383856f8-de7f-44a2-81fc-e5135b5c2aa4 Resource logs in IoT Hub should be enabled , definitionVersion: 3.*.*3.1.0 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_2.3" ] } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items policyDefinitionReferenceId: "83a214f7-d01a-484b-91a9-ed54470c9a6a" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/83a214f7-d01a-484b-91a9-ed54470c9a6a Resource logs in Event Hub should be enabled , definitionVersion: 5.*.*5.0.0 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_2.3" ] } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items policyDefinitionReferenceId: "a451c1ef-c6ca-483d-87ed-f49761e3ffb5" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/a451c1ef-c6ca-483d-87ed-f49761e3ffb5 Audit usage of custom RBAC roles , definitionVersion: 1.*.*1.0.1 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_4.6" ] } , { 5 items } , { 5 items policyDefinitionReferenceId: "a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 Auditing on SQL server should be enabled , definitionVersion: 2.*.*2.0.0 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_2.3" ] } , { 5 items policyDefinitionReferenceId: "a7aca53f-2ed4-4466-a25e-0b45ade68efd" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/a7aca53f-2ed4-4466-a25e-0b45ade68efd Azure DDoS Protection should be enabled , definitionVersion: 3.*.*3.0.1 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_1.4" ] } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items policyDefinitionReferenceId: "cf820ca0-f99e-4f3e-84fb-66e913812d21" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/cf820ca0-f99e-4f3e-84fb-66e913812d21 Resource logs in Key Vault should be enabled , definitionVersion: 5.*.*5.0.0 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_2.3" ] } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items policyDefinitionReferenceId: "f8d36e2f-389b-4ee4-898d-21aeb69a0f45" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/f8d36e2f-389b-4ee4-898d-21aeb69a0f45 Resource logs in Service Bus should be enabled , definitionVersion: 5.*.*5.0.0 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_2.3" ] } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items } , { 5 items policyDefinitionReferenceId: "399b2637-a50f-4f95-96f8-3a145476eb15" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/399b2637-a50f-4f95-96f8-3a145476eb15 Function apps should require FTPS only , definitionVersion: 3.*.*3.0.0 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_4.4" ] } , { 5 items policyDefinitionReferenceId: "4d24b6d4-5e53-4a4f-a7f4-618fa573ee4b" , policyDefinitionId: /providers/Microsoft.Authorization/policyDefinitions/4d24b6d4-5e53-4a4f-a7f4-618fa573ee4b App Service apps should require FTPS only , definitionVersion: 3.*.*3.0.0 , parameters: {} , groupNames: [ 1 item "Azure_Security_Benchmark_v1.0_4.4" ] } ] , policyDefinitionGroups: [ 88 items { 2 items name: "Azure_Security_Benchmark_v1.0_1.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_1.2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.2" } , { 2 items name: "Azure_Security_Benchmark_v1.0_1.3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.3" } , { 2 items name: "Azure_Security_Benchmark_v1.0_1.4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.4" } , { 2 items name: "Azure_Security_Benchmark_v1.0_1.5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.5" } , { 2 items name: "Azure_Security_Benchmark_v1.0_1.6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.6" } , { 2 items name: "Azure_Security_Benchmark_v1.0_1.7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.7" } , { 2 items name: "Azure_Security_Benchmark_v1.0_1.8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.8" } , { 2 items name: "Azure_Security_Benchmark_v1.0_1.9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.9" } , { 2 items name: "Azure_Security_Benchmark_v1.0_1.10" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.10" } , { 2 items name: "Azure_Security_Benchmark_v1.0_1.11" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_1.11" } , { 2 items name: "Azure_Security_Benchmark_v1.0_2.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_2.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_2.2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_2.2" } , { 2 items name: "Azure_Security_Benchmark_v1.0_2.3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_2.3" } , { 2 items name: "Azure_Security_Benchmark_v1.0_2.4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_2.4" } , { 2 items name: "Azure_Security_Benchmark_v1.0_2.5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_2.5" } , { 2 items name: "Azure_Security_Benchmark_v1.0_2.6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_2.6" } , { 2 items name: "Azure_Security_Benchmark_v1.0_2.7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_2.7" } , { 2 items name: "Azure_Security_Benchmark_v1.0_2.8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_2.8" } , { 2 items name: "Azure_Security_Benchmark_v1.0_2.9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_2.9" } , { 2 items name: "Azure_Security_Benchmark_v1.0_2.10" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_2.10" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.2" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.3" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.4" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.5" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.6" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.7" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.8" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.9" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.10" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.10" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.11" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.11" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.12" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.12" } , { 2 items name: "Azure_Security_Benchmark_v1.0_3.13" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_3.13" } , { 2 items name: "Azure_Security_Benchmark_v1.0_4.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_4.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_4.2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_4.2" } , { 2 items name: "Azure_Security_Benchmark_v1.0_4.3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_4.3" } , { 2 items name: "Azure_Security_Benchmark_v1.0_4.4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_4.4" } , { 2 items name: "Azure_Security_Benchmark_v1.0_4.5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_4.5" } , { 2 items name: "Azure_Security_Benchmark_v1.0_4.6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_4.6" } , { 2 items name: "Azure_Security_Benchmark_v1.0_4.7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_4.7" } , { 2 items name: "Azure_Security_Benchmark_v1.0_4.8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_4.8" } , { 2 items name: "Azure_Security_Benchmark_v1.0_4.9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_4.9" } , { 2 items name: "Azure_Security_Benchmark_v1.0_5.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_5.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_5.2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_5.2" } , { 2 items name: "Azure_Security_Benchmark_v1.0_5.3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_5.3" } , { 2 items name: "Azure_Security_Benchmark_v1.0_5.4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_5.4" } , { 2 items name: "Azure_Security_Benchmark_v1.0_5.5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_5.5" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.2" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.3" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.4" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.5" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.6" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.7" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.8" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.9" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.10" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.10" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.11" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.11" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.12" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.12" } , { 2 items name: "Azure_Security_Benchmark_v1.0_6.13" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_6.13" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.2" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.3" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.4" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.5" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.6" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.7" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.7" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.8" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.8" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.9" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.9" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.10" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.10" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.11" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.11" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.12" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.12" } , { 2 items name: "Azure_Security_Benchmark_v1.0_7.13" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_7.13" } , { 2 items name: "Azure_Security_Benchmark_v1.0_8.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_8.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_8.2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_8.2" } , { 2 items name: "Azure_Security_Benchmark_v1.0_8.3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_8.3" } , { 2 items name: "Azure_Security_Benchmark_v1.0_9.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_9.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_9.2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_9.2" } , { 2 items name: "Azure_Security_Benchmark_v1.0_9.3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_9.3" } , { 2 items name: "Azure_Security_Benchmark_v1.0_9.4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_9.4" } , { 2 items name: "Azure_Security_Benchmark_v1.0_10.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_10.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_10.2" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_10.2" } , { 2 items name: "Azure_Security_Benchmark_v1.0_10.4" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_10.4" } , { 2 items name: "Azure_Security_Benchmark_v1.0_10.5" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_10.5" } , { 2 items name: "Azure_Security_Benchmark_v1.0_10.6" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_10.6" } , { 2 items name: "Azure_Security_Benchmark_v1.0_11.1" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_11.1" } , { 2 items name: "Azure_Security_Benchmark_v1.0_10.3" , additionalMetadataId: "/providers/Microsoft.PolicyInsights/policyMetadata/Azure_Security_Benchmark_v1.0_10.3" } ] , versions: [ 7 items "14.8.0" , "14.7.0" , "14.6.0" , "14.5.0" , "14.4.0" , "14.3.0" , "14.2.0" ] }