last sync: 2021-Jul-08 14:19:52 UTC

Azure Policy Initiative

[Preview]: NIST SP 800-53 Rev. 5

Name[Preview]: NIST SP 800-53 Rev. 5
Azure Portal
Id179d1daa-458f-4e47-8086-2a68d0d6c38f
Version1.0.0-preview
details on versioning
CategoryRegulatory Compliance
Microsoft docs
DescriptionThis initiative includes policies that address a subset of NIST SP 800-53 Rev. 5 controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/nist800-53r5-initiative.
TypeBuiltIn
DeprecatedFalse
PreviewTrue
History
Date/Time (UTC ymd) (i) Changes
2021-07-08 14:19:52 add Initiative 179d1daa-458f-4e47-8086-2a68d0d6c38f
Policy count Total Policies: 263
Builtin Policies: 263
Static Policies: 0
Policy used
Policy DisplayName Policy Id Category Effect State
[Preview]: All Internet traffic should be routed via your deployed Azure Firewall fc5e4038-4584-4632-8c85-c0448d374b2c Network Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Preview
[Preview]: Azure Arc enabled Kubernetes clusters should have Azure Defender's extension installed 8dfab9c4-fe7b-49ad-85e4-1e9be085358f Kubernetes Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Preview
[Preview]: Azure Defender for DNS should be enabled bdc59948-5574-49b3-bb91-76b7c986428d Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Preview
[Preview]: Azure Key Vault should disable public network access 55615ac9-af46-4a59-874e-391cc3dfb490 Key Vault Default: Audit
Allowed: (Audit, Deny, Disabled)
Preview
[Preview]: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data 2e94d99a-8a36-4563-bc77-810d8893b671 Backup Default: Audit
Allowed: (Audit, Deny, Disabled)
Preview
[Preview]: Certificates should have the specified maximum validity period 0a075868-4c26-42ef-914c-5bc007359560 Key Vault Default: audit
Allowed: (audit, deny, disabled)
Preview
[Preview]: IoT Hub device provisioning service data should be encrypted using customer-managed keys (CMK) 47031206-ce96-41f8-861b-6a915f3de284 Internet of Things Default: Audit
Allowed: (Audit, Deny, Disabled)
Preview
[Preview]: Key Vault keys should have an expiration date 152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0 Key Vault Default: Audit
Allowed: (Audit, Deny, Disabled)
Preview
[Preview]: Key Vault secrets should have an expiration date 98728c90-32c7-4049-8429-847dc0f4fe37 Key Vault Default: Audit
Allowed: (Audit, Deny, Disabled)
Preview
[Preview]: Linux machines should meet requirements for the Azure compute security baseline fc9b3da7-8347-4380-8e70-0a0361d8dedd Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Preview
[Preview]: Log Analytics agent should be installed on your Linux Azure Arc machines 842c54e8-c2f9-4d79-ae8d-38d8b8019373 Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Preview
[Preview]: Log Analytics agent should be installed on your Windows Azure Arc machines d69b1763-b96d-40b8-a2d9-ca31e9fd0d3e Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Preview
[Preview]: Network traffic data collection agent should be installed on Linux virtual machines 04c4380f-3fae-46e8-96c9-30193528f602 Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Preview
[Preview]: Network traffic data collection agent should be installed on Windows virtual machines 2f2ee1de-44aa-4762-b6bd-0893fc3f306d Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Preview
[Preview]: Private endpoint should be configured for Key Vault 5f0bc445-3935-4915-9981-011aa2b46147 Key Vault Default: Audit
Allowed: (Audit, Deny, Disabled)
Preview
[Preview]: Sensitive data in your SQL databases should be classified cc9835f2-9f6b-4cc8-ab4a-f8ef615eb349 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Preview
[Preview]: Storage account public access should be disallowed 4fa4b6c0-31ca-4c0d-b10d-24b96f62a751 Storage Default: audit
Allowed: (audit, deny, disabled)
Preview
[Preview]: Windows machines should meet requirements of the Azure compute security baseline 72650e9f-97bc-4b2a-ab5f-9781a9fcecbc Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
Preview
A maximum of 3 owners should be designated for your subscription 4f11b553-d42e-4e3a-89be-32ca364cad4c Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
A vulnerability assessment solution should be enabled on your virtual machines 501541f7-f7e7-4cd6-868c-4190fdad3ac9 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Adaptive application controls for defining safe applications should be enabled on your machines 47a6b606-51aa-4496-8bb7-64b11cf66adc Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Adaptive network hardening recommendations should be applied on internet facing virtual machines 08e6af2d-db70-460a-bfe9-d5bd474ba9d6 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Add system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identities 3cf2ab00-13f1-4d0c-8971-2ac904541a7e Guest Configuration Fixed: modify GA
Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identity 497dff13-db2a-4c0f-8603-28fa3b331ab6 Guest Configuration Fixed: modify GA
All network ports should be restricted on network security groups associated to your virtual machine 9daedab3-fb2d-461e-b861-71790eead4f6 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Allowlist rules in your adaptive application control policy should be updated 123a3936-f020-408a-ba0c-47873faf1534 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
An Azure Active Directory administrator should be provisioned for SQL servers 1f314764-cb73-4fc9-b863-8eca98ac36e9 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
API App should only be accessible over HTTPS b7ddfbdc-1260-477d-91fd-98bd9be789a6 App Service Default: Audit
Allowed: (Audit, Disabled)
GA
API Management services should use a virtual network ef619a2c-cc4d-4d03-b2ba-8c94a834d85b API Management Default: Audit
Allowed: (Audit, Disabled)
GA
App Configuration should use private link ca610c1d-041c-4332-9d88-7ed3094967c7 App Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
App Service Environment should enable internal encryption fb74e86f-d351-4b8d-b034-93da7391c01f App Service Default: Audit
Allowed: (Audit, Disabled)
GA
Audit Linux machines that allow remote connections from accounts without passwords ea53dbee-c6c9-4f0e-9f9e-de0039b78023 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Audit Linux machines that do not have the passwd file permissions set to 0644 e6955644-301c-44b5-a4c4-528577de6861 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Audit Linux machines that have accounts without passwords f6ec09a3-78bf-4f8f-99dc-6c77182d0f99 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Audit usage of custom RBAC rules a451c1ef-c6ca-483d-87ed-f49761e3ffb5 General Default: Audit
Allowed: (Audit, Disabled)
GA
Audit virtual machines without disaster recovery configured 0015ea4d-51ff-4ce3-8d8c-f3f8f0179a56 Compute Fixed: auditIfNotExists GA
Audit Windows machines that allow re-use of the previous 24 passwords 5b054a0d-39e2-4d53-bea3-9734cad2c69b Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Audit Windows machines that do not have a maximum password age of 70 days 4ceb8dc2-559c-478b-a15b-733fbf1e3738 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Audit Windows machines that do not have a minimum password age of 1 day 237b38db-ca4d-4259-9e47-7882441ca2c0 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Audit Windows machines that do not have the password complexity setting enabled bf16e0bb-31e1-4646-8202-60a235cc7e74 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Audit Windows machines that do not restrict the minimum password length to 14 characters a2d0e922-65d0-40c4-8f87-ea6da2d307a2 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Audit Windows machines that do not store passwords using reversible encryption da0f98fe-a24b-4ad5-af69-bd0400233661 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Auditing on SQL server should be enabled a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Authentication to Linux machines should require SSH keys 630c64f9-8b6b-4c64-b511-6544ceff6fd6 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Authorized IP ranges should be defined on Kubernetes Services 0e246bcf-5f6f-4f87-bc6f-775d4712c7ea Security Center Default: Audit
Allowed: (Audit, Disabled)
GA
Auto provisioning of the Log Analytics agent should be enabled on your subscription 475aae12-b88a-4572-8b36-9b712b2b3a17 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Automation account variables should be encrypted 3657f5a0-770e-44a3-b44e-9431ba1e9735 Automation Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure API for FHIR should use a customer-managed key to encrypt data at rest 051cba44-2429-45b9-9649-46cec11c7119 API for FHIR Default: audit
Allowed: (audit, disabled)
GA
Azure API for FHIR should use private link 1ee56206-5dd1-42ab-b02d-8aae8b1634ce API for FHIR Default: Audit
Allowed: (Audit, Disabled)
GA
Azure Automation accounts should use customer-managed keys to encrypt data at rest 56a5ee18-2ae6-4810-86f7-18e39ce5629b Automation Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Backup should be enabled for Virtual Machines 013e242c-8828-4970-87b3-ab247555486d Backup Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Batch account should use customer-managed keys to encrypt data 99e9ccd8-3db9-4592-b0d1-14b1715a4d8a Batch Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Cache for Redis should reside within a virtual network 7d092e0a-7acd-40d2-a975-dca21cae48c4 Cache Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Cache for Redis should use private link 7803067c-7d34-46e3-8c79-0ca68fc4036d Cache Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Cognitive Search service should use a SKU that supports private link a049bf77-880b-470f-ba6d-9f21c530cf83 Search Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Cognitive Search services should disable public network access ee980b6d-0eca-4501-8d54-f6290fd512c3 Search Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Cognitive Search services should use private link 0fda3595-9f2b-4592-8675-4231d6fa82fe Search Default: Audit
Allowed: (Audit, Disabled)
GA
Azure Container Instance container group should use customer-managed key for encryption 0aa61e00-0a01-4a3c-9945-e93cffedf0e6 Container Instance Default: Audit
Allowed: (Audit, Disabled, Deny)
GA
Azure Cosmos DB accounts should have firewall rules 862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb Cosmos DB Default: Deny
Allowed: (Audit, Deny, Disabled)
GA
Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest 1f905d99-2ab7-462c-a6b0-f709acca6c8f Cosmos DB Default: audit
Allowed: (audit, deny, disabled)
GA
Azure Data Box jobs should enable double encryption for data at rest on the device c349d81b-9985-44ae-a8da-ff98d108ede8 Data Box Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Data Box jobs should use a customer-managed key to encrypt the device unlock password 86efb160-8de7-451d-bc08-5d475b0aadae Data Box Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Data Explorer encryption at rest should use a customer-managed key 81e74cea-30fd-40d5-802f-d72103c2aaaa Azure Data Explorer Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure data factories should be encrypted with a customer-managed key 4ec52d6d-beb7-40c4-9a9e-fe753254690e Data Factory Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Data Factory should use private link 8b0323be-cc25-4b61-935d-002c3798c6ea Data Factory Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure DDoS Protection Standard should be enabled a7aca53f-2ed4-4466-a25e-0b45ade68efd Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for App Service should be enabled 2913021d-f2fd-4f3d-b958-22354e2bdbcb Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for Azure SQL Database servers should be enabled 7fe3b40f-802b-4cdd-8bd4-fd799c948cc2 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for container registries should be enabled c25d9a16-bc35-4e15-a7e5-9db606bf9ed4 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for Key Vault should be enabled 0e6763cc-5078-4e64-889d-ff4d9a839047 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for Kubernetes should be enabled 523b5cd1-3e23-492f-a539-13118b6d1e3a Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for Resource Manager should be enabled c3d20c29-b36d-48fe-808b-99a87530ad99 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for servers should be enabled 4da35fc9-c9e7-4960-aec9-797fe7d9051d Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for SQL servers on machines should be enabled 6581d072-105e-4418-827f-bd446d56421b Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for SQL should be enabled for unprotected Azure SQL servers abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for SQL should be enabled for unprotected SQL Managed Instances abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Defender for Storage should be enabled 308fbb08-4ab8-4e67-9b29-592e93fb94fa Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure Event Grid domains should use private link 9830b652-8523-49cc-b1b3-e17dce1127ca Event Grid Default: Audit
Allowed: (Audit, Disabled)
GA
Azure Event Grid topics should use private link 4b90e17e-8448-49db-875e-bd83fb6f804f Event Grid Default: Audit
Allowed: (Audit, Disabled)
GA
Azure File Sync should use private link 1d320205-c6a1-4ac6-873d-46224024e8e2 Storage Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure HDInsight clusters should use customer-managed keys to encrypt data at rest 64d314f6-6062-4780-a861-c23e8951bee5 HDInsight Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure HDInsight clusters should use encryption at host to encrypt data at rest 1fd32ebd-e4c3-4e13-a54a-d7422d4d95f6 HDInsight Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure HDInsight clusters should use encryption in transit to encrypt communication between Azure HDInsight cluster nodes d9da03a1-f3c3-412a-9709-947156872263 HDInsight Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Machine Learning workspaces should be encrypted with a customer-managed key ba769a63-b8cc-4b2d-abf6-ac33c7204be8 Machine Learning Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Machine Learning workspaces should use private link 40cec1dd-a100-4920-b15b-3024fe8901ab Machine Learning Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Monitor Logs clusters should be created with infrastructure-encryption enabled (double encryption) ea0dfaed-95fb-448c-934e-d6e713ce393d Monitoring Default: audit
Allowed: (audit, deny, disabled)
GA
Azure Monitor Logs clusters should be encrypted with customer-managed key 1f68a601-6e6d-4e42-babf-3f643a047ea2 Monitoring Default: audit
Allowed: (audit, deny, disabled)
GA
Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters 0a15ec92-a229-4763-bb14-0ea34a568f8d Kubernetes Default: Audit
Allowed: (Audit, Disabled)
GA
Azure Service Bus namespaces should use private link 1c06e275-d63d-4540-b761-71f364c2111d Service Bus Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Azure SignalR Service should use private link 53503636-bcc9-4748-9663-5348217f160f SignalR Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Spring Cloud should use network injection af35e2a4-ef96-44e7-a9ae-853dd97032c4 App Platform Default: Audit
Allowed: (Audit, Disabled, Deny)
GA
Azure Stack Edge devices should use double-encryption b4ac1030-89c5-4697-8e00-28b5ba6a8811 Azure Stack Edge Default: audit
Allowed: (audit, deny, disabled)
GA
Azure Stream Analytics jobs should use customer-managed keys to encrypt data 87ba29ef-1ab3-4d82-b763-87fcd4f531f7 Stream Analytics Default: audit
Allowed: (audit, deny, disabled)
GA
Azure Synapse workspaces should use customer-managed keys to encrypt data at rest f7d52b2d-e161-4dfa-a82b-55e564167385 Synapse Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Azure Synapse workspaces should use private link 72d11df1-dd8a-41f7-8925-b05b960ebafc Synapse Default: Audit
Allowed: (Audit, Disabled)
GA
Azure Web PubSub Service should use private link 52630df9-ca7e-442b-853b-c6ce548b31a2 Web PubSub Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Bot Service should be encrypted with a customer-managed key 51522a96-0869-4791-82f3-981000c2c67f Bot Service Default: audit
Allowed: (audit, deny, disabled)
GA
Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys 7d7be79c-23ba-4033-84dd-45e2a5ccdd67 Kubernetes Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Cognitive Services accounts should disable public network access 0725b4dd-7e76-479c-a735-68e7ee23d5ca Cognitive Services Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Cognitive Services accounts should enable data encryption with a customer-managed key 67121cc7-ff39-4ab8-b7e3-95b84dab487d Cognitive Services Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Cognitive Services accounts should have local authentication methods disabled 71ef260a-8f18-47b7-abcb-62d0673d94dc Cognitive Services Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Cognitive Services accounts should restrict network access 037eea7a-bd0a-46c5-9a66-03aea78705d3 Cognitive Services Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Cognitive Services should use private link cddd188c-4b82-4c48-a19d-ddf74ee66a01 Cognitive Services Default: Audit
Allowed: (Audit, Disabled)
GA
Container registries should be encrypted with a customer-managed key 5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580 Container Registry Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Container registries should not allow unrestricted network access d0793b48-0edc-4296-a390-4c75d1bdfd71 Container Registry Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Container registries should use private link e8eef0a8-67cf-4eb4-9386-14b0e78733d4 Container Registry Default: Audit
Allowed: (Audit, Disabled)
GA
CORS should not allow every resource to access your API App 358c20a6-3f9e-4f0e-97ff-c6ce485e2aac App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
CORS should not allow every resource to access your Function Apps 0820b7b9-23aa-4725-a1ce-ae4558f718e5 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
CORS should not allow every resource to access your Web Applications 5744710e-cc2f-4ee8-8809-3b11e89f4bc9 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
CosmosDB accounts should use private link 58440f8a-10c5-4151-bdce-dfbaad4a20b7 Cosmos DB Default: Audit
Allowed: (Audit, Disabled)
GA
Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs 331e8ea8-378a-410f-a2e5-ae22f38bb0da Guest Configuration Fixed: deployIfNotExists GA
Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs 385f5831-96d4-41db-9a3c-cd3af78aaae6 Guest Configuration Fixed: deployIfNotExists GA
Deprecated accounts should be removed from your subscription 6b1cbf55-e8b6-442f-ba4c-7246b6381474 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Deprecated accounts with owner permissions should be removed from your subscription ebb62a0c-3560-49e1-89ed-27e074e9f8ad Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Diagnostic logs in App Services should be enabled b607c5de-e7d9-4eee-9e5c-83f1bcee4fa0 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Disk access resources should use private link f39f5f49-4abf-44de-8c70-0756997bfb51 Compute Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Disk encryption should be applied on virtual machines 0961003e-5a0a-4549-abde-af6a37f2724d Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Disk encryption should be enabled on Azure Data Explorer f4b53539-8df9-40e4-86c6-6b607703bd4e Azure Data Explorer Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Double encryption should be enabled on Azure Data Explorer ec068d99-e9c7-401f-8cef-5bdde4e6ccf1 Azure Data Explorer Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Email notification for high severity alerts should be enabled 6e2593d9-add6-4083-9c9b-4b7d2188c899 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Email notification to subscription owner for high severity alerts should be enabled 0b15565f-aa9e-48ba-8619-45960f2c314d Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Endpoint protection solution should be installed on virtual machine scale sets 26a828e1-e88f-464e-bbb3-c134a282b9de Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Enforce SSL connection should be enabled for MySQL database servers e802a67a-daf5-4436-9ea6-f6d821dd0c5d SQL Default: Audit
Allowed: (Audit, Disabled)
GA
Enforce SSL connection should be enabled for PostgreSQL database servers d158790f-bfb0-486c-8631-2dc6b4e8e6af SQL Default: Audit
Allowed: (Audit, Disabled)
GA
Ensure API app has 'Client Certificates (Incoming client certificates)' set to 'On' 0c192fe8-9cbb-4516-85b3-0ade8bd03886 App Service Default: Audit
Allowed: (Audit, Disabled)
GA
Ensure that 'HTTP Version' is the latest, if used to run the API app 991310cd-e9f3-47bc-b7b6-f57b557d07db App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure that 'HTTP Version' is the latest, if used to run the Function app e2c1c086-2d84-4019-bff3-c44ccd95113c App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure that 'HTTP Version' is the latest, if used to run the Web app 8c122334-9d20-4eb8-89ea-ac9a705b74ae App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure that 'Java version' is the latest, if used as a part of the API app 88999f4c-376a-45c8-bcb3-4058f713cf39 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure that 'Java version' is the latest, if used as a part of the Function app 9d0b6ea4-93e2-4578-bf2f-6bb17d22b4bc App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure that 'Java version' is the latest, if used as a part of the Web app 496223c3-ad65-4ecd-878a-bae78737e9ed App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure that 'PHP version' is the latest, if used as a part of the API app 1bc1795e-d44a-4d48-9b3b-6fff0fd5f9ba App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure that 'PHP version' is the latest, if used as a part of the WEB app 7261b898-8a84-4db8-9e04-18527132abb3 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure that 'Python version' is the latest, if used as a part of the API app 74c3584d-afae-46f7-a20a-6f8adba71a16 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure that 'Python version' is the latest, if used as a part of the Function app 7238174a-fd10-4ef0-817e-fc820a951d73 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure that 'Python version' is the latest, if used as a part of the Web app 7008174a-fd10-4ef0-817e-fc820a951d73 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Ensure WEB app has 'Client Certificates (Incoming client certificates)' set to 'On' 5bb220d9-2698-4ee4-8404-b9c30c9df609 App Service Default: Audit
Allowed: (Audit, Disabled)
GA
Event Hub namespaces should use a customer-managed key for encryption a1ad735a-e96f-45d2-a7b2-9a4932cab7ec Event Hub Default: Audit
Allowed: (Audit, Disabled)
GA
Event Hub namespaces should use private link b8564268-eb4a-4337-89be-a19db070c59d Event Hub Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
External accounts with owner permissions should be removed from your subscription f8456c1c-aa66-4dfb-861a-25d127b775c9 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
External accounts with read permissions should be removed from your subscription 5f76cf89-fbf2-47fd-a3f4-b891fa780b60 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
External accounts with write permissions should be removed from your subscription 5c607a2e-c700-4744-8254-d77e7c9eb5e4 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
FTPS only should be required in your API App 9a1b8c48-453a-4044-86c3-d8bfd823e4f5 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
FTPS only should be required in your Function App 399b2637-a50f-4f95-96f8-3a145476eb15 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
FTPS should be required in your Web App 4d24b6d4-5e53-4a4f-a7f4-618fa573ee4b App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Function App should only be accessible over HTTPS 6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab App Service Default: Audit
Allowed: (Audit, Disabled)
GA
Function apps should have 'Client Certificates (Incoming client certificates)' enabled eaebaea7-8013-4ceb-9d14-7eb32271373c App Service Default: Audit
Allowed: (Audit, Disabled)
GA
Geo-redundant backup should be enabled for Azure Database for MariaDB 0ec47710-77ff-4a3d-9181-6aa50af424d0 SQL Default: Audit
Allowed: (Audit, Disabled)
GA
Geo-redundant backup should be enabled for Azure Database for MySQL 82339799-d096-41ae-8538-b108becf0970 SQL Default: Audit
Allowed: (Audit, Disabled)
GA
Geo-redundant backup should be enabled for Azure Database for PostgreSQL 48af4db5-9b8b-401c-8e74-076be876a430 SQL Default: Audit
Allowed: (Audit, Disabled)
GA
Geo-redundant storage should be enabled for Storage Accounts bf045164-79ba-4215-8f95-f8048dc1780b Storage Default: Audit
Allowed: (Audit, Disabled)
GA
Guest Configuration extension should be installed on your machines ae89ebca-1c92-4898-ac2c-9f63decb045c Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
HPC Cache accounts should use customer-managed key for encryption 970f84d8-71b6-4091-9979-ace7e3fb6dbb Storage Default: Audit
Allowed: (Audit, Disabled, Deny)
GA
Infrastructure encryption should be enabled for Azure Database for MySQL servers 3a58212a-c829-4f13-9872-6371df2fd0b4 SQL Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Infrastructure encryption should be enabled for Azure Database for PostgreSQL servers 24fba194-95d6-48c0-aea7-f65bf859c598 SQL Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Internet-facing virtual machines should be protected with network security groups f6de0be7-9a8a-4b8a-b349-43cf02d22f7c Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
IoT Hub device provisioning service instances should use private link df39c015-56a4-45de-b4a3-efe77bed320d Internet of Things Default: Audit
Allowed: (Audit, Disabled)
GA
IP Forwarding on your virtual machine should be disabled bd352bd5-2853-4985-bf0d-73806b4a5744 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Key vaults should have purge protection enabled 0b60c0b2-2dc2-4e1c-b5c9-abbed971de53 Key Vault Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Key vaults should have soft delete enabled 1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d Key Vault Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limits e345eecc-fa47-480f-9e88-67dcc122b164 Kubernetes Default: deny
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster containers should not share host process ID or host IPC namespace 47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8 Kubernetes Default: audit
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster containers should only listen on allowed ports 440b515e-a580-421e-abeb-b159a61ddcbc Kubernetes Default: deny
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster containers should only use allowed AppArmor profiles 511f5417-5d12-434d-ab2e-816901e72a5e Kubernetes Default: audit
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster containers should only use allowed capabilities c26596ff-4d70-4e6a-9a30-c2506bd2f80c Kubernetes Default: audit
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster containers should only use allowed images febd0533-8e55-448f-b837-bd0e06f16469 Kubernetes Default: deny
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster containers should run with a read only root file system df49d893-a74c-421d-bc95-c663042e5b80 Kubernetes Default: audit
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster pod hostPath volumes should only use allowed host paths 098fc59e-46c7-4d99-9b16-64990e543d75 Kubernetes Default: audit
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster pods and containers should only run with approved user and group IDs f06ddb64-5fa3-4b77-b166-acb36f7f6042 Kubernetes Default: audit
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster pods should only use approved host network and port range 82985f06-dc18-4a48-bc1c-b9f4f0098cfe Kubernetes Default: audit
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster services should listen only on allowed ports 233a2a17-77ca-4fb1-9b6b-69223d272a44 Kubernetes Default: deny
Allowed: (audit, deny, disabled)
GA
Kubernetes cluster should not allow privileged containers 95edb821-ddaf-4404-9732-666045e056b4 Kubernetes Default: deny
Allowed: (audit, deny, disabled)
GA
Kubernetes clusters should be accessible only over HTTPS 1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d Kubernetes Default: deny
Allowed: (audit, deny, disabled)
GA
Kubernetes clusters should not allow container privilege escalation 1c6e92c9-99f0-4e55-9cf2-0c234dc48f99 Kubernetes Default: audit
Allowed: (audit, deny, disabled)
GA
Kubernetes Services should be upgraded to a non-vulnerable Kubernetes version fb893a29-21bb-418c-a157-e99480ec364c Security Center Default: Audit
Allowed: (Audit, Disabled)
GA
Latest TLS version should be used in your API App 8cb6aa8b-9e41-4f4e-aa25-089a7ac2581e App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Latest TLS version should be used in your Function App f9d614c5-c173-4d56-95a7-b4437057d193 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Latest TLS version should be used in your Web App f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Log Analytics agent health issues should be resolved on your machines d62cfe2b-3ab0-4d41-980d-76803b58ca65 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Log Analytics agent should be installed on your virtual machine for Azure Security Center monitoring a4fe33eb-e377-4efb-ab31-0784311bc499 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Log Analytics agent should be installed on your virtual machine scale sets for Azure Security Center monitoring a3a6ea0c-e018-4933-9ef0-5aaa1501449b Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Logic Apps Integration Service Environment should be encrypted with customer-managed keys 1fafeaf6-7927-4059-a50a-8eb2a7a6f2b5 Logic Apps Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Long-term geo-redundant backup should be enabled for Azure SQL Databases d38fc420-0735-4ef3-ac11-c806f651a570 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Managed disks should be double encrypted with both platform-managed and customer-managed keys ca91455f-eace-4f96-be59-e6e2c35b4816 Compute Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Managed identity should be used in your API App c4d441f8-f9d9-4a9e-9cef-e82117cb3eef App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Managed identity should be used in your Function App 0da106f2-4ca3-48e8-bc85-c638fe6aea8f App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Managed identity should be used in your Web App 2b9ad585-36bc-4615-b300-fd4435808332 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Management ports of virtual machines should be protected with just-in-time network access control b0f33259-77d7-4c9e-aac6-3aabcfae693c Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Management ports should be closed on your virtual machines 22730e10-96f6-4aac-ad84-9383d35b5917 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
MFA should be enabled accounts with write permissions on your subscription 9297c21d-2ed6-4474-b48f-163f75654ce3 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
MFA should be enabled on accounts with owner permissions on your subscription aa633080-8b72-40c4-a2d7-d00c03e80bed Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
MFA should be enabled on accounts with read permissions on your subscription e3576e28-8b17-4677-84c3-db2990658d64 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Monitor missing Endpoint Protection in Azure Security Center af6cd1bd-1635-48cb-bde7-5b15693900b9 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
MySQL servers should use customer-managed keys to encrypt data at rest 83cef61d-dbd1-4b20-a4fc-5fbc7da10833 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Network Watcher should be enabled b6e2945c-0b7b-40f5-9233-7a5323b5cdc6 Network Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Non-internet-facing virtual machines should be protected with network security groups bb91dfba-c30d-4263-9add-9c2384e659a6 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Only secure connections to your Azure Cache for Redis should be enabled 22bee202-a82f-4305-9a2a-6d7f44d4dedb Cache Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
OS and data disks should be encrypted with a customer-managed key 702dd420-7fcc-42c5-afe8-4026edd20fe0 Compute Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
PostgreSQL servers should use customer-managed keys to encrypt data at rest 18adea5e-f416-4d0f-8aa8-d24321e3e274 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Private endpoint connections on Azure SQL Database should be enabled 7698e800-9299-47a6-b3b6-5a0fee576eed SQL Default: Audit
Allowed: (Audit, Disabled)
GA
Private endpoint should be enabled for MariaDB servers 0a1302fb-a631-4106-9753-f3d494733990 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Private endpoint should be enabled for MySQL servers 7595c971-233d-4bcf-bd18-596129188c49 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Private endpoint should be enabled for PostgreSQL servers 0564d078-92f5-4f97-8398-b9f58a51f70b SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Public network access on Azure SQL Database should be disabled 1b8ca024-1d5c-4dec-8995-b1a932b41780 SQL Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Public network access should be disabled for MariaDB servers fdccbe47-f3e3-4213-ad5d-ea459b2fa077 SQL Default: Audit
Allowed: (Audit, Disabled)
GA
Public network access should be disabled for MySQL servers d9844e8a-1437-4aeb-a32c-0c992f056095 SQL Default: Audit
Allowed: (Audit, Disabled)
GA
Public network access should be disabled for PostgreSQL servers b52376f7-9612-48a1-81cd-1ffe4b61032c SQL Default: Audit
Allowed: (Audit, Disabled)
GA
Remote debugging should be turned off for API Apps e9c8d085-d9cc-4b17-9cdc-059f1f01f19e App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Remote debugging should be turned off for Function Apps 0e60b895-3786-45da-8377-9c6b4b6ac5f9 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Remote debugging should be turned off for Web Applications cb510bfd-1cba-4d9f-a230-cb0976f4bb71 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in Azure Data Lake Store should be enabled 057ef27e-665e-4328-8ea3-04b3122bd9fb Data Lake Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in Azure Stream Analytics should be enabled f9be5368-9bf5-4b84-9e0a-7850da98bb46 Stream Analytics Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in Batch accounts should be enabled 428256e6-1fac-4f48-a757-df34c2b3336d Batch Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in Data Lake Analytics should be enabled c95c74d9-38fe-4f0d-af86-0c7d626a315c Data Lake Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in Event Hub should be enabled 83a214f7-d01a-484b-91a9-ed54470c9a6a Event Hub Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in IoT Hub should be enabled 383856f8-de7f-44a2-81fc-e5135b5c2aa4 Internet of Things Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in Key Vault should be enabled cf820ca0-f99e-4f3e-84fb-66e913812d21 Key Vault Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in Logic Apps should be enabled 34f95f76-5386-4de7-b824-0d8478470c9d Logic Apps Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in Search services should be enabled b4330a05-a843-4bc8-bf9a-cacce50c67f4 Search Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in Service Bus should be enabled f8d36e2f-389b-4ee4-898d-21aeb69a0f45 Service Bus Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Resource logs in Virtual Machine Scale Sets should be enabled 7c1b1214-f927-48bf-8882-84f0af6588b1 Compute Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Role-Based Access Control (RBAC) should be used on Kubernetes Services ac4a19c2-fa67-49b4-8ae5-0b2e78c49457 Security Center Default: Audit
Allowed: (Audit, Disabled)
GA
Saved-queries in Azure Monitor should be saved in customer storage account for logs encryption fa298e57-9444-42ba-bf04-86e8470e32c7 Monitoring Default: audit
Allowed: (audit, deny, disabled)
GA
Secure transfer to storage accounts should be enabled 404c3081-a854-4457-ae30-26a93ef643f9 Storage Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Service Bus Premium namespaces should use a customer-managed key for encryption 295fc8b1-dc9f-4f53-9c61-3f313ceab40a Service Bus Default: Audit
Allowed: (Audit, Disabled)
GA
Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign 617c02be-7f02-4efd-8836-3180d47b6c68 Service Fabric Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Service Fabric clusters should only use Azure Active Directory for client authentication b54ed75b-3e1a-44ac-a333-05ba39b99ff0 Service Fabric Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Service principals should be used to protect your subscriptions instead of management certificates 6646a0bd-e110-40ca-bb97-84fcee63c414 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
SQL databases should have vulnerability findings resolved feedbf84-6b99-488c-acc2-71c829aa5ffc Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
SQL managed instances should use customer-managed keys to encrypt data at rest 048248b0-55cd-46da-b1ff-39efd52db260 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
SQL servers on machines should have vulnerability findings resolved 6ba6d016-e7c3-4842-b8f2-4992ebc0d72d Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
SQL servers should use customer-managed keys to encrypt data at rest 0d134df8-db83-46fb-ad72-fe0c9428c8dd SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
SQL servers with auditing to storage account destination should be configured with 90 days retention or higher 89099bee-89e0-4b26-a5f4-165451757743 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Storage account encryption scopes should use customer-managed keys to encrypt data at rest b5ec538c-daa0-4006-8596-35468b9148e8 Storage Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Storage accounts should be migrated to new Azure Resource Manager resources 37e0d2fe-28a5-43d6-a273-67d37d1f5606 Storage Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Storage accounts should have infrastructure encryption 4733ea7b-a883-42fe-8cac-97454c2a9e4a Storage Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Storage accounts should restrict network access 34c877ad-507e-4c82-993e-3452a6e0ad3c Storage Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Storage accounts should restrict network access using virtual network rules 2a1a9cdf-e04d-429a-8416-3bfb72a1b26f Storage Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Storage accounts should use customer-managed key for encryption 6fac406b-40ca-413b-bf8e-0bf964659c25 Storage Default: Audit
Allowed: (Audit, Disabled)
GA
Storage accounts should use private link 6edd7eda-6dd8-40f7-810d-67160c639cd9 Storage Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Subnets should be associated with a Network Security Group e71308d3-144b-4262-b144-efdc3cc90517 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Subscriptions should have a contact email address for security issues 4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
System updates on virtual machine scale sets should be installed c3f317a7-a95c-4547-b7e7-11017ebdf2fe Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
System updates should be installed on your machines 86b3d65f-7626-441e-b690-81a8b71cff60 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Temp disks and cache for agent node pools in Azure Kubernetes Service clusters should be encrypted at host 41425d9f-d1a5-499a-9932-f8ed8453932c Kubernetes Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
There should be more than one owner assigned to your subscription 09024ccc-0c5f-475e-9457-b7c0d9ed487b Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Transparent Data Encryption on SQL databases should be enabled 17k78e20-9358-41c9-923c-fb736d382a12 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Virtual machines and virtual machine scale sets should have encryption at host enabled fc4d8e41-e223-45ea-9bf5-eada37891d87 Compute Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity d26f7642-7545-4e18-9b75-8c9bbdee3a9a Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Virtual machines should be migrated to new Azure Resource Manager resources 1d84d5fb-01f6-4d12-ba4f-4a26081d403d Compute Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
VM Image Builder templates should use private link 2154edb9-244f-4741-9970-660785bccdaa VM Image Builder Default: Audit
Allowed: (Audit, Disabled, Deny)
GA
Vulnerabilities in Azure Container Registry images should be remediated 5f0f936f-2f01-4bf5-b6be-d423792fa562 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Vulnerabilities in container security configurations should be remediated e8cbc669-f12d-49eb-93e7-9273119e9933 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Vulnerabilities in security configuration on your machines should be remediated e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Vulnerabilities in security configuration on your virtual machine scale sets should be remediated 3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Vulnerability assessment should be enabled on SQL Managed Instance 1b7aa243-30e4-4c9e-bca8-d0d3022b634a SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Vulnerability assessment should be enabled on your SQL servers ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Vulnerability assessment should be enabled on your Synapse workspaces 0049a6b3-a662-4f3e-8635-39cf44ace45a Synapse Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Web Application Firewall (WAF) should be enabled for Application Gateway 564feb30-bf6a-4854-b4bb-0d2d2d1e6c66 Network Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Web Application Firewall (WAF) should be enabled for Azure Front Door Service service 055aa869-bc98-4af8-bafc-23f1ab6ffe2c Network Default: Audit
Allowed: (Audit, Deny, Disabled)
GA
Web Application should only be accessible over HTTPS a4af4a39-4135-47fb-b175-47fbdf85311d App Service Default: Audit
Allowed: (Audit, Disabled)
GA
Windows Defender Exploit Guard should be enabled on your machines bed48b13-6647-468e-aa2f-1af1d3f4dd40 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
Windows web servers should be configured to use secure communication protocols 5752e6d6-1206-46d8-8ab1-ecc2f71a8112 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists, Disabled)
GA
JSON
{
  "properties": {
  "displayName": "[Preview]: NIST SP 800-53 Rev. 5",
    "policyType": "BuiltIn",
    "description": "This initiative includes policies that address a subset of NIST SP 800-53 Rev. 5 controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/nist800-53r5-initiative.",
    "metadata": {
      "version": "1.0.0-preview",
      "category": "Regulatory Compliance",
      "preview": true
    },
    "parameters": {
      "IncludeArcMachines": {
        "type": "String",
        "metadata": {
          "displayName": "Include Arc-connected servers when evaluating guest configuration policies",
          "description": "By selecting 'true,' you agree to be charged monthly per Arc connected machine; for more information, visit https://aka.ms/policy-pricing"
        },
        "allowedValues": [
          "true",
          "false"
        ],
        "defaultValue": "false"
      },
      "NotAvailableMachineState-bed48b13-6647-468e-aa2f-1af1d3f4dd40": {
        "type": "String",
        "metadata": {
          "displayName": "Status if Windows Defender is not available on machine",
          "description": "Windows Defender Exploit Guard is only available starting with Windows 10/Windows Server with update 1709. Setting this value to 'Non-Compliant' shows machines with older versions on which Windows Defender Exploit Guard is not available (such as Windows Server 2012 R2) as non-compliant. Setting this value to 'Compliant' shows these machines as compliant."
        },
        "allowedValues": [
          "Compliant",
          "Non-Compliant"
        ],
        "defaultValue": "Compliant"
      },
      "MinimumTLSVersion-5752e6d6-1206-46d8-8ab1-ecc2f71a8112": {
        "type": "String",
        "metadata": {
          "displayName": "Minimum TLS version for Windows web servers",
          "description": "Windows web servers with lower TLS versions will be assessed as non-compliant"
        },
        "allowedValues": [
          "1.1",
          "1.2"
        ],
        "defaultValue": "1.2"
      },
      "requiredRetentionDays": {
        "type": "String",
        "metadata": {
          "displayName": "Required retention period (days) for resource logs"
        },
        "defaultValue": "365"
      },
      "effect-febd0533-8e55-448f-b837-bd0e06f16469": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster containers should only use allowed images",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "excludedNamespaces": {
        "type": "Array",
        "metadata": {
          "displayName": "Kubernetes namespaces excluded from evaluation of Kubernetes cluster policies in this initiative",
          "description": "List of Kubernetes namespaces to exclude from policy evaluation"
        },
        "defaultValue": [
          "kube-system",
          "gatekeeper-system",
          "azure-arc"
        ]
      },
      "namespaces": {
        "type": "Array",
        "metadata": {
          "displayName": "Kubernetes namespaces included for evaluation of Kubernetes cluster policies in this initiative",
          "description": "List of Kubernetes namespaces to (only) include for policy evaluation; an empty list will result in policies evaluated on all resources in all namespaces"
        },
        "defaultValue": [
          
        ]
      },
      "labelSelector": {
        "type": "Object",
        "metadata": {
          "displayName": "Kubernetes label selector for resources included for evaluation of Kubernetes cluster policies in this initiative",
          "description": "Label query to select Kubernetes resources to include for policy evaluation; an empty label selector will result in policies evaluated on all Kubernetes resources"
        },
        "defaultValue": {
          
        }
      },
      "allowedContainerImagesRegex-febd0533-8e55-448f-b837-bd0e06f16469": {
        "type": "String",
        "metadata": {
          "displayName": "Allowed container images for Kubernetes clusters",
          "description": "Regular expression used to match allowed container images in a Kubernetes cluster; Ex: allow any Azure Container Registry image by matching partial path: ^.+azurecr.io/.+$"
        },
      "defaultValue": "^(.+){0}$"
      },
      "effect-95edb821-ddaf-4404-9732-666045e056b4": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster should not allow privileged containers",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "excludedContainers-95edb821-ddaf-4404-9732-666045e056b4": {
        "type": "Array",
        "metadata": {
          "displayName": "Kubernetes containers excluded from evaluation of policy: Kubernetes cluster should not allow privileged containers",
          "description": "The list of InitContainers and Containers to exclude from policy evaluation. The list should use the container name. Use an empty list to apply this policy to all containers in all namespaces."
        },
        "defaultValue": [
          
        ]
      },
      "effect-440b515e-a580-421e-abeb-b159a61ddcbc": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster containers should only listen on allowed ports",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "allowedContainerPortsList-440b515e-a580-421e-abeb-b159a61ddcbc": {
        "type": "Array",
        "metadata": {
          "displayName": "Allowed listener ports for Kubernetes cluster containers",
          "description": "List of container ports on which Kubernetes cluster containers are allowed to listen"
        },
        "defaultValue": [
          
        ]
      },
      "effect-233a2a17-77ca-4fb1-9b6b-69223d272a44": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster services should listen only on allowed ports",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "allowedServicePortsList-233a2a17-77ca-4fb1-9b6b-69223d272a44": {
        "type": "Array",
        "metadata": {
          "displayName": "Allowed listener ports for Kubernetes cluster services",
          "description": "The list of ports on which Kubernetes cluster services are allowed to listen"
        },
        "defaultValue": [
          
        ]
      },
      "effect-e345eecc-fa47-480f-9e88-67dcc122b164": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster containers CPU and memory resource limits should not exceed the specified limits",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "cpuLimit-e345eecc-fa47-480f-9e88-67dcc122b164": {
        "type": "String",
        "metadata": {
          "displayName": "Maximum allowed CPU units for containers in Kubernetes clusters",
          "description": "Ex: 200m; for more information, visit https://aka.ms/k8s-policy-pod-limits"
        },
        "defaultValue": "0"
      },
      "memoryLimit-e345eecc-fa47-480f-9e88-67dcc122b164": {
        "type": "String",
        "metadata": {
          "displayName": "Maximum allowed memory (bytes) for a container in Kubernetes clusters",
          "description": "Ex: 1Gi; for more information, visit https://aka.ms/k8s-policy-pod-limits"
        },
        "defaultValue": "0"
      },
      "effect-f06ddb64-5fa3-4b77-b166-acb36f7f6042": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster pods and containers should only run with approved user and group IDs",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "runAsUserRule-f06ddb64-5fa3-4b77-b166-acb36f7f6042": {
        "type": "String",
        "metadata": {
          "displayName": "Run as user rule for Kubernetes containers",
          "description": "The 'RunAsUser' rule that containers are allowed to run with; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "allowedValues": [
          "MustRunAs",
          "MustRunAsNonRoot",
          "RunAsAny"
        ],
        "defaultValue": "MustRunAsNonRoot"
      },
      "runAsUserRanges-f06ddb64-5fa3-4b77-b166-acb36f7f6042": {
        "type": "Object",
        "metadata": {
          "displayName": "Allowed user ID ranges for Kubernetes containers",
          "description": "User ID ranges that are allowed for containers to use; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": {
          "ranges": [
            
          ]
        }
      },
      "runAsGroupRule-f06ddb64-5fa3-4b77-b166-acb36f7f6042": {
        "type": "String",
        "metadata": {
          "displayName": "Run as group rule for Kubernetes containers",
          "description": "The 'RunAsGroup' rule that containers are allowed to run with; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "allowedValues": [
          "MustRunAs",
          "MayRunAs",
          "RunAsAny"
        ],
        "defaultValue": "RunAsAny"
      },
      "runAsGroupRanges-f06ddb64-5fa3-4b77-b166-acb36f7f6042": {
        "type": "Object",
        "metadata": {
          "displayName": "Allowed group ID ranges for Kubernetes containers",
          "description": "Group ID ranges that are allowed for containers to use; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": {
          "ranges": [
            
          ]
        }
      },
      "supplementalGroupsRule-f06ddb64-5fa3-4b77-b166-acb36f7f6042": {
        "type": "String",
        "metadata": {
          "displayName": "Supplemental group rule for Kubernetes containers",
          "description": "The 'SupplementalGroups' rule that containers are allowed to run with; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "allowedValues": [
          "MustRunAs",
          "MayRunAs",
          "RunAsAny"
        ],
        "defaultValue": "RunAsAny"
      },
      "supplementalGroupsRanges-f06ddb64-5fa3-4b77-b166-acb36f7f6042": {
        "type": "Object",
        "metadata": {
          "displayName": "Allowed supplemental group ID ranges for Kubernetes containers",
          "description": "Supplemental group ID ranges that are allowed for containers to use; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": {
          "ranges": [
            
          ]
        }
      },
      "fsGroupRule-f06ddb64-5fa3-4b77-b166-acb36f7f6042": {
        "type": "String",
        "metadata": {
          "displayName": "File system group rule for Kubernetes containers",
          "description": "The 'FSGroup' rule that containers are allowed to run with; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "allowedValues": [
          "MustRunAs",
          "MayRunAs",
          "RunAsAny"
        ],
        "defaultValue": "RunAsAny"
      },
      "fsGroupRanges-f06ddb64-5fa3-4b77-b166-acb36f7f6042": {
        "type": "Object",
        "metadata": {
          "displayName": "Allowed file system group ID ranges for Kubernetes cluster pods",
          "description": "File system group ranges that are allowed for pods to use; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": {
          "ranges": [
            
          ]
        }
      },
      "effect-1c6e92c9-99f0-4e55-9cf2-0c234dc48f99": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes clusters should not allow container privilege escalation",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster containers should not share host process ID or host IPC namespace",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-df49d893-a74c-421d-bc95-c663042e5b80": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster containers should run with a read only root file system",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes clusters should be accessible only over HTTPS",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-c26596ff-4d70-4e6a-9a30-c2506bd2f80c": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster containers should only use allowed capabilities",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "allowedCapabilities-c26596ff-4d70-4e6a-9a30-c2506bd2f80c": {
        "type": "Array",
        "metadata": {
          "displayName": "List of capabilities that are allowed to be added to a Kubernetes cluster container",
          "description": "Use an empty list as input to block everything"
        },
        "defaultValue": [
          
        ]
      },
      "requiredDropCapabilities-c26596ff-4d70-4e6a-9a30-c2506bd2f80c": {
        "type": "Array",
        "metadata": {
          "displayName": "The list of capabilities that must be dropped by a Kubernetes cluster container",
          "description": "For more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": [
          
        ]
      },
      "effect-511f5417-5d12-434d-ab2e-816901e72a5e": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster containers should only use allowed AppArmor profiles",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "allowedProfiles-511f5417-5d12-434d-ab2e-816901e72a5e": {
        "type": "Array",
        "metadata": {
          "displayName": "The list of AppArmor profiles that containers are allowed to use",
          "description": "Ex: 'runtime/default;docker/default'; use an empty list as input to block everything; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": [
          
        ]
      },
      "effect-82985f06-dc18-4a48-bc1c-b9f4f0098cfe": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster pods should only use approved host network and port range",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "allowHostNetwork-82985f06-dc18-4a48-bc1c-b9f4f0098cfe": {
        "type": "Boolean",
        "metadata": {
          "displayName": "Allow host network usage for Kubernetes cluster pods",
          "description": "Set this value to true if pod is allowed to use host network, otherwise set to false; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": false
      },
      "minPort-82985f06-dc18-4a48-bc1c-b9f4f0098cfe": {
        "type": "Integer",
        "metadata": {
          "displayName": "Minimum value in the allowable host port range that Kubernetes cluster pods can use in the host network namespace",
          "description": "For more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": 0
      },
      "maxPort-82985f06-dc18-4a48-bc1c-b9f4f0098cfe": {
        "type": "Integer",
        "metadata": {
          "displayName": "Maximum value in the allowable host port range that Kubernetes cluster pods can use in the host network namespace",
          "description": "For more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": 0
      },
      "effect-098fc59e-46c7-4d99-9b16-64990e543d75": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Kubernetes cluster pod hostPath volumes should only use allowed host paths",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "allowedHostPaths-098fc59e-46c7-4d99-9b16-64990e543d75": {
        "type": "Object",
        "metadata": {
          "displayName": "Allowed host paths for pod hostPath volumes to use",
          "description": "Use an empty paths list to block all host paths; for more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": {
          "paths": [
            
          ]
        }
      },
      "resourceGroupName-b6e2945c-0b7b-40f5-9233-7a5323b5cdc6": {
        "type": "String",
        "metadata": {
          "displayName": "Name of the resource group for Network Watcher",
          "description": "Name of the resource group where Network Watchers are located, Ex: NetworkWatcherRG"
        },
        "defaultValue": "NetworkWatcherRG"
      },
      "includeAKSClusters-7c1b1214-f927-48bf-8882-84f0af6588b1": {
        "type": "Boolean",
        "metadata": {
          "displayName": "Include AKS clusters when auditing if virtual machine scale set diagnostic logs are enabled",
          "description": "For more information, visit https://aka.ms/kubepolicydoc"
        },
        "defaultValue": false
      },
      "setting-a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9": {
        "type": "String",
        "metadata": {
          "displayName": "Required auditing setting for SQL servers"
        },
        "allowedValues": [
          "enabled",
          "disabled"
        ],
        "defaultValue": "enabled"
      },
      "evaluatedSkuNames-ef619a2c-cc4d-4d03-b2ba-8c94a834d85b": {
        "type": "Array",
        "metadata": {
          "displayName": "API Management SKUs that should use a virtual network",
          "description": "List of API Management SKUs against which this policy will be evaluated"
        },
        "allowedValues": [
          "Developer",
          "Basic",
          "Standard",
          "Premium",
          "Consumption"
        ],
        "defaultValue": [
          "Developer",
          "Premium"
        ]
      },
      "effect-b54ed75b-3e1a-44ac-a333-05ba39b99ff0": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Service Fabric clusters should only use Azure Active Directory for client authentication",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-71ef260a-8f18-47b7-abcb-62d0673d94dc": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Cognitive Services accounts should have local authentication methods disabled",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-055aa869-bc98-4af8-bafc-23f1ab6ffe2c": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Web Application Firewall (WAF) should be enabled for Azure Front Door Service service",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-564feb30-bf6a-4854-b4bb-0d2d2d1e6c66": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Web Application Firewall (WAF) should be enabled for Application Gateway",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Cosmos DB accounts should have firewall rules",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-d9da03a1-f3c3-412a-9709-947156872263": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure HDInsight clusters should use encryption in transit to encrypt communication between Azure HDInsight cluster nodes",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-617c02be-7f02-4efd-8836-3180d47b6c68": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Service Fabric clusters should have the ClusterProtectionLevel property set to EncryptAndSign",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-0b60c0b2-2dc2-4e1c-b5c9-abbed971de53": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Key vaults should have purge protection enabled",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Key vaults should have soft delete enabled",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "maximumValidityInMonths-0a075868-4c26-42ef-914c-5bc007359560": {
        "type": "Integer",
        "metadata": {
          "displayName": "Maximum validity (months) for Key Vault certificates",
          "description": "The limit for how long a Key Vault certificate may be valid; Azure best practices recommend against certificates with lengthy validity periods"
        },
        "defaultValue": 12
      },
      "effect-0a075868-4c26-42ef-914c-5bc007359560": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Certificates should have the specified maximum validity period",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-98728c90-32c7-4049-8429-847dc0f4fe37": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Key Vault secrets should have an expiration date",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Key Vault keys should have an expiration date",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-ec068d99-e9c7-401f-8cef-5bdde4e6ccf1": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Double encryption should be enabled on Azure Data Explorer",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-c349d81b-9985-44ae-a8da-ff98d108ede8": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Data Box jobs should enable double encryption for data at rest on the device",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "supportedSKUs-c349d81b-9985-44ae-a8da-ff98d108ede8": {
        "type": "Array",
        "metadata": {
          "displayName": "Azure Data Box SKUs that support software-based double encryption",
          "description": "The list of Azure Data Box SKUs that support software-based double encryption"
        },
        "allowedValues": [
          "DataBox",
          "DataBoxHeavy"
        ],
        "defaultValue": [
          "DataBox",
          "DataBoxHeavy"
        ]
      },
      "effect-3657f5a0-770e-44a3-b44e-9431ba1e9735": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Automation account variables should be encrypted",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-b4ac1030-89c5-4697-8e00-28b5ba6a8811": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Stack Edge devices should use double-encryption",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-ea0dfaed-95fb-448c-934e-d6e713ce393d": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Monitor Logs clusters should be created with infrastructure-encryption enabled (double encryption)",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-3a58212a-c829-4f13-9872-6371df2fd0b4": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Infrastructure encryption should be enabled for Azure Database for MySQL servers",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-24fba194-95d6-48c0-aea7-f65bf859c598": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Infrastructure encryption should be enabled for Azure Database for PostgreSQL servers",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-4733ea7b-a883-42fe-8cac-97454c2a9e4a": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Storage accounts should have infrastructure encryption",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-f4b53539-8df9-40e4-86c6-6b607703bd4e": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Disk encryption should be enabled on Azure Data Explorer",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-41425d9f-d1a5-499a-9932-f8ed8453932c": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Temp disks and cache for agent node pools in Azure Kubernetes Service clusters should be encrypted at host",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-fc4d8e41-e223-45ea-9bf5-eada37891d87": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Virtual machines and virtual machine scale sets should have encryption at host enabled",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-86efb160-8de7-451d-bc08-5d475b0aadae": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Data Box jobs should use a customer-managed key to encrypt the device unlock password",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "supportedSKUs-86efb160-8de7-451d-bc08-5d475b0aadae": {
        "type": "Array",
        "metadata": {
          "displayName": "Azure Data Box SKUs that support customer-managed key encryption key",
          "description": "The list of Azure Data Box SKUs that support customer-managed key encryption key"
        },
        "allowedValues": [
          "DataBox",
          "DataBoxHeavy"
        ],
        "defaultValue": [
          "DataBox",
          "DataBoxHeavy"
        ]
      },
      "effect-4ec52d6d-beb7-40c4-9a9e-fe753254690e": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure data factories should be encrypted with a customer-managed key",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-64d314f6-6062-4780-a861-c23e8951bee5": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure HDInsight clusters should use customer-managed keys to encrypt data at rest",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-1fd32ebd-e4c3-4e13-a54a-d7422d4d95f6": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure HDInsight clusters should use encryption at host to encrypt data at rest",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-fa298e57-9444-42ba-bf04-86e8470e32c7": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Saved-queries in Azure Monitor should be saved in customer storage account for logs encryption",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-67121cc7-ff39-4ab8-b7e3-95b84dab487d": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Cognitive Services accounts should enable data encryption with a customer-managed key",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-1f905d99-2ab7-462c-a6b0-f709acca6c8f": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Container registries should be encrypted with a customer-managed key",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-ba769a63-b8cc-4b2d-abf6-ac33c7204be8": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Machine Learning workspaces should be encrypted with a customer-managed key",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-81e74cea-30fd-40d5-802f-d72103c2aaaa": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Data Explorer encryption at rest should use a customer-managed key",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-0aa61e00-0a01-4a3c-9945-e93cffedf0e6": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Container Instance container group should use customer-managed key for encryption",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Disabled",
          "Deny"
        ],
        "defaultValue": "Audit"
      },
      "effect-47031206-ce96-41f8-861b-6a915f3de284": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: IoT Hub device provisioning service data should be encrypted using customer-managed keys (CMK)",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-87ba29ef-1ab3-4d82-b763-87fcd4f531f7": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Stream Analytics jobs should use customer-managed keys to encrypt data",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-51522a96-0869-4791-82f3-981000c2c67f": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Bot Service should be encrypted with a customer-managed key",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-b5ec538c-daa0-4006-8596-35468b9148e8": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Storage account encryption scopes should use customer-managed keys to encrypt data at rest",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-970f84d8-71b6-4091-9979-ace7e3fb6dbb": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: HPC Cache accounts should use customer-managed key for encryption",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Disabled",
          "Deny"
        ],
        "defaultValue": "Audit"
      },
      "effect-56a5ee18-2ae6-4810-86f7-18e39ce5629b": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Automation accounts should use customer-managed keys to encrypt data at rest",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-2e94d99a-8a36-4563-bc77-810d8893b671": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Recovery Services vaults should use customer-managed keys for encrypting backup data",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "enableDoubleEncryption-2e94d99a-8a36-4563-bc77-810d8893b671": {
        "type": "Boolean",
        "metadata": {
          "displayName": "Require that double encryption is enabled on Recovery Services vaults for Backup",
          "description": "Check if double encryption is enabled on Recovery Services vaults for Backup; for more information, visit https://aka.ms/ab-infraencryption"
        },
        "allowedValues": [
          true,
          false
        ],
        "defaultValue": true
      },
      "effect-1fafeaf6-7927-4059-a50a-8eb2a7a6f2b5": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Logic Apps Integration Service Environment should be encrypted with customer-managed keys",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-99e9ccd8-3db9-4592-b0d1-14b1715a4d8a": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Batch account should use customer-managed keys to encrypt data",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-1f68a601-6e6d-4e42-babf-3f643a047ea2": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Monitor Logs clusters should be encrypted with customer-managed key",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-f7d52b2d-e161-4dfa-a82b-55e564167385": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Synapse workspaces should use customer-managed keys to encrypt data at rest",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-7d7be79c-23ba-4033-84dd-45e2a5ccdd67": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Both operating systems and data disks in Azure Kubernetes Service clusters should be encrypted by customer-managed keys",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-ca91455f-eace-4f96-be59-e6e2c35b4816": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Managed disks should be double encrypted with both platform-managed and customer-managed keys",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-702dd420-7fcc-42c5-afe8-4026edd20fe0": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: OS and data disks should be encrypted with a customer-managed key",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-22bee202-a82f-4305-9a2a-6d7f44d4dedb": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Only secure connections to your Azure Cache for Redis should be enabled",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-404c3081-a854-4457-ae30-26a93ef643f9": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Secure transfer to storage accounts should be enabled",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-d0793b48-0edc-4296-a390-4c75d1bdfd71": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Container registries should not allow unrestricted network access",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-7d092e0a-7acd-40d2-a975-dca21cae48c4": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Cache for Redis should reside within a virtual network",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-2a1a9cdf-e04d-429a-8416-3bfb72a1b26f": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Storage accounts should restrict network access using virtual network rules",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-34c877ad-507e-4c82-993e-3452a6e0ad3c": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Storage accounts should restrict network access",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-55615ac9-af46-4a59-874e-391cc3dfb490": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Key Vault should disable public network access",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-1b8ca024-1d5c-4dec-8995-b1a932b41780": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Public network access on Azure SQL Database should be disabled",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-037eea7a-bd0a-46c5-9a66-03aea78705d3": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Cognitive Services accounts should restrict network access",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-53503636-bcc9-4748-9663-5348217f160f": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure SignalR Service should use private link",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-40cec1dd-a100-4920-b15b-3024fe8901ab": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Machine Learning workspaces should use private link",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-2154edb9-244f-4741-9970-660785bccdaa": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: VM Image Builder templates should use private link",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Disabled",
          "Deny"
        ],
        "defaultValue": "Audit"
      },
      "effect-0725b4dd-7e76-479c-a735-68e7ee23d5ca": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Cognitive Services accounts should disable public network access",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-5f0bc445-3935-4915-9981-011aa2b46147": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Private endpoint should be configured for Key Vault",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-af35e2a4-ef96-44e7-a9ae-853dd97032c4": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Spring Cloud should use network injection",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Disabled",
          "Deny"
        ],
        "defaultValue": "Audit"
      },
      "evaluatedSkuNames-af35e2a4-ef96-44e7-a9ae-853dd97032c4": {
        "type": "Array",
        "metadata": {
          "displayName": "Azure Spring Cloud SKUs that should use network injection",
          "description": "List of Azure Spring Cloud SKUs against which this policy will be evaluated"
        },
        "allowedValues": [
          "Standard"
        ],
        "defaultValue": [
          "Standard"
        ]
      },
      "effect-a049bf77-880b-470f-ba6d-9f21c530cf83": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Cognitive Search service should use a SKU that supports private link",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-52630df9-ca7e-442b-853b-c6ce548b31a2": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Web PubSub Service should use private link",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-4fa4b6c0-31ca-4c0d-b10d-24b96f62a751": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Storage account public access should be disallowed",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "audit",
          "deny",
          "disabled"
        ],
        "defaultValue": "audit"
      },
      "effect-ee980b6d-0eca-4501-8d54-f6290fd512c3": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Azure Cognitive Search services should disable public network access",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-1d84d5fb-01f6-4d12-ba4f-4a26081d403d": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Virtual machines should be migrated to new Azure Resource Manager resources",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "effect-37e0d2fe-28a5-43d6-a273-67d37d1f5606": {
        "type": "String",
        "metadata": {
          "displayName": "Effect for policy: Storage accounts should be migrated to new Azure Resource Manager resources",
          "description": "The effect determines what happens when the policy rule is evaluated to match; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      }
    },
    "policyDefinitions": [
      {
        "policyDefinitionReferenceId": "72650e9f-97bc-4b2a-ab5f-9781a9fcecbc",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/72650e9f-97bc-4b2a-ab5f-9781a9fcecbc",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "fc9b3da7-8347-4380-8e70-0a0361d8dedd",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fc9b3da7-8347-4380-8e70-0a0361d8dedd",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "bed48b13-6647-468e-aa2f-1af1d3f4dd40",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/bed48b13-6647-468e-aa2f-1af1d3f4dd40",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "NotAvailableMachineState": {
          "value": "[parameters('NotAvailableMachineState-bed48b13-6647-468e-aa2f-1af1d3f4dd40')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-3",
          "NIST_SP_800-53_R5_SI-3",
          "NIST_SP_800-53_R5_SI-16"
        ]
      },
      {
        "policyDefinitionReferenceId": "e6955644-301c-44b5-a4c4-528577de6861",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e6955644-301c-44b5-a4c4-528577de6861",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IA-5",
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "5b054a0d-39e2-4d53-bea3-9734cad2c69b",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5b054a0d-39e2-4d53-bea3-9734cad2c69b",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "da0f98fe-a24b-4ad5-af69-bd0400233661",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/da0f98fe-a24b-4ad5-af69-bd0400233661",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IA-5",
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "4ceb8dc2-559c-478b-a15b-733fbf1e3738",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4ceb8dc2-559c-478b-a15b-733fbf1e3738",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "5752e6d6-1206-46d8-8ab1-ecc2f71a8112",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5752e6d6-1206-46d8-8ab1-ecc2f71a8112",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "MinimumTLSVersion": {
          "value": "[parameters('MinimumTLSVersion-5752e6d6-1206-46d8-8ab1-ecc2f71a8112')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "630c64f9-8b6b-4c64-b511-6544ceff6fd6",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/630c64f9-8b6b-4c64-b511-6544ceff6fd6",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_IA-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "237b38db-ca4d-4259-9e47-7882441ca2c0",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/237b38db-ca4d-4259-9e47-7882441ca2c0",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "ea53dbee-c6c9-4f0e-9f9e-de0039b78023",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ea53dbee-c6c9-4f0e-9f9e-de0039b78023",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "bf16e0bb-31e1-4646-8202-60a235cc7e74",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/bf16e0bb-31e1-4646-8202-60a235cc7e74",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "a2d0e922-65d0-40c4-8f87-ea6da2d307a2",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a2d0e922-65d0-40c4-8f87-ea6da2d307a2",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "f6ec09a3-78bf-4f8f-99dc-6c77182d0f99",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f6ec09a3-78bf-4f8f-99dc-6c77182d0f99",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3"
        ]
      },
      {
        "policyDefinitionReferenceId": "383856f8-de7f-44a2-81fc-e5135b5c2aa4",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/383856f8-de7f-44a2-81fc-e5135b5c2aa4",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "f9be5368-9bf5-4b84-9e0a-7850da98bb46",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f9be5368-9bf5-4b84-9e0a-7850da98bb46",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "f8d36e2f-389b-4ee4-898d-21aeb69a0f45",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f8d36e2f-389b-4ee4-898d-21aeb69a0f45",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "b4330a05-a843-4bc8-bf9a-cacce50c67f4",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b4330a05-a843-4bc8-bf9a-cacce50c67f4",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "34f95f76-5386-4de7-b824-0d8478470c9d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/34f95f76-5386-4de7-b824-0d8478470c9d",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "cf820ca0-f99e-4f3e-84fb-66e913812d21",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/cf820ca0-f99e-4f3e-84fb-66e913812d21",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "83a214f7-d01a-484b-91a9-ed54470c9a6a",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/83a214f7-d01a-484b-91a9-ed54470c9a6a",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "057ef27e-665e-4328-8ea3-04b3122bd9fb",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/057ef27e-665e-4328-8ea3-04b3122bd9fb",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "c95c74d9-38fe-4f0d-af86-0c7d626a315c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c95c74d9-38fe-4f0d-af86-0c7d626a315c",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "428256e6-1fac-4f48-a757-df34c2b3336d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/428256e6-1fac-4f48-a757-df34c2b3336d",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "febd0533-8e55-448f-b837-bd0e06f16469",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/febd0533-8e55-448f-b837-bd0e06f16469",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-febd0533-8e55-448f-b837-bd0e06f16469')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          },
          "allowedContainerImagesRegex": {
          "value": "[parameters('allowedContainerImagesRegex-febd0533-8e55-448f-b837-bd0e06f16469')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "95edb821-ddaf-4404-9732-666045e056b4",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/95edb821-ddaf-4404-9732-666045e056b4",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-95edb821-ddaf-4404-9732-666045e056b4')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          },
          "excludedContainers": {
          "value": "[parameters('excludedContainers-95edb821-ddaf-4404-9732-666045e056b4')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "440b515e-a580-421e-abeb-b159a61ddcbc",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/440b515e-a580-421e-abeb-b159a61ddcbc",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-440b515e-a580-421e-abeb-b159a61ddcbc')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          },
          "allowedContainerPortsList": {
          "value": "[parameters('allowedContainerPortsList-440b515e-a580-421e-abeb-b159a61ddcbc')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "233a2a17-77ca-4fb1-9b6b-69223d272a44",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/233a2a17-77ca-4fb1-9b6b-69223d272a44",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-233a2a17-77ca-4fb1-9b6b-69223d272a44')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          },
          "allowedServicePortsList": {
          "value": "[parameters('allowedServicePortsList-233a2a17-77ca-4fb1-9b6b-69223d272a44')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "e345eecc-fa47-480f-9e88-67dcc122b164",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e345eecc-fa47-480f-9e88-67dcc122b164",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-e345eecc-fa47-480f-9e88-67dcc122b164')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          },
          "cpuLimit": {
          "value": "[parameters('cpuLimit-e345eecc-fa47-480f-9e88-67dcc122b164')]"
          },
          "memoryLimit": {
          "value": "[parameters('memoryLimit-e345eecc-fa47-480f-9e88-67dcc122b164')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "f06ddb64-5fa3-4b77-b166-acb36f7f6042",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f06ddb64-5fa3-4b77-b166-acb36f7f6042",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-f06ddb64-5fa3-4b77-b166-acb36f7f6042')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          },
          "runAsUserRule": {
          "value": "[parameters('runAsUserRule-f06ddb64-5fa3-4b77-b166-acb36f7f6042')]"
          },
          "runAsUserRanges": {
          "value": "[parameters('runAsUserRanges-f06ddb64-5fa3-4b77-b166-acb36f7f6042')]"
          },
          "runAsGroupRule": {
          "value": "[parameters('runAsGroupRule-f06ddb64-5fa3-4b77-b166-acb36f7f6042')]"
          },
          "runAsGroupRanges": {
          "value": "[parameters('runAsGroupRanges-f06ddb64-5fa3-4b77-b166-acb36f7f6042')]"
          },
          "supplementalGroupsRule": {
          "value": "[parameters('supplementalGroupsRule-f06ddb64-5fa3-4b77-b166-acb36f7f6042')]"
          },
          "supplementalGroupsRanges": {
          "value": "[parameters('supplementalGroupsRanges-f06ddb64-5fa3-4b77-b166-acb36f7f6042')]"
          },
          "fsGroupRule": {
          "value": "[parameters('fsGroupRule-f06ddb64-5fa3-4b77-b166-acb36f7f6042')]"
          },
          "fsGroupRanges": {
          "value": "[parameters('fsGroupRanges-f06ddb64-5fa3-4b77-b166-acb36f7f6042')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "1c6e92c9-99f0-4e55-9cf2-0c234dc48f99",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1c6e92c9-99f0-4e55-9cf2-0c234dc48f99",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-1c6e92c9-99f0-4e55-9cf2-0c234dc48f99')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-47a1ee2f-2a2a-4576-bf2a-e0e36709c2b8')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "df49d893-a74c-421d-bc95-c663042e5b80",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/df49d893-a74c-421d-bc95-c663042e5b80",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-df49d893-a74c-421d-bc95-c663042e5b80')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-1a5b4dca-0b6f-4cf5-907c-56316bc1bf3d')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "c26596ff-4d70-4e6a-9a30-c2506bd2f80c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c26596ff-4d70-4e6a-9a30-c2506bd2f80c",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-c26596ff-4d70-4e6a-9a30-c2506bd2f80c')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          },
          "allowedCapabilities": {
          "value": "[parameters('allowedCapabilities-c26596ff-4d70-4e6a-9a30-c2506bd2f80c')]"
          },
          "requiredDropCapabilities": {
          "value": "[parameters('requiredDropCapabilities-c26596ff-4d70-4e6a-9a30-c2506bd2f80c')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "511f5417-5d12-434d-ab2e-816901e72a5e",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/511f5417-5d12-434d-ab2e-816901e72a5e",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-511f5417-5d12-434d-ab2e-816901e72a5e')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          },
          "allowedProfiles": {
          "value": "[parameters('allowedProfiles-511f5417-5d12-434d-ab2e-816901e72a5e')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "82985f06-dc18-4a48-bc1c-b9f4f0098cfe",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/82985f06-dc18-4a48-bc1c-b9f4f0098cfe",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-82985f06-dc18-4a48-bc1c-b9f4f0098cfe')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          },
          "allowHostNetwork": {
          "value": "[parameters('allowHostNetwork-82985f06-dc18-4a48-bc1c-b9f4f0098cfe')]"
          },
          "minPort": {
          "value": "[parameters('minPort-82985f06-dc18-4a48-bc1c-b9f4f0098cfe')]"
          },
          "maxPort": {
          "value": "[parameters('maxPort-82985f06-dc18-4a48-bc1c-b9f4f0098cfe')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "098fc59e-46c7-4d99-9b16-64990e543d75",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/098fc59e-46c7-4d99-9b16-64990e543d75",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-098fc59e-46c7-4d99-9b16-64990e543d75')]"
          },
          "excludedNamespaces": {
          "value": "[parameters('excludedNamespaces')]"
          },
          "namespaces": {
          "value": "[parameters('namespaces')]"
          },
          "labelSelector": {
          "value": "[parameters('labelSelector')]"
          },
          "allowedHostPaths": {
          "value": "[parameters('allowedHostPaths-098fc59e-46c7-4d99-9b16-64990e543d75')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "b6e2945c-0b7b-40f5-9233-7a5323b5cdc6",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b6e2945c-0b7b-40f5-9233-7a5323b5cdc6",
        "parameters": {
          "resourceGroupName": {
          "value": "[parameters('resourceGroupName-b6e2945c-0b7b-40f5-9233-7a5323b5cdc6')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "7c1b1214-f927-48bf-8882-84f0af6588b1",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7c1b1214-f927-48bf-8882-84f0af6588b1",
        "parameters": {
          "includeAKSClusters": {
          "value": "[parameters('includeAKSClusters-7c1b1214-f927-48bf-8882-84f0af6588b1')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9",
        "parameters": {
          "setting": {
          "value": "[parameters('setting-a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "ef619a2c-cc4d-4d03-b2ba-8c94a834d85b",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ef619a2c-cc4d-4d03-b2ba-8c94a834d85b",
        "parameters": {
          "evaluatedSkuNames": {
          "value": "[parameters('evaluatedSkuNames-ef619a2c-cc4d-4d03-b2ba-8c94a834d85b')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "b54ed75b-3e1a-44ac-a333-05ba39b99ff0",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b54ed75b-3e1a-44ac-a333-05ba39b99ff0",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-b54ed75b-3e1a-44ac-a333-05ba39b99ff0')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2",
          "NIST_SP_800-53_R5_AC-2(1)",
          "NIST_SP_800-53_R5_AC-2(7)",
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_IA-2",
          "NIST_SP_800-53_R5_IA-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "71ef260a-8f18-47b7-abcb-62d0673d94dc",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/71ef260a-8f18-47b7-abcb-62d0673d94dc",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-71ef260a-8f18-47b7-abcb-62d0673d94dc')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2",
          "NIST_SP_800-53_R5_AC-2(1)",
          "NIST_SP_800-53_R5_AC-2(7)",
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_IA-2",
          "NIST_SP_800-53_R5_IA-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "055aa869-bc98-4af8-bafc-23f1ab6ffe2c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/055aa869-bc98-4af8-bafc-23f1ab6ffe2c",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-055aa869-bc98-4af8-bafc-23f1ab6ffe2c')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-5",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "564feb30-bf6a-4854-b4bb-0d2d2d1e6c66",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/564feb30-bf6a-4854-b4bb-0d2d2d1e6c66",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-564feb30-bf6a-4854-b4bb-0d2d2d1e6c66')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-5",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-862e97cf-49fc-4a5c-9de4-40d4e2e7c8eb')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "d9da03a1-f3c3-412a-9709-947156872263",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d9da03a1-f3c3-412a-9709-947156872263",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-d9da03a1-f3c3-412a-9709-947156872263')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "617c02be-7f02-4efd-8836-3180d47b6c68",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/617c02be-7f02-4efd-8836-3180d47b6c68",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-617c02be-7f02-4efd-8836-3180d47b6c68')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "0b60c0b2-2dc2-4e1c-b5c9-abbed971de53",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0b60c0b2-2dc2-4e1c-b5c9-abbed971de53",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-0b60c0b2-2dc2-4e1c-b5c9-abbed971de53')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CP-9"
        ]
      },
      {
        "policyDefinitionReferenceId": "1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-1e66c121-a66a-4b1f-9b83-0fd99bf0fc2d')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CP-9"
        ]
      },
      {
        "policyDefinitionReferenceId": "0a075868-4c26-42ef-914c-5bc007359560",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0a075868-4c26-42ef-914c-5bc007359560",
        "parameters": {
          "maximumValidityInMonths": {
          "value": "[parameters('maximumValidityInMonths-0a075868-4c26-42ef-914c-5bc007359560')]"
          },
          "effect": {
          "value": "[parameters('effect-0a075868-4c26-42ef-914c-5bc007359560')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IA-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "98728c90-32c7-4049-8429-847dc0f4fe37",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/98728c90-32c7-4049-8429-847dc0f4fe37",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-98728c90-32c7-4049-8429-847dc0f4fe37')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IA-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-152b15f7-8e1f-4c1f-ab71-8c010ba5dbc0')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IA-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "ec068d99-e9c7-401f-8cef-5bdde4e6ccf1",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ec068d99-e9c7-401f-8cef-5bdde4e6ccf1",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-ec068d99-e9c7-401f-8cef-5bdde4e6ccf1')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "c349d81b-9985-44ae-a8da-ff98d108ede8",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c349d81b-9985-44ae-a8da-ff98d108ede8",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-c349d81b-9985-44ae-a8da-ff98d108ede8')]"
          },
          "supportedSKUs": {
          "value": "[parameters('supportedSKUs-c349d81b-9985-44ae-a8da-ff98d108ede8')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "3657f5a0-770e-44a3-b44e-9431ba1e9735",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/3657f5a0-770e-44a3-b44e-9431ba1e9735",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-3657f5a0-770e-44a3-b44e-9431ba1e9735')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "b4ac1030-89c5-4697-8e00-28b5ba6a8811",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b4ac1030-89c5-4697-8e00-28b5ba6a8811",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-b4ac1030-89c5-4697-8e00-28b5ba6a8811')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "ea0dfaed-95fb-448c-934e-d6e713ce393d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ea0dfaed-95fb-448c-934e-d6e713ce393d",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-ea0dfaed-95fb-448c-934e-d6e713ce393d')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "3a58212a-c829-4f13-9872-6371df2fd0b4",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/3a58212a-c829-4f13-9872-6371df2fd0b4",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-3a58212a-c829-4f13-9872-6371df2fd0b4')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "24fba194-95d6-48c0-aea7-f65bf859c598",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/24fba194-95d6-48c0-aea7-f65bf859c598",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-24fba194-95d6-48c0-aea7-f65bf859c598')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "4733ea7b-a883-42fe-8cac-97454c2a9e4a",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4733ea7b-a883-42fe-8cac-97454c2a9e4a",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-4733ea7b-a883-42fe-8cac-97454c2a9e4a')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "f4b53539-8df9-40e4-86c6-6b607703bd4e",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f4b53539-8df9-40e4-86c6-6b607703bd4e",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-f4b53539-8df9-40e4-86c6-6b607703bd4e')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "41425d9f-d1a5-499a-9932-f8ed8453932c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/41425d9f-d1a5-499a-9932-f8ed8453932c",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-41425d9f-d1a5-499a-9932-f8ed8453932c')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "fc4d8e41-e223-45ea-9bf5-eada37891d87",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fc4d8e41-e223-45ea-9bf5-eada37891d87",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-fc4d8e41-e223-45ea-9bf5-eada37891d87')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "86efb160-8de7-451d-bc08-5d475b0aadae",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/86efb160-8de7-451d-bc08-5d475b0aadae",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-86efb160-8de7-451d-bc08-5d475b0aadae')]"
          },
          "supportedSKUs": {
          "value": "[parameters('supportedSKUs-86efb160-8de7-451d-bc08-5d475b0aadae')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "4ec52d6d-beb7-40c4-9a9e-fe753254690e",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4ec52d6d-beb7-40c4-9a9e-fe753254690e",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-4ec52d6d-beb7-40c4-9a9e-fe753254690e')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "64d314f6-6062-4780-a861-c23e8951bee5",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/64d314f6-6062-4780-a861-c23e8951bee5",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-64d314f6-6062-4780-a861-c23e8951bee5')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "1fd32ebd-e4c3-4e13-a54a-d7422d4d95f6",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1fd32ebd-e4c3-4e13-a54a-d7422d4d95f6",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-1fd32ebd-e4c3-4e13-a54a-d7422d4d95f6')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "fa298e57-9444-42ba-bf04-86e8470e32c7",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fa298e57-9444-42ba-bf04-86e8470e32c7",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-fa298e57-9444-42ba-bf04-86e8470e32c7')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "67121cc7-ff39-4ab8-b7e3-95b84dab487d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/67121cc7-ff39-4ab8-b7e3-95b84dab487d",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-67121cc7-ff39-4ab8-b7e3-95b84dab487d')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "1f905d99-2ab7-462c-a6b0-f709acca6c8f",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1f905d99-2ab7-462c-a6b0-f709acca6c8f",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-1f905d99-2ab7-462c-a6b0-f709acca6c8f')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "ba769a63-b8cc-4b2d-abf6-ac33c7204be8",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ba769a63-b8cc-4b2d-abf6-ac33c7204be8",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-ba769a63-b8cc-4b2d-abf6-ac33c7204be8')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "81e74cea-30fd-40d5-802f-d72103c2aaaa",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/81e74cea-30fd-40d5-802f-d72103c2aaaa",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-81e74cea-30fd-40d5-802f-d72103c2aaaa')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "0aa61e00-0a01-4a3c-9945-e93cffedf0e6",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0aa61e00-0a01-4a3c-9945-e93cffedf0e6",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-0aa61e00-0a01-4a3c-9945-e93cffedf0e6')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "47031206-ce96-41f8-861b-6a915f3de284",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/47031206-ce96-41f8-861b-6a915f3de284",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-47031206-ce96-41f8-861b-6a915f3de284')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "87ba29ef-1ab3-4d82-b763-87fcd4f531f7",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/87ba29ef-1ab3-4d82-b763-87fcd4f531f7",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-87ba29ef-1ab3-4d82-b763-87fcd4f531f7')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "51522a96-0869-4791-82f3-981000c2c67f",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/51522a96-0869-4791-82f3-981000c2c67f",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-51522a96-0869-4791-82f3-981000c2c67f')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "b5ec538c-daa0-4006-8596-35468b9148e8",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b5ec538c-daa0-4006-8596-35468b9148e8",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-b5ec538c-daa0-4006-8596-35468b9148e8')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "970f84d8-71b6-4091-9979-ace7e3fb6dbb",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/970f84d8-71b6-4091-9979-ace7e3fb6dbb",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-970f84d8-71b6-4091-9979-ace7e3fb6dbb')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "56a5ee18-2ae6-4810-86f7-18e39ce5629b",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/56a5ee18-2ae6-4810-86f7-18e39ce5629b",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-56a5ee18-2ae6-4810-86f7-18e39ce5629b')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "2e94d99a-8a36-4563-bc77-810d8893b671",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2e94d99a-8a36-4563-bc77-810d8893b671",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-2e94d99a-8a36-4563-bc77-810d8893b671')]"
          },
          "enableDoubleEncryption": {
          "value": "[parameters('enableDoubleEncryption-2e94d99a-8a36-4563-bc77-810d8893b671')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "1fafeaf6-7927-4059-a50a-8eb2a7a6f2b5",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1fafeaf6-7927-4059-a50a-8eb2a7a6f2b5",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-1fafeaf6-7927-4059-a50a-8eb2a7a6f2b5')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "99e9ccd8-3db9-4592-b0d1-14b1715a4d8a",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/99e9ccd8-3db9-4592-b0d1-14b1715a4d8a",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-99e9ccd8-3db9-4592-b0d1-14b1715a4d8a')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "1f68a601-6e6d-4e42-babf-3f643a047ea2",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1f68a601-6e6d-4e42-babf-3f643a047ea2",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-1f68a601-6e6d-4e42-babf-3f643a047ea2')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "f7d52b2d-e161-4dfa-a82b-55e564167385",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f7d52b2d-e161-4dfa-a82b-55e564167385",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-f7d52b2d-e161-4dfa-a82b-55e564167385')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "7d7be79c-23ba-4033-84dd-45e2a5ccdd67",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7d7be79c-23ba-4033-84dd-45e2a5ccdd67",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-7d7be79c-23ba-4033-84dd-45e2a5ccdd67')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "ca91455f-eace-4f96-be59-e6e2c35b4816",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ca91455f-eace-4f96-be59-e6e2c35b4816",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-ca91455f-eace-4f96-be59-e6e2c35b4816')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "702dd420-7fcc-42c5-afe8-4026edd20fe0",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/702dd420-7fcc-42c5-afe8-4026edd20fe0",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-702dd420-7fcc-42c5-afe8-4026edd20fe0')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "22bee202-a82f-4305-9a2a-6d7f44d4dedb",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/22bee202-a82f-4305-9a2a-6d7f44d4dedb",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-22bee202-a82f-4305-9a2a-6d7f44d4dedb')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "404c3081-a854-4457-ae30-26a93ef643f9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/404c3081-a854-4457-ae30-26a93ef643f9",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-404c3081-a854-4457-ae30-26a93ef643f9')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "d0793b48-0edc-4296-a390-4c75d1bdfd71",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d0793b48-0edc-4296-a390-4c75d1bdfd71",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-d0793b48-0edc-4296-a390-4c75d1bdfd71')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "7d092e0a-7acd-40d2-a975-dca21cae48c4",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7d092e0a-7acd-40d2-a975-dca21cae48c4",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-7d092e0a-7acd-40d2-a975-dca21cae48c4')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "2a1a9cdf-e04d-429a-8416-3bfb72a1b26f",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2a1a9cdf-e04d-429a-8416-3bfb72a1b26f",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-2a1a9cdf-e04d-429a-8416-3bfb72a1b26f')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "34c877ad-507e-4c82-993e-3452a6e0ad3c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/34c877ad-507e-4c82-993e-3452a6e0ad3c",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-34c877ad-507e-4c82-993e-3452a6e0ad3c')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "55615ac9-af46-4a59-874e-391cc3dfb490",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/55615ac9-af46-4a59-874e-391cc3dfb490",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-55615ac9-af46-4a59-874e-391cc3dfb490')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "1b8ca024-1d5c-4dec-8995-b1a932b41780",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1b8ca024-1d5c-4dec-8995-b1a932b41780",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-1b8ca024-1d5c-4dec-8995-b1a932b41780')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "037eea7a-bd0a-46c5-9a66-03aea78705d3",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/037eea7a-bd0a-46c5-9a66-03aea78705d3",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-037eea7a-bd0a-46c5-9a66-03aea78705d3')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "53503636-bcc9-4748-9663-5348217f160f",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/53503636-bcc9-4748-9663-5348217f160f",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-53503636-bcc9-4748-9663-5348217f160f')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "40cec1dd-a100-4920-b15b-3024fe8901ab",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/40cec1dd-a100-4920-b15b-3024fe8901ab",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-40cec1dd-a100-4920-b15b-3024fe8901ab')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "2154edb9-244f-4741-9970-660785bccdaa",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2154edb9-244f-4741-9970-660785bccdaa",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-2154edb9-244f-4741-9970-660785bccdaa')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "0725b4dd-7e76-479c-a735-68e7ee23d5ca",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0725b4dd-7e76-479c-a735-68e7ee23d5ca",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-0725b4dd-7e76-479c-a735-68e7ee23d5ca')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "5f0bc445-3935-4915-9981-011aa2b46147",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5f0bc445-3935-4915-9981-011aa2b46147",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-5f0bc445-3935-4915-9981-011aa2b46147')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "af35e2a4-ef96-44e7-a9ae-853dd97032c4",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/af35e2a4-ef96-44e7-a9ae-853dd97032c4",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-af35e2a4-ef96-44e7-a9ae-853dd97032c4')]"
          },
          "evaluatedSkuNames": {
          "value": "[parameters('evaluatedSkuNames-af35e2a4-ef96-44e7-a9ae-853dd97032c4')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "a049bf77-880b-470f-ba6d-9f21c530cf83",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a049bf77-880b-470f-ba6d-9f21c530cf83",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-a049bf77-880b-470f-ba6d-9f21c530cf83')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "52630df9-ca7e-442b-853b-c6ce548b31a2",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/52630df9-ca7e-442b-853b-c6ce548b31a2",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-52630df9-ca7e-442b-853b-c6ce548b31a2')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "4fa4b6c0-31ca-4c0d-b10d-24b96f62a751",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4fa4b6c0-31ca-4c0d-b10d-24b96f62a751",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-4fa4b6c0-31ca-4c0d-b10d-24b96f62a751')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "ee980b6d-0eca-4501-8d54-f6290fd512c3",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ee980b6d-0eca-4501-8d54-f6290fd512c3",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-ee980b6d-0eca-4501-8d54-f6290fd512c3')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "1d84d5fb-01f6-4d12-ba4f-4a26081d403d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1d84d5fb-01f6-4d12-ba4f-4a26081d403d",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-1d84d5fb-01f6-4d12-ba4f-4a26081d403d')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3"
        ]
      },
      {
        "policyDefinitionReferenceId": "37e0d2fe-28a5-43d6-a273-67d37d1f5606",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/37e0d2fe-28a5-43d6-a273-67d37d1f5606",
        "parameters": {
          "effect": {
          "value": "[parameters('effect-37e0d2fe-28a5-43d6-a273-67d37d1f5606')]"
          }
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3"
        ]
      },
      {
        "policyDefinitionReferenceId": "b52376f7-9612-48a1-81cd-1ffe4b61032c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b52376f7-9612-48a1-81cd-1ffe4b61032c",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "6b1cbf55-e8b6-442f-ba4c-7246b6381474",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6b1cbf55-e8b6-442f-ba4c-7246b6381474",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "1f314764-cb73-4fc9-b863-8eca98ac36e9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1f314764-cb73-4fc9-b863-8eca98ac36e9",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2",
          "NIST_SP_800-53_R5_AC-2(1)",
          "NIST_SP_800-53_R5_AC-2(7)",
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_IA-2",
          "NIST_SP_800-53_R5_IA-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "ac4a19c2-fa67-49b4-8ae5-0b2e78c49457",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ac4a19c2-fa67-49b4-8ae5-0b2e78c49457",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3(7)"
        ]
      },
      {
        "policyDefinitionReferenceId": "5744710e-cc2f-4ee8-8809-3b11e89f4bc9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5744710e-cc2f-4ee8-8809-3b11e89f4bc9",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "08e6af2d-db70-460a-bfe9-d5bd474ba9d6",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/08e6af2d-db70-460a-bfe9-d5bd474ba9d6",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-4(3)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "09024ccc-0c5f-475e-9457-b7c0d9ed487b",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/09024ccc-0c5f-475e-9457-b7c0d9ed487b",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "4f11b553-d42e-4e3a-89be-32ca364cad4c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4f11b553-d42e-4e3a-89be-32ca364cad4c",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2",
          "NIST_SP_800-53_R5_AC-6",
          "NIST_SP_800-53_R5_AC-6(7)"
        ]
      },
      {
        "policyDefinitionReferenceId": "abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/abfb7388-5bf4-4ad7-ba99-2cd2f41cebb9",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AC-16",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "0e60b895-3786-45da-8377-9c6b4b6ac5f9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0e60b895-3786-45da-8377-9c6b4b6ac5f9",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/abfb4388-5bf4-4ad7-ba82-2cd2f41ceae9",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-16",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "89099bee-89e0-4b26-a5f4-165451757743",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/89099bee-89e0-4b26-a5f4-165451757743",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-11"
        ]
      },
      {
        "policyDefinitionReferenceId": "4da35fc9-c9e7-4960-aec9-797fe7d9051d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4da35fc9-c9e7-4960-aec9-797fe7d9051d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_CM-7",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SC-3",
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-3",
          "NIST_SP_800-53_R5_SI-4",
          "NIST_SP_800-53_R5_SI-16"
        ]
      },
      {
        "policyDefinitionReferenceId": "47a6b606-51aa-4496-8bb7-64b11cf66adc",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/47a6b606-51aa-4496-8bb7-64b11cf66adc",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-7",
          "NIST_SP_800-53_R5_CM-7(2)",
          "NIST_SP_800-53_R5_CM-7(5)",
          "NIST_SP_800-53_R5_CM-10",
          "NIST_SP_800-53_R5_CM-11"
        ]
      },
      {
        "policyDefinitionReferenceId": "0ec47710-77ff-4a3d-9181-6aa50af424d0",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0ec47710-77ff-4a3d-9181-6aa50af424d0",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CP-6",
          "NIST_SP_800-53_R5_CP-6(1)",
          "NIST_SP_800-53_R5_CP-9"
        ]
      },
      {
        "policyDefinitionReferenceId": "0015ea4d-51ff-4ce3-8d8c-f3f8f0179a56",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0015ea4d-51ff-4ce3-8d8c-f3f8f0179a56",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CP-7"
        ]
      },
      {
        "policyDefinitionReferenceId": "013e242c-8828-4970-87b3-ab247555486d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/013e242c-8828-4970-87b3-ab247555486d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CP-9"
        ]
      },
      {
        "policyDefinitionReferenceId": "aa633080-8b72-40c4-a2d7-d00c03e80bed",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/aa633080-8b72-40c4-a2d7-d00c03e80bed",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_IA-2",
          "NIST_SP_800-53_R5_IA-2(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "e3576e28-8b17-4677-84c3-db2990658d64",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e3576e28-8b17-4677-84c3-db2990658d64",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_IA-2",
          "NIST_SP_800-53_R5_IA-2(2)"
        ]
      },
      {
        "policyDefinitionReferenceId": "6646a0bd-e110-40ca-bb97-84fcee63c414",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6646a0bd-e110-40ca-bb97-84fcee63c414",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(7)",
          "NIST_SP_800-53_R5_IA-2",
          "NIST_SP_800-53_R5_IA-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "3cf2ab00-13f1-4d0c-8971-2ac904541a7e",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/3cf2ab00-13f1-4d0c-8971-2ac904541a7e",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_IA-5",
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4f4f78b8-e367-4b10-a341-d9a4ad5cf1c7",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_IR-6(2)",
          "NIST_SP_800-53_R5_SI-4(12)"
        ]
      },
      {
        "policyDefinitionReferenceId": "3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "a7aca53f-2ed4-4466-a25e-0b45ade68efd",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a7aca53f-2ed4-4466-a25e-0b45ade68efd",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "0d134df8-db83-46fb-ad72-fe0c9428c8dd",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0d134df8-db83-46fb-ad72-fe0c9428c8dd",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "0961003e-5a0a-4549-abde-af6a37f2724d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0961003e-5a0a-4549-abde-af6a37f2724d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "c3f317a7-a95c-4547-b7e7-11017ebdf2fe",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c3f317a7-a95c-4547-b7e7-11017ebdf2fe",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "26a828e1-e88f-464e-bbb3-c134a282b9de",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/26a828e1-e88f-464e-bbb3-c134a282b9de",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-3",
          "NIST_SP_800-53_R5_SI-3"
        ]
      },
      {
        "policyDefinitionReferenceId": "ebb62a0c-3560-49e1-89ed-27e074e9f8ad",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ebb62a0c-3560-49e1-89ed-27e074e9f8ad",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "b0f33259-77d7-4c9e-aac6-3aabcfae693c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b0f33259-77d7-4c9e-aac6-3aabcfae693c",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-4(3)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "a451c1ef-c6ca-483d-87ed-f49761e3ffb5",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a451c1ef-c6ca-483d-87ed-f49761e3ffb5",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2",
          "NIST_SP_800-53_R5_AC-2(7)",
          "NIST_SP_800-53_R5_AC-6",
          "NIST_SP_800-53_R5_AC-6(7)"
        ]
      },
      {
        "policyDefinitionReferenceId": "cb510bfd-1cba-4d9f-a230-cb0976f4bb71",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/cb510bfd-1cba-4d9f-a230-cb0976f4bb71",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "123a3936-f020-408a-ba0c-47873faf1534",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/123a3936-f020-408a-ba0c-47873faf1534",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-7",
          "NIST_SP_800-53_R5_CM-7(2)",
          "NIST_SP_800-53_R5_CM-7(5)",
          "NIST_SP_800-53_R5_CM-10",
          "NIST_SP_800-53_R5_CM-11"
        ]
      },
      {
        "policyDefinitionReferenceId": "48af4db5-9b8b-401c-8e74-076be876a430",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/48af4db5-9b8b-401c-8e74-076be876a430",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CP-6",
          "NIST_SP_800-53_R5_CP-6(1)",
          "NIST_SP_800-53_R5_CP-9"
        ]
      },
      {
        "policyDefinitionReferenceId": "9297c21d-2ed6-4474-b48f-163f75654ce3",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9297c21d-2ed6-4474-b48f-163f75654ce3",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_IA-2",
          "NIST_SP_800-53_R5_IA-2(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "0da106f2-4ca3-48e8-bc85-c638fe6aea8f",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0da106f2-4ca3-48e8-bc85-c638fe6aea8f",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2",
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_IA-2",
          "NIST_SP_800-53_R5_IA-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "497dff13-db2a-4c0f-8603-28fa3b331ab6",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/497dff13-db2a-4c0f-8603-28fa3b331ab6",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_IA-5",
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "6e2593d9-add6-4083-9c9b-4b7d2188c899",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6e2593d9-add6-4083-9c9b-4b7d2188c899",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_IR-6(2)",
          "NIST_SP_800-53_R5_SI-4(12)"
        ]
      },
      {
        "policyDefinitionReferenceId": "e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "9daedab3-fb2d-461e-b861-71790eead4f6",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "a4af4a39-4135-47fb-b175-47fbdf85311d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a4af4a39-4135-47fb-b175-47fbdf85311d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "048248b0-55cd-46da-b1ff-39efd52db260",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/048248b0-55cd-46da-b1ff-39efd52db260",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "17k78e20-9358-41c9-923c-fb736d382a12",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/17k78e20-9358-41c9-923c-fb736d382a12",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "af6cd1bd-1635-48cb-bde7-5b15693900b9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/af6cd1bd-1635-48cb-bde7-5b15693900b9",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-3",
          "NIST_SP_800-53_R5_SI-3"
        ]
      },
      {
        "policyDefinitionReferenceId": "f8456c1c-aa66-4dfb-861a-25d127b775c9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f8456c1c-aa66-4dfb-861a-25d127b775c9",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "e9c8d085-d9cc-4b17-9cdc-059f1f01f19e",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e9c8d085-d9cc-4b17-9cdc-059f1f01f19e",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "0e6763cc-5078-4e64-889d-ff4d9a839047",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0e6763cc-5078-4e64-889d-ff4d9a839047",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "358c20a6-3f9e-4f0e-97ff-c6ce485e2aac",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/358c20a6-3f9e-4f0e-97ff-c6ce485e2aac",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "82339799-d096-41ae-8538-b108becf0970",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/82339799-d096-41ae-8538-b108becf0970",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CP-6",
          "NIST_SP_800-53_R5_CP-6(1)",
          "NIST_SP_800-53_R5_CP-9"
        ]
      },
      {
        "policyDefinitionReferenceId": "2b9ad585-36bc-4615-b300-fd4435808332",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2b9ad585-36bc-4615-b300-fd4435808332",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2",
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_IA-2",
          "NIST_SP_800-53_R5_IA-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "385f5831-96d4-41db-9a3c-cd3af78aaae6",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/385f5831-96d4-41db-9a3c-cd3af78aaae6",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_IA-5",
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "0b15565f-aa9e-48ba-8619-45960f2c314d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0b15565f-aa9e-48ba-8619-45960f2c314d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_IR-6(2)",
          "NIST_SP_800-53_R5_SI-4(12)"
        ]
      },
      {
        "policyDefinitionReferenceId": "feedbf84-6b99-488c-acc2-71c829aa5ffc",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/feedbf84-6b99-488c-acc2-71c829aa5ffc",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "b7ddfbdc-1260-477d-91fd-98bd9be789a6",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b7ddfbdc-1260-477d-91fd-98bd9be789a6",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "cc9835f2-9f6b-4cc8-ab4a-f8ef615eb349",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/cc9835f2-9f6b-4cc8-ab4a-f8ef615eb349",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "86b3d65f-7626-441e-b690-81a8b71cff60",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/86b3d65f-7626-441e-b690-81a8b71cff60",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "fc5e4038-4584-4632-8c85-c0448d374b2c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fc5e4038-4584-4632-8c85-c0448d374b2c",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "5f76cf89-fbf2-47fd-a3f4-b891fa780b60",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5f76cf89-fbf2-47fd-a3f4-b891fa780b60",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "e71308d3-144b-4262-b144-efdc3cc90517",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e71308d3-144b-4262-b144-efdc3cc90517",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "7fe3b40f-802b-4cdd-8bd4-fd799c948cc2",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7fe3b40f-802b-4cdd-8bd4-fd799c948cc2",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "d62cfe2b-3ab0-4d41-980d-76803b58ca65",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d62cfe2b-3ab0-4d41-980d-76803b58ca65",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "0820b7b9-23aa-4725-a1ce-ae4558f718e5",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0820b7b9-23aa-4725-a1ce-ae4558f718e5",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "c4d441f8-f9d9-4a9e-9cef-e82117cb3eef",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c4d441f8-f9d9-4a9e-9cef-e82117cb3eef",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2",
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_IA-2",
          "NIST_SP_800-53_R5_IA-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "331e8ea8-378a-410f-a2e5-ae22f38bb0da",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/331e8ea8-378a-410f-a2e5-ae22f38bb0da",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-3",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_IA-5",
          "NIST_SP_800-53_R5_IA-5(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_RA-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "bd352bd5-2853-4985-bf0d-73806b4a5744",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/bd352bd5-2853-4985-bf0d-73806b4a5744",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-5",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "5c607a2e-c700-4744-8254-d77e7c9eb5e4",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5c607a2e-c700-4744-8254-d77e7c9eb5e4",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "f6de0be7-9a8a-4b8a-b349-43cf02d22f7c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f6de0be7-9a8a-4b8a-b349-43cf02d22f7c",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "6581d072-105e-4418-827f-bd446d56421b",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6581d072-105e-4418-827f-bd446d56421b",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "a4fe33eb-e377-4efb-ab31-0784311bc499",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a4fe33eb-e377-4efb-ab31-0784311bc499",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "501541f7-f7e7-4cd6-868c-4190fdad3ac9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/501541f7-f7e7-4cd6-868c-4190fdad3ac9",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2"
        ]
      },
      {
        "policyDefinitionReferenceId": "6fac406b-40ca-413b-bf8e-0bf964659c25",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6fac406b-40ca-413b-bf8e-0bf964659c25",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "bb91dfba-c30d-4263-9add-9c2384e659a6",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/bb91dfba-c30d-4263-9add-9c2384e659a6",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "308fbb08-4ab8-4e67-9b29-592e93fb94fa",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/308fbb08-4ab8-4e67-9b29-592e93fb94fa",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "a3a6ea0c-e018-4933-9ef0-5aaa1501449b",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a3a6ea0c-e018-4933-9ef0-5aaa1501449b",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "0a15ec92-a229-4763-bb14-0ea34a568f8d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0a15ec92-a229-4763-bb14-0ea34a568f8d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "2913021d-f2fd-4f3d-b958-22354e2bdbcb",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2913021d-f2fd-4f3d-b958-22354e2bdbcb",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "ae89ebca-1c92-4898-ac2c-9f63decb045c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ae89ebca-1c92-4898-ac2c-9f63decb045c",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "8cb6aa8b-9e41-4f4e-aa25-089a7ac2581e",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/8cb6aa8b-9e41-4f4e-aa25-089a7ac2581e",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "0e246bcf-5f6f-4f87-bc6f-775d4712c7ea",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0e246bcf-5f6f-4f87-bc6f-775d4712c7ea",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "c25d9a16-bc35-4e15-a7e5-9db606bf9ed4",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c25d9a16-bc35-4e15-a7e5-9db606bf9ed4",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "d26f7642-7545-4e18-9b75-8c9bbdee3a9a",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d26f7642-7545-4e18-9b75-8c9bbdee3a9a",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "e8cbc669-f12d-49eb-93e7-9273119e9933",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e8cbc669-f12d-49eb-93e7-9273119e9933",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_RA-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "d158790f-bfb0-486c-8631-2dc6b4e8e6af",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d158790f-bfb0-486c-8631-2dc6b4e8e6af",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "83cef61d-dbd1-4b20-a4fc-5fbc7da10833",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/83cef61d-dbd1-4b20-a4fc-5fbc7da10833",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "523b5cd1-3e23-492f-a539-13118b6d1e3a",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/523b5cd1-3e23-492f-a539-13118b6d1e3a",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "d69b1763-b96d-40b8-a2d9-ca31e9fd0d3e",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d69b1763-b96d-40b8-a2d9-ca31e9fd0d3e",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "6ba6d016-e7c3-4842-b8f2-4992ebc0d72d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6ba6d016-e7c3-4842-b8f2-4992ebc0d72d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_RA-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "22730e10-96f6-4aac-ad84-9383d35b5917",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/22730e10-96f6-4aac-ad84-9383d35b5917",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "e802a67a-daf5-4436-9ea6-f6d821dd0c5d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e802a67a-daf5-4436-9ea6-f6d821dd0c5d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "18adea5e-f416-4d0f-8aa8-d24321e3e274",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/18adea5e-f416-4d0f-8aa8-d24321e3e274",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "0564d078-92f5-4f97-8398-b9f58a51f70b",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0564d078-92f5-4f97-8398-b9f58a51f70b",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "842c54e8-c2f9-4d79-ae8d-38d8b8019373",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/842c54e8-c2f9-4d79-ae8d-38d8b8019373",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "1b7aa243-30e4-4c9e-bca8-d0d3022b634a",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1b7aa243-30e4-4c9e-bca8-d0d3022b634a",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_RA-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "0a1302fb-a631-4106-9753-f3d494733990",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0a1302fb-a631-4106-9753-f3d494733990",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "8dfab9c4-fe7b-49ad-85e4-1e9be085358f",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/8dfab9c4-fe7b-49ad-85e4-1e9be085358f",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "475aae12-b88a-4572-8b36-9b712b2b3a17",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/475aae12-b88a-4572-8b36-9b712b2b3a17",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "0049a6b3-a662-4f3e-8635-39cf44ace45a",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0049a6b3-a662-4f3e-8635-39cf44ace45a",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_RA-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "f9d614c5-c173-4d56-95a7-b4437057d193",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f9d614c5-c173-4d56-95a7-b4437057d193",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "7595c971-233d-4bcf-bd18-596129188c49",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7595c971-233d-4bcf-bd18-596129188c49",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "c3d20c29-b36d-48fe-808b-99a87530ad99",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c3d20c29-b36d-48fe-808b-99a87530ad99",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "2f2ee1de-44aa-4762-b6bd-0893fc3f306d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2f2ee1de-44aa-4762-b6bd-0893fc3f306d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "399b2637-a50f-4f95-96f8-3a145476eb15",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/399b2637-a50f-4f95-96f8-3a145476eb15",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "bdc59948-5574-49b3-bb91-76b7c986428d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/bdc59948-5574-49b3-bb91-76b7c986428d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-2(12)",
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_IR-4",
          "NIST_SP_800-53_R5_IR-5",
          "NIST_SP_800-53_R5_RA-5",
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "04c4380f-3fae-46e8-96c9-30193528f602",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/04c4380f-3fae-46e8-96c9-30193528f602",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6",
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)",
          "NIST_SP_800-53_R5_SI-4"
        ]
      },
      {
        "policyDefinitionReferenceId": "4d24b6d4-5e53-4a4f-a7f4-618fa573ee4b",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4d24b6d4-5e53-4a4f-a7f4-618fa573ee4b",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "295fc8b1-dc9f-4f53-9c61-3f313ceab40a",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/295fc8b1-dc9f-4f53-9c61-3f313ceab40a",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "fb74e86f-d351-4b8d-b034-93da7391c01f",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fb74e86f-d351-4b8d-b034-93da7391c01f",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-28",
          "NIST_SP_800-53_R5_SC-28(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "e8eef0a8-67cf-4eb4-9386-14b0e78733d4",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e8eef0a8-67cf-4eb4-9386-14b0e78733d4",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "fdccbe47-f3e3-4213-ad5d-ea459b2fa077",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fdccbe47-f3e3-4213-ad5d-ea459b2fa077",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "9a1b8c48-453a-4044-86c3-d8bfd823e4f5",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9a1b8c48-453a-4044-86c3-d8bfd823e4f5",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-8",
          "NIST_SP_800-53_R5_SC-8(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "ca610c1d-041c-4332-9d88-7ed3094967c7",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ca610c1d-041c-4332-9d88-7ed3094967c7",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "d9844e8a-1437-4aeb-a32c-0c992f056095",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d9844e8a-1437-4aeb-a32c-0c992f056095",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "9830b652-8523-49cc-b1b3-e17dce1127ca",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9830b652-8523-49cc-b1b3-e17dce1127ca",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "4b90e17e-8448-49db-875e-bd83fb6f804f",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4b90e17e-8448-49db-875e-bd83fb6f804f",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "fb893a29-21bb-418c-a157-e99480ec364c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fb893a29-21bb-418c-a157-e99480ec364c",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "1bc1795e-d44a-4d48-9b3b-6fff0fd5f9ba",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1bc1795e-d44a-4d48-9b3b-6fff0fd5f9ba",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "a1ad735a-e96f-45d2-a7b2-9a4932cab7ec",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a1ad735a-e96f-45d2-a7b2-9a4932cab7ec",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "7261b898-8a84-4db8-9e04-18527132abb3",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7261b898-8a84-4db8-9e04-18527132abb3",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "5bb220d9-2698-4ee4-8404-b9c30c9df609",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5bb220d9-2698-4ee4-8404-b9c30c9df609",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "496223c3-ad65-4ecd-878a-bae78737e9ed",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/496223c3-ad65-4ecd-878a-bae78737e9ed",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "eaebaea7-8013-4ceb-9d14-7eb32271373c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/eaebaea7-8013-4ceb-9d14-7eb32271373c",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "9d0b6ea4-93e2-4578-bf2f-6bb17d22b4bc",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9d0b6ea4-93e2-4578-bf2f-6bb17d22b4bc",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "0c192fe8-9cbb-4516-85b3-0ade8bd03886",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0c192fe8-9cbb-4516-85b3-0ade8bd03886",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CM-6"
        ]
      },
      {
        "policyDefinitionReferenceId": "5f0f936f-2f01-4bf5-b6be-d423792fa562",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5f0f936f-2f01-4bf5-b6be-d423792fa562",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_RA-5"
        ]
      },
      {
        "policyDefinitionReferenceId": "88999f4c-376a-45c8-bcb3-4058f713cf39",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/88999f4c-376a-45c8-bcb3-4058f713cf39",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "6edd7eda-6dd8-40f7-810d-67160c639cd9",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6edd7eda-6dd8-40f7-810d-67160c639cd9",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "7008174a-fd10-4ef0-817e-fc820a951d73",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7008174a-fd10-4ef0-817e-fc820a951d73",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "7698e800-9299-47a6-b3b6-5a0fee576eed",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7698e800-9299-47a6-b3b6-5a0fee576eed",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "7238174a-fd10-4ef0-817e-fc820a951d73",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7238174a-fd10-4ef0-817e-fc820a951d73",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "74c3584d-afae-46f7-a20a-6f8adba71a16",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/74c3584d-afae-46f7-a20a-6f8adba71a16",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "0fda3595-9f2b-4592-8675-4231d6fa82fe",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0fda3595-9f2b-4592-8675-4231d6fa82fe",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "cddd188c-4b82-4c48-a19d-ddf74ee66a01",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/cddd188c-4b82-4c48-a19d-ddf74ee66a01",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "051cba44-2429-45b9-9649-46cec11c7119",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/051cba44-2429-45b9-9649-46cec11c7119",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SC-12"
        ]
      },
      {
        "policyDefinitionReferenceId": "8b0323be-cc25-4b61-935d-002c3798c6ea",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/8b0323be-cc25-4b61-935d-002c3798c6ea",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "f39f5f49-4abf-44de-8c70-0756997bfb51",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f39f5f49-4abf-44de-8c70-0756997bfb51",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "58440f8a-10c5-4151-bdce-dfbaad4a20b7",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/58440f8a-10c5-4151-bdce-dfbaad4a20b7",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "7803067c-7d34-46e3-8c79-0ca68fc4036d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7803067c-7d34-46e3-8c79-0ca68fc4036d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "b8564268-eb4a-4337-89be-a19db070c59d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b8564268-eb4a-4337-89be-a19db070c59d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "df39c015-56a4-45de-b4a3-efe77bed320d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/df39c015-56a4-45de-b4a3-efe77bed320d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "1c06e275-d63d-4540-b761-71f364c2111d",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1c06e275-d63d-4540-b761-71f364c2111d",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "1d320205-c6a1-4ac6-873d-46224024e8e2",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1d320205-c6a1-4ac6-873d-46224024e8e2",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "b607c5de-e7d9-4eee-9e5c-83f1bcee4fa0",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b607c5de-e7d9-4eee-9e5c-83f1bcee4fa0",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AU-6(4)",
          "NIST_SP_800-53_R5_AU-6(5)",
          "NIST_SP_800-53_R5_AU-12",
          "NIST_SP_800-53_R5_AU-12(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "1ee56206-5dd1-42ab-b02d-8aae8b1634ce",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1ee56206-5dd1-42ab-b02d-8aae8b1634ce",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "72d11df1-dd8a-41f7-8925-b05b960ebafc",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/72d11df1-dd8a-41f7-8925-b05b960ebafc",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_AC-4",
          "NIST_SP_800-53_R5_AC-17",
          "NIST_SP_800-53_R5_AC-17(1)",
          "NIST_SP_800-53_R5_SC-7",
          "NIST_SP_800-53_R5_SC-7(3)"
        ]
      },
      {
        "policyDefinitionReferenceId": "bf045164-79ba-4215-8f95-f8048dc1780b",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/bf045164-79ba-4215-8f95-f8048dc1780b",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CP-6",
          "NIST_SP_800-53_R5_CP-6(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "d38fc420-0735-4ef3-ac11-c806f651a570",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d38fc420-0735-4ef3-ac11-c806f651a570",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_CP-6",
          "NIST_SP_800-53_R5_CP-6(1)"
        ]
      },
      {
        "policyDefinitionReferenceId": "991310cd-e9f3-47bc-b7b6-f57b557d07db",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/991310cd-e9f3-47bc-b7b6-f57b557d07db",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "e2c1c086-2d84-4019-bff3-c44ccd95113c",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e2c1c086-2d84-4019-bff3-c44ccd95113c",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      },
      {
        "policyDefinitionReferenceId": "8c122334-9d20-4eb8-89ea-ac9a705b74ae",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/8c122334-9d20-4eb8-89ea-ac9a705b74ae",
        "parameters": {
          
        },
        "groupNames": [
          "NIST_SP_800-53_R5_SI-2",
          "NIST_SP_800-53_R5_SI-2(6)"
        ]
      }
    ],
    "policyDefinitionGroups": [
      {
        "name": "NIST_SP_800-53_R5_AC-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-1"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(11)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(11)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-2(13)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-2(13)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(11)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(11)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(13)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(13)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(14)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(14)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-3(15)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-3(15)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(11)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(11)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(13)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(13)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(14)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(14)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(15)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(15)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(17)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(17)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(19)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(19)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(20)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(20)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(21)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(21)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(22)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(22)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(23)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(23)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(24)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(24)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(25)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(25)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(26)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(26)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(27)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(27)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(28)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(28)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(29)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(29)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(30)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(30)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(31)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(31)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-4(32)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-4(32)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-5"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-6(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-6(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-7"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-7(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-7(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-7(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-7(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-7(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-7(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-8"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-9"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-9(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-9(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-9(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-9(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-9(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-9(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-9(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-9(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-10"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-11"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-11(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-11(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-12",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-12"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-12(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-12(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-12(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-12(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-12(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-12(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-14",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-14"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-16(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-16(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-17",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-17"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-17(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-17(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-17(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-17(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-17(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-17(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-17(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-17(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-17(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-17(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-17(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-17(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-17(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-17(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-18",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-18"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-18(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-18(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-18(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-18(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-18(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-18(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-18(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-18(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-19",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-19"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-19(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-19(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-19(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-19(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-20",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-20"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-20(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-20(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-20(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-20(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-20(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-20(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-20(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-20(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-20(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-20(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-21",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-21"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-21(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-21(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-21(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-21(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-22",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-22"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-23",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-23"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-24",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-24"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-24(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-24(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-24(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-24(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AC-25",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AC-25"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-1"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-2"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-2(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-2(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-2(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-2(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-2(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-2(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-2(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-2(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-3"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-3(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-3(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-4"
      },
      {
        "name": "NIST_SP_800-53_R5_AT-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AT-6"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-1"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-2"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-3"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-4"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-5"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-5(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-5(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-5(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-5(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-5(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-5(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-5(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-5(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-5(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-5(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-6"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-6(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-6(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-6(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-6(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-6(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-6(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-6(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-6(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-6(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-6(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-6(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-6(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-6(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-6(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-7"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-7(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-7(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-8"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-9"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-9(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-9(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-9(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-9(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-9(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-9(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-9(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-9(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-9(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-9(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-9(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-9(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-9(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-9(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-10"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-10(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-10(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-10(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-10(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-10(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-10(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-10(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-10(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-11"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-11(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-11(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-12",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-12"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-12(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-12(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-12(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-12(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-12(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-12(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-12(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-12(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-13",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-13"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-13(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-13(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-13(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-13(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-13(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-13(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-14",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-14"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-14(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-14(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-14(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-14(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-16",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-16"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-16(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-16(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-16(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-16(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_AU-16(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_AU-16(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-1"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-2"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-2(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-2(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-3"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-3(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-3(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-3(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-3(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-5"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-5(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-5(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-6"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-7"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-7(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-7(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-7(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-7(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-7(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-7(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-7(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-7(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-7(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-7(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-8"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-8(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-8(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-8(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-8(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-8(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-8(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-9"
      },
      {
        "name": "NIST_SP_800-53_R5_CA-9(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CA-9(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-1"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-2"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-2(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-2(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-2(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-2(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-2(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-2(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-3"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-3(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-3(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-3(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-3(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-3(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-3(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-3(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-3(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-3(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-3(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-4"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-5"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-5(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-5(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-5(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-5(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-5(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-5(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-5(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-5(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-6"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-7"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-7(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-7(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-7(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-7(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-7(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-7(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-7(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-7(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-7(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-7(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-7(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-7(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-7(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-7(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-7(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-7(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-7(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-7(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-8"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-8(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-8(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-8(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-8(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-8(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-8(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-8(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-8(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-8(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-8(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-8(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-8(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-8(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-8(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-8(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-8(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-9"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-9(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-9(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-10"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-10(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-10(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-11"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-11(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-11(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-11(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-11(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-12",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-12"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-12(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-12(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-13",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-13"
      },
      {
        "name": "NIST_SP_800-53_R5_CM-14",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CM-14"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-1"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-2"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-2(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-2(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-2(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-2(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-2(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-2(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-2(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-2(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-2(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-2(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-3"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-4"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-4(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-4(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-4(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-4(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-4(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-4(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-6"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-6(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-6(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-7"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-7(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-7(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-7(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-7(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-7(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-7(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-7(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-7(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-7(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-7(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-8"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-8(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-8(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-8(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-8(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-8(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-8(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-8(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-8(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-8(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-8(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-9"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-9(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-9(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-9(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-9(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-9(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-9(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-9(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-9(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-9(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-9(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-9(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-9(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-9(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-9(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-10"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-10(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-10(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-10(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-10(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-10(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-10(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-11"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-12",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-12"
      },
      {
        "name": "NIST_SP_800-53_R5_CP-13",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_CP-13"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-1"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-2"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-2(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-2(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-2(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-2(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-2(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-2(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-2(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-2(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-2(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-2(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-2(13)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-2(13)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-3"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-3(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-3(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-4"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-4(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-4(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-4(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-4(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-4(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-4(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-4(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-4(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-4(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-4(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(13)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(13)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(14)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(14)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(15)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(15)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(16)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(16)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(17)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(17)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-5(18)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-5(18)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-6"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-7"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-8"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-8(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-8(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-8(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-8(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-8(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-8(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-8(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-8(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-8(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-8(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-9"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-10"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-11"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-12",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-12"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-12(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-12(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-12(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-12(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-12(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-12(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-12(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-12(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-12(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-12(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_IA-12(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IA-12(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-1"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-2"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-2(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-2(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-3"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(11)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(11)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(13)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(13)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(14)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(14)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-4(15)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-4(15)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-5"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-5(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-5(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-6"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-6(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-6(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-7"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-7(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-7(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-7(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-7(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-8"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-8(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-8(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-9"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-9(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-9(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-9(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-9(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_IR-9(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_IR-9(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-1"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-2"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-3"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-3(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-3(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-3(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-3(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-3(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-3(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-4"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-4(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-4(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-4(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-4(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-4(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-4(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-4(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-4(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-4(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-4(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-5"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-5(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-5(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-5(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-5(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-5(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-5(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-5(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-5(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-5(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-5(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-6"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-6(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-6(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_MA-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MA-7"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-1"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-2"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-3"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-4"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-5"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-5(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-5(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-6"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-6(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-6(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-6(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-6(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-6(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-6(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-7"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-7(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-7(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-8"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-8(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-8(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-8(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-8(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-8(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-8(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_MP-8(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_MP-8(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-1"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-2"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-2(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-2(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-3"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-3(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-3(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-3(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-3(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-3(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-3(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-3(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-3(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-4"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-5"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-5(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-5(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-6"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-6(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-6(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-6(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-6(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-8"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-8(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-8(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-8(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-8(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-9"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-9(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-9(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-9(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-9(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-10"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-11"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-11(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-11(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-11(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-11(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-12",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-12"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-12(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-12(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-13",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-13"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-13(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-13(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-13(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-13(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-13(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-13(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-14",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-14"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-14(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-14(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-14(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-14(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-15",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-15"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-15(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-15(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-16",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-16"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-17",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-17"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-18",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-18"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-19",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-19"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-19(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-19(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-20",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-20"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-21",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-21"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-22",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-22"
      },
      {
        "name": "NIST_SP_800-53_R5_PE-23",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PE-23"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-1"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-2"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-4"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-7"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-8"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-8(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-8(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-8(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-8(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-9"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-10"
      },
      {
        "name": "NIST_SP_800-53_R5_PL-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PL-11"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-1"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-2"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-3"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-3(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-3(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-4"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-5"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-6"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-6(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-6(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-7"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-8"
      },
      {
        "name": "NIST_SP_800-53_R5_PS-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PS-9"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-1"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-2"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-3"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-4"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-4(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-4(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-5"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-5(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-5(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-5(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-5(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-6"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-7"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-7(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-7(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-7(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-7(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_PT-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_PT-8"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-1"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-2"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-3"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-3(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-3(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-5"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-5(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-5(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-5(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-5(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-5(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-5(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-5(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-5(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-5(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-5(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-5(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-5(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-5(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-5(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-5(11)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-5(11)"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-6"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-7"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-8"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-9"
      },
      {
        "name": "NIST_SP_800-53_R5_RA-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_RA-10"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-1"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-2"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-3"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(11)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(11)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-4(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-4(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-5"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(11)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(11)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(13)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(13)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(14)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(14)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(15)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(15)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(16)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(16)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(17)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(17)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(18)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(18)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(19)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(19)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(20)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(20)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(21)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(21)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(22)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(22)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(23)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(23)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(24)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(24)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(25)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(25)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(26)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(26)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(27)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(27)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(28)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(28)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(29)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(29)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(30)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(30)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(31)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(31)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(32)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(32)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-8(33)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-8(33)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-9"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-9(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-9(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-9(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-9(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-9(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-9(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-9(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-9(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-9(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-9(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-9(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-9(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-9(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-9(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-9(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-9(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-10"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-10(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-10(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-10(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-10(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-10(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-10(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-10(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-10(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-10(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-10(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-10(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-10(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-10(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-10(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-11"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-11(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-11(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-11(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-11(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-11(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-11(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-11(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-11(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-11(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-11(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-11(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-11(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-11(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-11(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-11(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-11(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-11(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-11(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15(11)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15(11)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-15(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-15(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-16",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-16"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-17",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-17"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-17(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-17(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-17(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-17(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-17(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-17(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-17(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-17(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-17(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-17(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-17(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-17(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-17(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-17(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-17(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-17(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-17(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-17(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-20",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-20"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-21",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-21"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-22",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-22"
      },
      {
        "name": "NIST_SP_800-53_R5_SA-23",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SA-23"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-1"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-2"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-3"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-3(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-3(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-3(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-3(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-4"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-5"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-5(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-5(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-5(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-5(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-5(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-5(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-6"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(11)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(11)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(13)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(13)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(14)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(14)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(15)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(15)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(16)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(16)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(17)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(17)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(18)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(18)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(19)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(19)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(20)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(20)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(21)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(21)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(22)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(22)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(23)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(23)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(24)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(24)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(25)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(25)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(26)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(26)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(27)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(27)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(28)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(28)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-7(29)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-7(29)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-8"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-8(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-8(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-8(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-8(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-8(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-8(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-8(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-8(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-8(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-8(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-10"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-11"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-11(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-11(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-12",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-12"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-12(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-12(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-12(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-12(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-12(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-12(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-12(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-12(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-13",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-13"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-15",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-15"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-15(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-15(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-15(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-15(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-15(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-15(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-16",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-16"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-16(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-16(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-16(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-16(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-16(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-16(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-17",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-17"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-18",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-18"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-18(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-18(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-18(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-18(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-18(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-18(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-18(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-18(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-18(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-18(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-20",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-20"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-20(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-20(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-21",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-21"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-22",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-22"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-23",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-23"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-23(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-23(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-23(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-23(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-23(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-23(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-24",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-24"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-25",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-25"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-26",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-26"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-27",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-27"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-28",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-28"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-28(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-28(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-28(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-28(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-28(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-28(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-29",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-29"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-29(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-29(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-30",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-30"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-30(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-30(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-30(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-30(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-30(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-30(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-30(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-30(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-31",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-31"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-31(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-31(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-31(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-31(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-31(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-31(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-32",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-32"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-32(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-32(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-34",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-34"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-34(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-34(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-34(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-34(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-35",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-35"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-36",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-36"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-36(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-36(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-36(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-36(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-37",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-37"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-37(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-37(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-38",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-38"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-39",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-39"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-39(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-39(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-39(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-39(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-40",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-40"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-40(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-40(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-40(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-40(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-40(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-40(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-40(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-40(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-41",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-41"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-42",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-42"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-42(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-42(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-42(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-42(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-42(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-42(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-42(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-42(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-43",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-43"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-44",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-44"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-45",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-45"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-45(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-45(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-45(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-45(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-46",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-46"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-47",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-47"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-48",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-48"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-48(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-48(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-49",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-49"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-50",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-50"
      },
      {
        "name": "NIST_SP_800-53_R5_SC-51",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SC-51"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-1"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-2"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-2(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-2(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-2(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-2(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-2(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-2(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-2(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-2(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-2(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-2(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-3"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-3(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-3(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-3(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-3(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-3(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-3(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-3(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-3(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(11)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(11)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(13)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(13)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(14)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(14)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(15)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(15)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(16)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(16)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(17)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(17)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(18)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(18)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(19)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(19)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(20)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(20)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(21)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(21)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(22)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(22)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(23)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(23)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(24)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(24)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-4(25)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-4(25)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-5"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-5(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-5(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-6"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-6(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-6(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-6(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-6(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(9)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(9)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(10)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(10)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(12)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(12)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(15)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(15)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(16)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(16)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-7(17)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-7(17)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-8"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-8(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-8(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-8(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-8(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-10"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-10(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-10(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-10(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-10(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-10(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-10(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-10(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-10(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-10(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-10(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-10(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-10(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-11"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-12",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-12"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-12(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-12(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-12(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-12(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-12(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-12(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-13",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-13"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-13(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-13(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-13(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-13(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-13(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-13(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-13(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-13(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-14",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-14"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-14(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-14(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-14(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-14(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-14(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-14(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-15",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-15"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-16",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-16"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-17",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-17"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-18",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-18"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-18(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-18(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-18(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-18(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-18(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-18(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-18(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-18(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-18(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-18(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-19",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-19"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-19(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-19(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-19(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-19(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-19(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-19(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-19(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-19(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-19(5)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-19(5)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-19(6)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-19(6)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-19(7)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-19(7)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-19(8)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-19(8)"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-20",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-20"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-21",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-21"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-22",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-22"
      },
      {
        "name": "NIST_SP_800-53_R5_SI-23",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SI-23"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-1",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-1"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-2",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-2"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-2(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-2(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-3",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-3"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-3(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-3(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-3(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-3(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-3(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-3(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-4",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-4"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-4(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-4(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-4(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-4(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-4(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-4(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-4(4)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-4(4)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-5",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-5"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-5(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-5(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-5(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-5(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-6",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-6"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-6(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-6(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-7",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-7"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-8",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-8"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-9",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-9"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-9(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-9(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-10",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-10"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-11",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-11"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-11(1)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-11(1)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-11(2)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-11(2)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-11(3)",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-11(3)"
      },
      {
        "name": "NIST_SP_800-53_R5_SR-12",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/NIST_SP_800-53_R5_SR-12"
      }
    ]
  },
  "id": "/providers/Microsoft.Authorization/policySetDefinitions/179d1daa-458f-4e47-8086-2a68d0d6c38f",
  "type": "Microsoft.Authorization/policySetDefinitions",
  "name": "179d1daa-458f-4e47-8086-2a68d0d6c38f"
}