last sync: 2020-Oct-20 13:29:34 UTC

Azure Policy Initiative

HITRUST/HIPAA

NameHITRUST/HIPAA
Ida169a624-5599-4385-a696-c8d643089fab
Version4.1.0
details on versioning
CategoryRegulatory Compliance
DescriptionThis initiative includes audit and virtual machine extension deployment policies that address a subset of HITRUST/HIPAA controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/hipaa-blueprint.
TypeBuiltIn
History
Date/Time (UTC ymd) (i) Changes
2020-09-09 11:24:08 add Policy Audit Windows machines that do not contain the specified certificates in Trusted Root (934345e1-4dfb-4c70-90d7-41990dc9608b)
add Policy Audit Windows machines that don't have the specified applications installed (ebb67efd-3c46-49b0-adfe-5599eb944998)
add Policy Audit Windows machines missing any of specified members in the Administrators group (30f71ea1-ac77-4f26-9fc5-2d926bbd4ba7)
add Policy Audit Windows machines on which the Log Analytics agent is not connected as expected (6265018c-d7e2-432f-a75d-094d5f6f4465)
add Policy Audit Windows machines that have extra accounts in the Administrators group (3d2a3320-2a72-4c67-ac5f-caa40fbee2b2)
add Policy Audit Windows machines that do not have the password complexity setting enabled (bf16e0bb-31e1-4646-8202-60a235cc7e74)
add Policy Audit Windows machines that have the specified members in the Administrators group (69bf4abd-ca1e-4cf6-8b5a-762d42e61d4f)
add Policy Audit Linux machines that do not have the passwd file permissions set to 0644 (e6955644-301c-44b5-a4c4-528577de6861)
add Policy Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs (331e8ea8-378a-410f-a2e5-ae22f38bb0da)
remove Policy [Deprecated]: Show audit results from Windows VMs on which the Log Analytics agent is not connected as expected (a030a57e-4639-4e8f-ade9-a92f33afe7ee)
remove Policy [Deprecated]: Show audit results from Windows VMs that do not have the password complexity setting enabled (f48b2913-1dc5-4834-8c72-ccc1dfd819bb)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs that do not have the specified applications installed (12f7e5d0-42a7-4630-80d8-54fb7cff9bd6)
remove Policy [Deprecated]: Show audit results from Windows VMs that do not contain the specified certificates in Trusted Root (f3b9ad83-000d-4dc1-bff0-6d54533dd03f)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs on which the Log Analytics agent is not connected as expected (68511db2-bd02-41c4-ae6b-1900a012968a)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs if the Administrators group doesn't contain all the specified members (93507a81-10a4-4af0-9ee2-34cf25a96e98)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs that do not have the password complexity setting enabled (7ed40801-8a0f-4ceb-85c0-9fd25c1d61a8)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs that do not contain the specified certificates in Trusted Root (106ccbe4-a791-4f33-a44a-06796944b8d5)
remove Policy [Deprecated]: Show audit results from Windows VMs that do not have the specified applications installed (5e393799-e3ca-4e43-a9a5-0ec4648a57d9)
remove Policy [Deprecated]: Show audit results from Linux VMs that do not have the passwd file permissions set to 0644 (b18175dd-c599-4c64-83ba-bb018a06d35b)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs if the Administrators group doesn't contain only specified members (b821191b-3a12-44bc-9c38-212138a29ff3)
remove Policy [Deprecated]: Deploy prerequisites to audit Linux VMs that do not have the passwd file permissions set to 0644 (f19aa1c1-6b91-4c27-ae6a-970279f03db9)
remove Policy [Deprecated]: Show audit results from Windows VMs if the Administrators group doesn't contain only specified members (cc7cda28-f867-4311-8497-a526129a8d19)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs if the Administrators group contains any of the specified members (144f1397-32f9-4598-8c88-118decc3ccba)
remove Policy [Deprecated]: Show audit results from Windows VMs if the Administrators group contains any of the specified members (bde62c94-ccca-4821-a815-92c1d31a76de)
remove Policy [Deprecated]: Show audit results from Windows VMs if the Administrators group doesn't contain all of the specified members (f3b44e5d-1456-475f-9c67-c66c4618e85a)
2020-08-21 13:50:30 add Policy Windows machines should meet requirements for 'Windows Firewall Properties' (35d9882c-993d-44e6-87d2-db66ce21b636)
add Policy Windows machines should meet requirements for 'System Audit Policies - Detailed Tracking' (58383b73-94a9-4414-b382-4146eb02611b)
add Policy Windows machines should meet requirements for 'Security Options - Recovery console' (f71be03e-e25b-4d0f-b8bc-9b3e309b66c0)
add Policy Windows machines should meet requirements for 'Security Options - User Account Control' (492a29ed-d143-4f03-b6a4-705ce081b463)
add Policy Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs (385f5831-96d4-41db-9a3c-cd3af78aaae6)
add Policy Windows machines should meet requirements for 'Security Options - Accounts' (ee984370-154a-4ee8-9726-19d900e56fc0)
add Policy Windows machines should meet requirements for 'Administrative Templates - Network' (67e010c1-640d-438e-a3a5-feaccb533a98)
add Policy Windows machines should meet requirements for 'System Audit Policies - Account Management' (94d9aca8-3757-46df-aa51-f218c5f11954)
add Policy Windows machines should meet requirements for 'User Rights Assignment' (e068b215-0026-4354-b347-8fb2766f73a2)
add Policy Windows machines should meet requirements for 'Security Options - Audit' (33936777-f2ac-45aa-82ec-07958ec9ade4)
add Policy Windows machines should meet requirements for 'Security Options - Microsoft Network Server' (caf2d518-f029-4f6b-833b-d7081702f253)
add Policy Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identity (497dff13-db2a-4c0f-8603-28fa3b331ab6)
add Policy Windows machines should meet requirements for 'Security Options - Network Access' (3ff60f98-7fa4-410a-9f7f-0b00f5afdbdd)
add Policy Add system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identities (3cf2ab00-13f1-4d0c-8971-2ac904541a7e)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'Windows Firewall Properties' (909c958d-1b99-4c74-b88f-46a5c5bc34f9)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'Security Options - Microsoft Network Server' (6fe4ef56-7576-4dc4-8e9c-26bad4b087ce)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'Administrative Templates - Network' (7229bd6a-693d-478a-87f0-1dc1af06f3b8)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'Security Options - Network Access' (30040dab-4e75-4456-8273-14b8f75d91d9)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'Administrative Templates - Network' (985285b7-b97a-419c-8d48-c88cc934c8d8)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'Security Options - Recovery console' (ddc0a4d5-5e08-43d5-9fd9-b586d8d7116b)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'System Audit Policies - Account Management' (225e937e-d32e-4713-ab74-13ce95b3519a)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'Windows Firewall Properties' (8bbd627e-4d25-4906-9a6e-3789780af3ec)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'Security Options - Accounts' (b872a447-cc6f-43b9-bccf-45703cd81607)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'User Rights Assignment' (815dcc9f-6662-43f2-9a03-1b83e9876f24)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'Security Options - User Account Control' (29829ec2-489d-4925-81b7-bda06b1718e0)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'Security Options - Audit' (21e2995e-683e-497a-9e81-2f42ad07050a)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'User Rights Assignment' (c961dac9-5916-42e8-8fb1-703148323994)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'Security Options - Recovery console' (ba12366f-f9a6-42b8-9d98-157d0b1a837b)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'Security Options - Audit' (498b810c-59cd-4222-9338-352ba146ccf3)
remove Policy [Deprecated]: Show audit results from Windows VMs configurations in 'System Audit Policies - Detailed Tracking' (a9a33475-481d-4b81-9116-0bf02ffe67e8)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'Security Options - Accounts' (e5b81f87-9185-4224-bf00-9f505e9f89f3)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'Security Options - User Account Control' (e425e402-a050-45e5-b010-bd3f934589fc)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'Security Options - Network Access' (f56a3ab2-89d1-44de-ac0d-2ada5962e22a)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'System Audit Policies - Account Management' (0a9991e6-21be-49f9-8916-a06d934bcf29)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'System Audit Policies - Detailed Tracking' (42a07bbf-ffcf-459a-b4b1-30ecd118a505)
remove Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'Security Options - Microsoft Network Server' (86880e5c-df35-43c5-95ad-7e120635775e)
2020-06-23 16:03:23 add Policy Diagnostic logs in Azure Data Lake Store should be enabled (057ef27e-665e-4328-8ea3-04b3122bd9fb)
add Policy Vulnerabilities on your SQL databases should be remediated (feedbf84-6b99-488c-acc2-71c829aa5ffc)
add Policy Azure Backup should be enabled for Virtual Machines (013e242c-8828-4970-87b3-ab247555486d)
add Policy Diagnostic logs in Service Bus should be enabled (f8d36e2f-389b-4ee4-898d-21aeb69a0f45)
add Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'User Rights Assignment' (815dcc9f-6662-43f2-9a03-1b83e9876f24)
add Policy External accounts with owner permissions should be removed from your subscription (f8456c1c-aa66-4dfb-861a-25d127b775c9)
add Policy Subnets should be associated with a Network Security Group (e71308d3-144b-4262-b144-efdc3cc90517)
add Policy Monitor missing Endpoint Protection in Azure Security Center (af6cd1bd-1635-48cb-bde7-5b15693900b9)
add Policy [Deprecated]: Deploy prerequisites to audit Windows VMs on which the Log Analytics agent is not connected as expected (68511db2-bd02-41c4-ae6b-1900a012968a)
add Policy Vulnerability assessment should be enabled on your SQL servers (ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9)
add Policy Secure transfer to storage accounts should be enabled (404c3081-a854-4457-ae30-26a93ef643f9)
add Policy Ensure WEB app has 'Client Certificates (Incoming client certificates)' set to 'On' (5bb220d9-2698-4ee4-8404-b9c30c9df609)
add Policy SQL Server should use a virtual network service endpoint (ae5d2f14-d830-42b6-9899-df6cfe9c71a3)
add Policy Network Watcher should be enabled (b6e2945c-0b7b-40f5-9233-7a5323b5cdc6)
add Policy Key Vault should use a virtual network service endpoint (ea4d6841-2173-4317-9747-ff522a45120f)
add Policy [Preview]: Network traffic data collection agent should be installed on Windows virtual machines (2f2ee1de-44aa-4762-b6bd-0893fc3f306d)
add Policy Vulnerabilities in container security configurations should be remediated (e8cbc669-f12d-49eb-93e7-9273119e9933)
add Policy [Deprecated]: Deploy prerequisites to audit Windows VMs if the Administrators group contains any of the specified members (144f1397-32f9-4598-8c88-118decc3ccba)
add Policy Service Bus should use a virtual network service endpoint (235359c5-7c52-4b82-9055-01c75cf9f60e)
add Policy [Deprecated]: Deploy prerequisites to audit Windows VMs if the Administrators group doesn't contain all the specified members (93507a81-10a4-4af0-9ee2-34cf25a96e98)
add Policy [Deprecated]: Deploy prerequisites to audit Windows VMs if the Administrators group doesn't contain only specified members (b821191b-3a12-44bc-9c38-212138a29ff3)
add Policy Enforce SSL connection should be enabled for PostgreSQL database servers (d158790f-bfb0-486c-8631-2dc6b4e8e6af)
add Policy Long-term geo-redundant backup should be enabled for Azure SQL Databases (d38fc420-0735-4ef3-ac11-c806f651a570)
add Policy [Deprecated]: Show audit results from Windows VMs if the Administrators group contains any of the specified members (bde62c94-ccca-4821-a815-92c1d31a76de)
add Policy The Log Analytics agent should be installed on virtual machines (a70ca396-0a34-413a-88e1-b956c1e683be)
add Policy Enforce SSL connection should be enabled for MySQL database servers (e802a67a-daf5-4436-9ea6-f6d821dd0c5d)
add Policy [Deprecated]: Show audit results from Windows VMs if the Administrators group doesn't contain all of the specified members (f3b44e5d-1456-475f-9c67-c66c4618e85a)
add Policy Geo-redundant backup should be enabled for Azure Database for MariaDB (0ec47710-77ff-4a3d-9181-6aa50af424d0)
add Policy Endpoint protection solution should be installed on virtual machine scale sets (26a828e1-e88f-464e-bbb3-c134a282b9de)
add Policy Latest TLS version should be used in your Web App (f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b)
add Policy The Log Analytics agent should be installed on Virtual Machine Scale Sets (efbde977-ba53-4479-b8e9-10b957924fbf)
add Policy Latest TLS version should be used in your Function App (f9d614c5-c173-4d56-95a7-b4437057d193)
add Policy Diagnostic logs in Data Lake Analytics should be enabled (c95c74d9-38fe-4f0d-af86-0c7d626a315c)
add Policy Virtual machines should be connected to an approved virtual network (d416745a-506c-48b6-8ab1-83cb814bcaa3)
add Policy Audit diagnostic setting (7f89b1eb-583c-429a-8828-af049802c1d9)
add Policy Vulnerabilities in security configuration on your machines should be remediated (e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15)
add Policy Diagnostic logs in Azure Stream Analytics should be enabled (f9be5368-9bf5-4b84-9e0a-7850da98bb46)
add Policy Web Application should only be accessible over HTTPS (a4af4a39-4135-47fb-b175-47fbdf85311d)
add Policy [Deprecated]: Show audit results from Windows VMs configurations in 'User Rights Assignment' (c961dac9-5916-42e8-8fb1-703148323994)
add Policy Remote debugging should be turned off for Function Apps (0e60b895-3786-45da-8377-9c6b4b6ac5f9)
add Policy Geo-redundant backup should be enabled for Azure Database for PostgreSQL (48af4db5-9b8b-401c-8e74-076be876a430)
add Policy Custom subscription owner roles should not exist (10ee2ea2-fb4d-45b8-a7e9-a2e770044cd9)
add Policy Automatic provisioning of the Log Analytics monitoring agent should be enabled on your subscription (475aae12-b88a-4572-8b36-9b712b2b3a17)
add Policy Azure Monitor log profile should collect logs for categories 'write,' 'delete,' and 'action' (1a4e592a-6a6e-44a5-9814-e36264ca96e7)
add Policy MFA should be enabled on accounts with read permissions on your subscription (e3576e28-8b17-4677-84c3-db2990658d64)
add Policy CORS should not allow every resource to access your Web Applications (5744710e-cc2f-4ee8-8809-3b11e89f4bc9)
add Policy An activity log alert should exist for specific Administrative operations (b954148f-4c11-4c38-8221-be76711e194a)
add Policy Only secure connections to your Azure Cache for Redis should be enabled (22bee202-a82f-4305-9a2a-6d7f44d4dedb)
add Policy [Deprecated]: Show audit results from Windows VMs configurations in 'Security Options - User Account Control' (29829ec2-489d-4925-81b7-bda06b1718e0)
add Policy App Service should use a virtual network service endpoint (2d21331d-a4c2-4def-a9ad-ee4e1e023beb)
add Policy [Deprecated]: Show audit results from Windows VMs on which the Log Analytics agent is not connected as expected (a030a57e-4639-4e8f-ade9-a92f33afe7ee)
add Policy Latest TLS version should be used in your API App (8cb6aa8b-9e41-4f4e-aa25-089a7ac2581e)
add Policy A vulnerability assessment solution should be enabled on your virtual machines (501541f7-f7e7-4cd6-868c-4190fdad3ac9)
add Policy Azure Monitor should collect activity logs from all regions (41388f1c-2db0-4c25-95b2-35d7f5ccbfa9)
add Policy Function App should only be accessible over HTTPS (6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab)
add Policy Event Hub should use a virtual network service endpoint (d63edb4a-c612-454d-b47d-191a724fcbf0)
add Policy CORS should not allow every resource to access your API App (358c20a6-3f9e-4f0e-97ff-c6ce485e2aac)
add Policy Cosmos DB should use a virtual network service endpoint (e0a2b1a3-f7f9-4569-807f-2a9edebdf4d9)
add Policy Unattached disks should be encrypted (2c89a2e5-7285-40fe-afe0-ae8654b92fb2)
add Policy Key Vault objects should be recoverable (0b60c0b2-2dc2-4e1c-b5c9-abbed971de53)
add Policy There should be more than one owner assigned to your subscription (09024ccc-0c5f-475e-9457-b7c0d9ed487b)
add Policy Microsoft Antimalware for Azure should be configured to automatically update protection signatures (c43e4a30-77cb-48ab-a4dd-93f175c63b57)
add Policy [Deprecated]: Deploy prerequisites to audit Windows VMs configurations in 'Security Options - User Account Control' (e425e402-a050-45e5-b010-bd3f934589fc)
add Policy Diagnostic logs in Key Vault should be enabled (cf820ca0-f99e-4f3e-84fb-66e913812d21)
add Policy A maximum of 3 owners should be designated for your subscription (4f11b553-d42e-4e3a-89be-32ca364cad4c)
add Policy Internet-facing virtual machines should be protected with network security groups (f6de0be7-9a8a-4b8a-b349-43cf02d22f7c)
add Policy Storage Accounts should use a virtual network service endpoint (60d21c4f-21a3-4d94-85f4-b924e6aeeda4)
add Policy Audit usage of custom RBAC rules (a451c1ef-c6ca-483d-87ed-f49761e3ffb5)
add Policy Adaptive Network Hardening recommendations should be applied on internet facing virtual machines (08e6af2d-db70-460a-bfe9-d5bd474ba9d6)
add Policy [Preview]: Container Registry should use a virtual network service endpoint (c4857be7-912a-4c75-87e6-e30292bcdf78)
add Policy Diagnostic logs in Logic Apps should be enabled (34f95f76-5386-4de7-b824-0d8478470c9d)
add Policy [Preview]: Network traffic data collection agent should be installed on Linux virtual machines (04c4380f-3fae-46e8-96c9-30193528f602)
add Policy Diagnostic logs in IoT Hub should be enabled (383856f8-de7f-44a2-81fc-e5135b5c2aa4)
add Policy Geo-redundant backup should be enabled for Azure Database for MySQL (82339799-d096-41ae-8538-b108becf0970)
add Policy Gateway subnets should not be configured with a network security group (35f9c03a-cc27-418e-9c0c-539ff999d010)
add Policy [Deprecated]: Show audit results from Windows VMs if the Administrators group doesn't contain only specified members (cc7cda28-f867-4311-8497-a526129a8d19)
add Policy CORS should not allow every resource to access your Function Apps (0820b7b9-23aa-4725-a1ce-ae4558f718e5)
add Policy Deprecated accounts with owner permissions should be removed from your subscription (ebb62a0c-3560-49e1-89ed-27e074e9f8ad)
add Policy Diagnostic logs in App Services should be enabled (b607c5de-e7d9-4eee-9e5c-83f1bcee4fa0)
2020-06-22 16:06:26 Description change: 'This initiative includes audit and VM extension deployment policies that address a subset of HITRUST/HIPAA controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/hipaa-blueprint.' to 'This initiative includes audit and virtual machine extension deployment policies that address a subset of HITRUST/HIPAA controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/hipaa-blueprint.'
2020-06-16 14:55:25 Description change: 'This initiative includes policies that address a subset of HITRUST/HIPAA controls. Additional policies will be added in upcoming releases. https://aka.ms/hipaa-blueprint' to 'This initiative includes audit and VM extension deployment policies that address a subset of HITRUST/HIPAA controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/hipaa-blueprint.'
Name change: 'Audit HITRUST/HIPAA controls and deploy specific VM Extensions to support audit requirements' to 'HITRUST/HIPAA'
Policy count Total Policies: 121
Builtin Policies: 121
Static Policies: 0
Policy used
Policy DisplayName Policy Id Category Effect
[Preview]: Container Registry should use a virtual network service endpoint c4857be7-912a-4c75-87e6-e30292bcdf78 Network Default: Audit
Allowed: (Audit,Disabled)
[Preview]: Network traffic data collection agent should be installed on Linux virtual machines 04c4380f-3fae-46e8-96c9-30193528f602 Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
[Preview]: Network traffic data collection agent should be installed on Windows virtual machines 2f2ee1de-44aa-4762-b6bd-0893fc3f306d Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
A maximum of 3 owners should be designated for your subscription 4f11b553-d42e-4e3a-89be-32ca364cad4c Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
A vulnerability assessment solution should be enabled on your virtual machines 501541f7-f7e7-4cd6-868c-4190fdad3ac9 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Access through Internet facing endpoint should be restricted 9daedab3-fb2d-461e-b861-71790eead4f6 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Adaptive application controls for defining safe applications should be enabled on your machines 47a6b606-51aa-4496-8bb7-64b11cf66adc Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Adaptive Network Hardening recommendations should be applied on internet facing virtual machines 08e6af2d-db70-460a-bfe9-d5bd474ba9d6 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Add system-assigned managed identity to enable Guest Configuration assignments on virtual machines with no identities 3cf2ab00-13f1-4d0c-8971-2ac904541a7e Guest Configuration Fixed: modify
Add system-assigned managed identity to enable Guest Configuration assignments on VMs with a user-assigned identity 497dff13-db2a-4c0f-8603-28fa3b331ab6 Guest Configuration Fixed: modify
An activity log alert should exist for specific Administrative operations b954148f-4c11-4c38-8221-be76711e194a Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
API App should only be accessible over HTTPS b7ddfbdc-1260-477d-91fd-98bd9be789a6 App Service Default: Audit
Allowed: (Audit,Disabled)
App Service should use a virtual network service endpoint 2d21331d-a4c2-4def-a9ad-ee4e1e023beb Network Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Audit diagnostic setting 7f89b1eb-583c-429a-8828-af049802c1d9 Monitoring Fixed: AuditIfNotExists
Audit Linux machines that do not have the passwd file permissions set to 0644 e6955644-301c-44b5-a4c4-528577de6861 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Audit usage of custom RBAC rules a451c1ef-c6ca-483d-87ed-f49761e3ffb5 General Default: Audit
Allowed: (Audit,Disabled)
Audit virtual machines without disaster recovery configured 0015ea4d-51ff-4ce3-8d8c-f3f8f0179a56 Compute Fixed: auditIfNotExists
Audit Windows machines missing any of specified members in the Administrators group 30f71ea1-ac77-4f26-9fc5-2d926bbd4ba7 Guest Configuration Fixed: auditIfNotExists
Audit Windows machines on which the Log Analytics agent is not connected as expected 6265018c-d7e2-432f-a75d-094d5f6f4465 Guest Configuration Fixed: auditIfNotExists
Audit Windows machines that do not contain the specified certificates in Trusted Root 934345e1-4dfb-4c70-90d7-41990dc9608b Guest Configuration Fixed: auditIfNotExists
Audit Windows machines that do not have the password complexity setting enabled bf16e0bb-31e1-4646-8202-60a235cc7e74 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Audit Windows machines that don't have the specified applications installed ebb67efd-3c46-49b0-adfe-5599eb944998 Guest Configuration Fixed: auditIfNotExists
Audit Windows machines that have extra accounts in the Administrators group 3d2a3320-2a72-4c67-ac5f-caa40fbee2b2 Guest Configuration Fixed: auditIfNotExists
Audit Windows machines that have the specified members in the Administrators group 69bf4abd-ca1e-4cf6-8b5a-762d42e61d4f Guest Configuration Fixed: auditIfNotExists
Auditing on SQL server should be enabled a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Automatic provisioning of the Log Analytics monitoring agent should be enabled on your subscription 475aae12-b88a-4572-8b36-9b712b2b3a17 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Azure Backup should be enabled for Virtual Machines 013e242c-8828-4970-87b3-ab247555486d Backup Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Azure Monitor log profile should collect logs for categories 'write,' 'delete,' and 'action' 1a4e592a-6a6e-44a5-9814-e36264ca96e7 Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Azure Monitor should collect activity logs from all regions 41388f1c-2db0-4c25-95b2-35d7f5ccbfa9 Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
CORS should not allow every resource to access your API App 358c20a6-3f9e-4f0e-97ff-c6ce485e2aac App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
CORS should not allow every resource to access your Function Apps 0820b7b9-23aa-4725-a1ce-ae4558f718e5 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
CORS should not allow every resource to access your Web Applications 5744710e-cc2f-4ee8-8809-3b11e89f4bc9 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Cosmos DB should use a virtual network service endpoint e0a2b1a3-f7f9-4569-807f-2a9edebdf4d9 Network Default: Audit
Allowed: (Audit,Disabled)
Custom subscription owner roles should not exist 10ee2ea2-fb4d-45b8-a7e9-a2e770044cd9 General Default: Audit
Allowed: (Audit,Disabled)
Deploy default Microsoft IaaSAntimalware extension for Windows Server 2835b622-407b-4114-9198-6f7064cbe0dc Compute Fixed: deployIfNotExists
Deploy Diagnostic Settings for Network Security Groups c9c29499-c1d1-4195-99bd-2ec9e3a9dc89 Monitoring Fixed: deployIfNotExists
Deploy network watcher when virtual networks are created a9b99dd8-06c5-4317-8629-9d86a3c6e7d9 Network Fixed: DeployIfNotExists
Deploy the Linux Guest Configuration extension to enable Guest Configuration assignments on Linux VMs 331e8ea8-378a-410f-a2e5-ae22f38bb0da Guest Configuration Fixed: deployIfNotExists
Deploy the Windows Guest Configuration extension to enable Guest Configuration assignments on Windows VMs 385f5831-96d4-41db-9a3c-cd3af78aaae6 Guest Configuration Fixed: deployIfNotExists
Deprecated accounts with owner permissions should be removed from your subscription ebb62a0c-3560-49e1-89ed-27e074e9f8ad Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in App Services should be enabled b607c5de-e7d9-4eee-9e5c-83f1bcee4fa0 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in Azure Data Lake Store should be enabled 057ef27e-665e-4328-8ea3-04b3122bd9fb Data Lake Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in Azure Stream Analytics should be enabled f9be5368-9bf5-4b84-9e0a-7850da98bb46 Stream Analytics Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in Batch accounts should be enabled 428256e6-1fac-4f48-a757-df34c2b3336d Batch Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in Data Lake Analytics should be enabled c95c74d9-38fe-4f0d-af86-0c7d626a315c Data Lake Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in Event Hub should be enabled 83a214f7-d01a-484b-91a9-ed54470c9a6a Event Hub Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in IoT Hub should be enabled 383856f8-de7f-44a2-81fc-e5135b5c2aa4 Internet of Things Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in Key Vault should be enabled cf820ca0-f99e-4f3e-84fb-66e913812d21 Key Vault Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in Logic Apps should be enabled 34f95f76-5386-4de7-b824-0d8478470c9d Logic Apps Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in Search services should be enabled b4330a05-a843-4bc8-bf9a-cacce50c67f4 Search Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in Service Bus should be enabled f8d36e2f-389b-4ee4-898d-21aeb69a0f45 Service Bus Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Diagnostic logs in Virtual Machine Scale Sets should be enabled 7c1b1214-f927-48bf-8882-84f0af6588b1 Compute Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Disk encryption should be applied on virtual machines 0961003e-5a0a-4549-abde-af6a37f2724d Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Endpoint protection solution should be installed on virtual machine scale sets 26a828e1-e88f-464e-bbb3-c134a282b9de Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Enforce SSL connection should be enabled for MySQL database servers e802a67a-daf5-4436-9ea6-f6d821dd0c5d SQL Default: Audit
Allowed: (Audit,Disabled)
Enforce SSL connection should be enabled for PostgreSQL database servers d158790f-bfb0-486c-8631-2dc6b4e8e6af SQL Default: Audit
Allowed: (Audit,Disabled)
Ensure WEB app has 'Client Certificates (Incoming client certificates)' set to 'On' 5bb220d9-2698-4ee4-8404-b9c30c9df609 App Service Default: Audit
Allowed: (Audit,Disabled)
Event Hub should use a virtual network service endpoint d63edb4a-c612-454d-b47d-191a724fcbf0 Network Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
External accounts with owner permissions should be removed from your subscription f8456c1c-aa66-4dfb-861a-25d127b775c9 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Function App should only be accessible over HTTPS 6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab App Service Default: Audit
Allowed: (Audit,Disabled)
Gateway subnets should not be configured with a network security group 35f9c03a-cc27-418e-9c0c-539ff999d010 Network Fixed: deny
Geo-redundant backup should be enabled for Azure Database for MariaDB 0ec47710-77ff-4a3d-9181-6aa50af424d0 SQL Default: Audit
Allowed: (Audit,Disabled)
Geo-redundant backup should be enabled for Azure Database for MySQL 82339799-d096-41ae-8538-b108becf0970 SQL Default: Audit
Allowed: (Audit,Disabled)
Geo-redundant backup should be enabled for Azure Database for PostgreSQL 48af4db5-9b8b-401c-8e74-076be876a430 SQL Default: Audit
Allowed: (Audit,Disabled)
Internet-facing virtual machines should be protected with network security groups f6de0be7-9a8a-4b8a-b349-43cf02d22f7c Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Key Vault objects should be recoverable 0b60c0b2-2dc2-4e1c-b5c9-abbed971de53 Key Vault Default: Audit
Allowed: (Audit,Disabled)
Key Vault should use a virtual network service endpoint ea4d6841-2173-4317-9747-ff522a45120f Network Default: Audit
Allowed: (Audit,Disabled)
Latest TLS version should be used in your API App 8cb6aa8b-9e41-4f4e-aa25-089a7ac2581e App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Latest TLS version should be used in your Function App f9d614c5-c173-4d56-95a7-b4437057d193 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Latest TLS version should be used in your Web App f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Long-term geo-redundant backup should be enabled for Azure SQL Databases d38fc420-0735-4ef3-ac11-c806f651a570 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Management ports of virtual machines should be protected with just-in-time network access control b0f33259-77d7-4c9e-aac6-3aabcfae693c Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Management ports should be closed on your virtual machines 22730e10-96f6-4aac-ad84-9383d35b5917 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
MFA should be enabled accounts with write permissions on your subscription 9297c21d-2ed6-4474-b48f-163f75654ce3 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
MFA should be enabled on accounts with owner permissions on your subscription aa633080-8b72-40c4-a2d7-d00c03e80bed Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
MFA should be enabled on accounts with read permissions on your subscription e3576e28-8b17-4677-84c3-db2990658d64 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Microsoft Antimalware for Azure should be configured to automatically update protection signatures c43e4a30-77cb-48ab-a4dd-93f175c63b57 Compute Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Monitor missing Endpoint Protection in Azure Security Center af6cd1bd-1635-48cb-bde7-5b15693900b9 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Network Watcher should be enabled b6e2945c-0b7b-40f5-9233-7a5323b5cdc6 Network Fixed: auditIfNotExists
Only secure connections to your Azure Cache for Redis should be enabled 22bee202-a82f-4305-9a2a-6d7f44d4dedb Cache Default: Audit
Allowed: (Audit,Deny,Disabled)
Remote debugging should be turned off for API Apps e9c8d085-d9cc-4b17-9cdc-059f1f01f19e App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Remote debugging should be turned off for Function Apps 0e60b895-3786-45da-8377-9c6b4b6ac5f9 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Remote debugging should be turned off for Web Applications cb510bfd-1cba-4d9f-a230-cb0976f4bb71 App Service Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Require encryption on Data Lake Store accounts a7ff3161-0087-490a-9ad9-ad6217f4f43a Data Lake Fixed: deny
Role-Based Access Control (RBAC) should be used on Kubernetes Services ac4a19c2-fa67-49b4-8ae5-0b2e78c49457 Security Center Default: Audit
Allowed: (Audit,Disabled)
Secure transfer to storage accounts should be enabled 404c3081-a854-4457-ae30-26a93ef643f9 Storage Default: Audit
Allowed: (Audit,Deny,Disabled)
Service Bus should use a virtual network service endpoint 235359c5-7c52-4b82-9055-01c75cf9f60e Network Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
SQL Managed Instance TDE protector should be encrypted with your own key 048248b0-55cd-46da-b1ff-39efd52db260 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
SQL Server should use a virtual network service endpoint ae5d2f14-d830-42b6-9899-df6cfe9c71a3 Network Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
SQL server TDE protector should be encrypted with your own key 0d134df8-db83-46fb-ad72-fe0c9428c8dd SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Storage accounts should restrict network access 34c877ad-507e-4c82-993e-3452a6e0ad3c Storage Default: Audit
Allowed: (Audit,Deny,Disabled)
Storage Accounts should use a virtual network service endpoint 60d21c4f-21a3-4d94-85f4-b924e6aeeda4 Network Default: Audit
Allowed: (Audit,Disabled)
Subnets should be associated with a Network Security Group e71308d3-144b-4262-b144-efdc3cc90517 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
System updates on virtual machine scale sets should be installed c3f317a7-a95c-4547-b7e7-11017ebdf2fe Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
System updates should be installed on your machines 86b3d65f-7626-441e-b690-81a8b71cff60 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
The Log Analytics agent should be installed on Virtual Machine Scale Sets efbde977-ba53-4479-b8e9-10b957924fbf Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
The Log Analytics agent should be installed on virtual machines a70ca396-0a34-413a-88e1-b956c1e683be Monitoring Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
There should be more than one owner assigned to your subscription 09024ccc-0c5f-475e-9457-b7c0d9ed487b Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Transparent Data Encryption on SQL databases should be enabled 17k78e20-9358-41c9-923c-fb736d382a12 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Unattached disks should be encrypted 2c89a2e5-7285-40fe-afe0-ae8654b92fb2 Compute Default: Audit
Allowed: (Audit,Disabled)
Virtual machines should be connected to an approved virtual network d416745a-506c-48b6-8ab1-83cb814bcaa3 Network Default: Audit
Allowed: (Audit,Deny,Disabled)
Virtual machines should be migrated to new Azure Resource Manager resources 1d84d5fb-01f6-4d12-ba4f-4a26081d403d Compute Default: Audit
Allowed: (Audit,Deny,Disabled)
Vulnerabilities in container security configurations should be remediated e8cbc669-f12d-49eb-93e7-9273119e9933 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Vulnerabilities in security configuration on your machines should be remediated e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Vulnerabilities in security configuration on your virtual machine scale sets should be remediated 3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4 Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Vulnerabilities on your SQL databases should be remediated feedbf84-6b99-488c-acc2-71c829aa5ffc Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Vulnerabilities should be remediated by a Vulnerability Assessment solution 760a85ff-6162-42b3-8d70-698e268f648c Security Center Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Vulnerability assessment should be enabled on SQL Managed Instance 1b7aa243-30e4-4c9e-bca8-d0d3022b634a SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Vulnerability assessment should be enabled on your SQL servers ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9 SQL Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Web Application should only be accessible over HTTPS a4af4a39-4135-47fb-b175-47fbdf85311d App Service Default: Audit
Allowed: (Audit,Disabled)
Windows machines should meet requirements for 'Administrative Templates - Network' 67e010c1-640d-438e-a3a5-feaccb533a98 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Windows machines should meet requirements for 'Security Options - Accounts' ee984370-154a-4ee8-9726-19d900e56fc0 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Windows machines should meet requirements for 'Security Options - Audit' 33936777-f2ac-45aa-82ec-07958ec9ade4 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Windows machines should meet requirements for 'Security Options - Microsoft Network Server' caf2d518-f029-4f6b-833b-d7081702f253 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Windows machines should meet requirements for 'Security Options - Network Access' 3ff60f98-7fa4-410a-9f7f-0b00f5afdbdd Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Windows machines should meet requirements for 'Security Options - Recovery console' f71be03e-e25b-4d0f-b8bc-9b3e309b66c0 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Windows machines should meet requirements for 'Security Options - User Account Control' 492a29ed-d143-4f03-b6a4-705ce081b463 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Windows machines should meet requirements for 'System Audit Policies - Account Management' 94d9aca8-3757-46df-aa51-f218c5f11954 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Windows machines should meet requirements for 'System Audit Policies - Detailed Tracking' 58383b73-94a9-4414-b382-4146eb02611b Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Windows machines should meet requirements for 'User Rights Assignment' e068b215-0026-4354-b347-8fb2766f73a2 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Windows machines should meet requirements for 'Windows Firewall Properties' 35d9882c-993d-44e6-87d2-db66ce21b636 Guest Configuration Default: AuditIfNotExists
Allowed: (AuditIfNotExists,Disabled)
Json
{
  "properties": {
    "displayName": "HITRUST/HIPAA",
    "policyType": "BuiltIn",
    "description": "This initiative includes audit and virtual machine extension deployment policies that address a subset of HITRUST/HIPAA controls. Additional policies will be added in upcoming releases. For more information, visit https://aka.ms/hipaa-blueprint.",
    "metadata": {
      "version": "4.1.0",
      "category": "Regulatory Compliance"
    },
    "parameters": {
      "IncludeArcMachines": {
        "type": "String",
        "metadata": {
          "displayName": "Include Arc connected servers for Guest Configuration policies",
          "description": "Optionally choose to audit settings inside Arc connected servers using Guest Configuration policies. By selecting this option, you agree to be charged monthly per Arc connected machine."
        },
        "allowedValues": [
          "true",
          "false"
        ],
        "defaultValue": "false"
      },
      "installedApplicationsOnWindowsVM": {
        "type": "String",
        "metadata": {
          "displayName": "Application names (supports wildcards)",
          "description": "A semicolon-separated list of the names of the applications that should be installed. e.g. 'Microsoft SQL Server 2014 (64-bit); Microsoft Visual Studio Code' or 'Microsoft SQL Server 2014*' (to match any application starting with 'Microsoft SQL Server 2014')"
        }
      },
      "DeployDiagnosticSettingsforNetworkSecurityGroupsstoragePrefix": {
        "type": "String",
        "metadata": {
          "displayName": "Storage Account Prefix for Regional Storage Account to deploy diagnostic settings for Network Security Groups",
          "description": "This prefix will be combined with the network security group location to form the created storage account name."
        }
      },
      "DeployDiagnosticSettingsforNetworkSecurityGroupsrgName": {
        "type": "String",
        "metadata": {
          "displayName": "Resource Group Name for Storage Account (must exist) to deploy diagnostic settings for Network Security Groups",
          "description": "The resource group that the storage account will be created in. This resource group must already exist.",
          "strongType": "ExistingResourceGroups"
        }
      },
      "CertificateThumbprints": {
        "type": "String",
        "metadata": {
          "displayName": "Certificate thumbprints",
          "description": "A semicolon-separated list of certificate thumbprints that should exist under the Trusted Root certificate store (Cert:\\LocalMachine\\Root). e.g. THUMBPRINT1;THUMBPRINT2;THUMBPRINT3"
        }
      },
      "membersToExclude": {
        "type": "String",
        "metadata": {
          "displayName": "List of users excluded from Windows VM Administrators group",
          "description": "A semicolon-separated list of members that should be excluded in the Administrators local group. Ex: Administrator; myUser1; myUser2"
        },
        "defaultValue": ""
      },
      "workspaceId": {
        "type": "String",
        "metadata": {
          "displayName": "List of workspace IDs where Log Analytics agents should connect",
          "description": "A semicolon-separated list of the workspace IDs that the Log Analytics agent should be connected to"
        },
        "defaultValue": ""
      },
      "listOfResourceTypes": {
        "type": "Array",
        "metadata": {
          "displayName": "List of resource types that should have diagnostic logs enabled",
          "description": "Audit diagnostic setting for selected resource types"
        },
        "allowedValues": [
          "Microsoft.AnalysisServices/servers",
          "Microsoft.ApiManagement/service",
          "Microsoft.Network/applicationGateways",
          "Microsoft.Automation/automationAccounts",
          "Microsoft.ContainerInstance/containerGroups",
          "Microsoft.ContainerRegistry/registries",
          "Microsoft.ContainerService/managedClusters",
          "Microsoft.Batch/batchAccounts",
          "Microsoft.Cdn/profiles/endpoints",
          "Microsoft.CognitiveServices/accounts",
          "Microsoft.DocumentDB/databaseAccounts",
          "Microsoft.DataFactory/factories",
          "Microsoft.DataLakeAnalytics/accounts",
          "Microsoft.DataLakeStore/accounts",
          "Microsoft.EventGrid/eventSubscriptions",
          "Microsoft.EventGrid/topics",
          "Microsoft.EventHub/namespaces",
          "Microsoft.Network/expressRouteCircuits",
          "Microsoft.Network/azureFirewalls",
          "Microsoft.HDInsight/clusters",
          "Microsoft.Devices/IotHubs",
          "Microsoft.KeyVault/vaults",
          "Microsoft.Network/loadBalancers",
          "Microsoft.Logic/integrationAccounts",
          "Microsoft.Logic/workflows",
          "Microsoft.DBforMySQL/servers",
          "Microsoft.Network/networkInterfaces",
          "Microsoft.Network/networkSecurityGroups",
          "Microsoft.DBforPostgreSQL/servers",
          "Microsoft.PowerBIDedicated/capacities",
          "Microsoft.Network/publicIPAddresses",
          "Microsoft.RecoveryServices/vaults",
          "Microsoft.Cache/redis",
          "Microsoft.Relay/namespaces",
          "Microsoft.Search/searchServices",
          "Microsoft.ServiceBus/namespaces",
          "Microsoft.SignalRService/SignalR",
          "Microsoft.Sql/servers/databases",
          "Microsoft.Sql/servers/elasticPools",
          "Microsoft.StreamAnalytics/streamingjobs",
          "Microsoft.TimeSeriesInsights/environments",
          "Microsoft.Network/trafficManagerProfiles",
          "Microsoft.Compute/virtualMachines",
          "Microsoft.Compute/virtualMachineScaleSets",
          "Microsoft.Network/virtualNetworks",
          "Microsoft.Network/virtualNetworkGateways"
        ],
        "defaultValue": [
          "Microsoft.AnalysisServices/servers",
          "Microsoft.ApiManagement/service",
          "Microsoft.Network/applicationGateways",
          "Microsoft.Automation/automationAccounts",
          "Microsoft.ContainerInstance/containerGroups",
          "Microsoft.ContainerRegistry/registries",
          "Microsoft.ContainerService/managedClusters",
          "Microsoft.Batch/batchAccounts",
          "Microsoft.Cdn/profiles/endpoints",
          "Microsoft.CognitiveServices/accounts",
          "Microsoft.DocumentDB/databaseAccounts",
          "Microsoft.DataFactory/factories",
          "Microsoft.DataLakeAnalytics/accounts",
          "Microsoft.DataLakeStore/accounts",
          "Microsoft.EventGrid/eventSubscriptions",
          "Microsoft.EventGrid/topics",
          "Microsoft.EventHub/namespaces",
          "Microsoft.Network/expressRouteCircuits",
          "Microsoft.Network/azureFirewalls",
          "Microsoft.HDInsight/clusters",
          "Microsoft.Devices/IotHubs",
          "Microsoft.KeyVault/vaults",
          "Microsoft.Network/loadBalancers",
          "Microsoft.Logic/integrationAccounts",
          "Microsoft.Logic/workflows",
          "Microsoft.DBforMySQL/servers",
          "Microsoft.Network/networkInterfaces",
          "Microsoft.Network/networkSecurityGroups",
          "Microsoft.DBforPostgreSQL/servers",
          "Microsoft.PowerBIDedicated/capacities",
          "Microsoft.Network/publicIPAddresses",
          "Microsoft.RecoveryServices/vaults",
          "Microsoft.Cache/redis",
          "Microsoft.Relay/namespaces",
          "Microsoft.Search/searchServices",
          "Microsoft.ServiceBus/namespaces",
          "Microsoft.SignalRService/SignalR",
          "Microsoft.Sql/servers/databases",
          "Microsoft.Sql/servers/elasticPools",
          "Microsoft.StreamAnalytics/streamingjobs",
          "Microsoft.TimeSeriesInsights/environments",
          "Microsoft.Network/trafficManagerProfiles",
          "Microsoft.Compute/virtualMachines",
          "Microsoft.Compute/virtualMachineScaleSets",
          "Microsoft.Network/virtualNetworks",
          "Microsoft.Network/virtualNetworkGateways"
        ]
      },
      "membersToInclude": {
        "type": "String",
        "metadata": {
          "displayName": "List of users that must be included in Windows VM Administrators group",
          "description": "A semicolon-separated list of members that should be included in the Administrators local group. Ex: Administrator; myUser1; myUser2"
        },
        "defaultValue": ""
      },
      "listOfLocations": {
        "type": "Array",
        "metadata": {
          "displayName": "List of regions where Network Watcher should be enabled",
          "description": "To see a complete list of regions use Get-AzLocation",
          "strongType": "location"
        },
        "defaultValue": [
          
        ]
      },
      "NetworkWatcherResourceGroupName": {
        "type": "String",
        "metadata": {
          "displayName": "NetworkWatcher resource group name",
          "description": "Name of the resource group of NetworkWatcher, such as NetworkWatcherRG"
        },
        "defaultValue": "NetworkWatcherRG"
      },
      "members": {
        "type": "String",
        "metadata": {
          "displayName": "List of users that Windows VM Administrators group must *only* include",
          "description": "A semicolon-separated list of all the expected members of the Administrators local group. Ex: Administrator; myUser1; myUser2"
        },
        "defaultValue": ""
      },
      "operationName": {
        "type": "String",
        "metadata": {
          "displayName": "Operation Name",
          "description": "Administrative Operation name for which activity log alert should be configured"
        },
        "allowedValues": [
          "Microsoft.Sql/servers/firewallRules/write",
          "Microsoft.Sql/servers/firewallRules/delete",
          "Microsoft.Network/networkSecurityGroups/write",
          "Microsoft.Network/networkSecurityGroups/delete",
          "Microsoft.ClassicNetwork/networkSecurityGroups/write",
          "Microsoft.ClassicNetwork/networkSecurityGroups/delete",
          "Microsoft.Network/networkSecurityGroups/securityRules/write",
          "Microsoft.Network/networkSecurityGroups/securityRules/delete",
          "Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/write",
          "Microsoft.ClassicNetwork/networkSecurityGroups/securityRules/delete"
        ],
        "defaultValue": "Microsoft.Sql/servers/firewallRules/write"
      },
      "virtualNetworkId": {
        "type": "String",
        "metadata": {
          "displayName": "Virtual network where VMs should be connected",
          "description": "Resource Id of the virtual network. Example: /subscriptions/YourSubscriptionId/resourceGroups/YourResourceGroupName/providers/Microsoft.Network/virtualNetworks/Name"
        },
        "defaultValue": ""
      },
      "diagnosticsLogsInBatchAccountMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Diagnostic logs in Batch accounts should be enabled",
          "description": "Enable or disable the monitoring of diagnostic logs in Batch accounts"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "diagnosticsLogsInBatchAccountRetentionDays": {
        "type": "String",
        "metadata": {
          "displayName": "Required retention (in days) for logs in Batch accounts",
          "description": "The required diagnostic logs retention period in days"
        },
        "defaultValue": "365"
      },
      "ensureManagedInstanceTDEIsEncryptedWithYourOwnKeyMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "SQL Managed Instance TDE protector should be encrypted with your own key",
          "description": "Enable or disable the monitoring of Transparent Data Encryption (TDE) with your own key support. TDE with your own key support provides increased transparency and control over the TDE Protector, increased security with an HSM-backed external service, and promotion of separation of duties."
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "diskEncryptionMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Disk encryption should be applied on virtual machines",
          "description": "Enable or disable the monitoring for VM disk encryption"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "diagnosticsLogsInSearchServiceMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Diagnostic logs in Search services should be enabled",
          "description": "Enable or disable the monitoring of diagnostic logs in Azure Search service"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "diagnosticsLogsInSearchServiceRetentionDays": {
        "type": "String",
        "metadata": {
          "displayName": "Required retention (in days) of logs in Azure Search service",
          "description": "The required diagnostic logs retention period in days"
        },
        "defaultValue": "365"
      },
      "vulnerabilityAssessmentOnManagedInstanceMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Vulnerability assessment should be enabled on SQL Managed Instance",
          "description": "Audit each SQL Managed Instance which doesn't have recurring vulnerability assessment scans enabled. Vulnerability assessment can discover, track, and help you remediate potential database vulnerabilities."
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "vulnerabilityAssesmentMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Vulnerabilities should be remediated by a Vulnerability Assessment solution",
          "description": "Enable or disable the detection of VM vulnerabilities by a vulnerability assessment solution"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "EnableInsecureGuestLogons": {
        "type": "String",
        "metadata": {
          "displayName": "Enable insecure guest logons",
          "description": "Specifies whether the SMB client will allow insecure guest logons to an SMB server."
        },
        "defaultValue": "0"
      },
      "AllowSimultaneousConnectionsToTheInternetOrAWindowsDomain": {
        "type": "String",
        "metadata": {
          "displayName": "Allow simultaneous connections to the Internet or a Windows Domain",
          "description": "Specify whether to prevent computers from connecting to both a domain based network and a non-domain based network at the same time. A value of 0 allows simultaneous connections, and a value of 1 blocks them."
        },
        "defaultValue": "1"
      },
      "TurnOffMulticastNameResolution": {
        "type": "String",
        "metadata": {
          "displayName": "Turn off multicast name resolution",
          "description": "Specifies whether LLMNR, a secondary name resolution protocol that transmits using multicast over a local subnet link on a single subnet, is enabled."
        },
        "defaultValue": "1"
      },
      "nextGenerationFirewallMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Access through Internet facing endpoint should be restricted",
          "description": "Enable or disable overly permissive inbound NSG rules monitoring"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "ensureServerTDEIsEncryptedWithYourOwnKeyMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "SQL server TDE protector should be encrypted with your own key",
          "description": "Enable or disable the monitoring of Transparent Data Encryption (TDE) with your own key support. TDE with your own key support provides increased transparency and control over the TDE Protector, increased security with an HSM-backed external service, and promotion of separation of duties."
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "apiAppDisableRemoteDebuggingMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Remote debugging should be turned off for API App",
          "description": "Enable or disable the monitoring of remote debugging for API App"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "classicComputeVMsMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Virtual machines should be migrated to new Azure Resource Manager resources",
          "description": "Enable or disable the monitoring of classic compute VMs"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "disableUnrestrictedNetworkToStorageAccountMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Audit unrestricted network access to storage accounts",
          "description": "Enable or disable the monitoring of network access to storage account"
        },
        "allowedValues": [
          "Audit",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "adaptiveApplicationControlsMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Adaptive Application Controls should be enabled on virtual machines",
          "description": "Enable or disable the monitoring of defining safe applications in Azure Security Center"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "NetworkAccessRemotelyAccessibleRegistryPaths": {
        "type": "String",
        "metadata": {
          "displayName": "Network access: Remotely accessible registry paths",
          "description": "Specifies which registry paths will be accessible over the network, regardless of the users or groups listed in the access control list (ACL) of the `winreg` registry key."
        },
        "defaultValue": "System\\CurrentControlSet\\Control\\ProductOptions|#|System\\CurrentControlSet\\Control\\Server Applications|#|Software\\Microsoft\\Windows NT\\CurrentVersion"
      },
      "NetworkAccessRemotelyAccessibleRegistryPathsAndSubpaths": {
        "type": "String",
        "metadata": {
          "displayName": "Network access: Remotely accessible registry paths and sub-paths",
          "description": "Specifies which registry paths and sub-paths will be accessible over the network, regardless of the users or groups listed in the access control list (ACL) of the `winreg` registry key."
        },
        "defaultValue": "System\\CurrentControlSet\\Control\\Print\\Printers|#|System\\CurrentControlSet\\Services\\Eventlog|#|Software\\Microsoft\\OLAP Server|#|Software\\Microsoft\\Windows NT\\CurrentVersion\\Print|#|Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows|#|System\\CurrentControlSet\\Control\\ContentIndex|#|System\\CurrentControlSet\\Control\\Terminal Server|#|System\\CurrentControlSet\\Control\\Terminal Server\\UserConfig|#|System\\CurrentControlSet\\Control\\Terminal Server\\DefaultUserConfiguration|#|Software\\Microsoft\\Windows NT\\CurrentVersion\\Perflib|#|System\\CurrentControlSet\\Services\\SysmonLog"
      },
      "NetworkAccessSharesThatCanBeAccessedAnonymously": {
        "type": "String",
        "metadata": {
          "displayName": "Network access: Shares that can be accessed anonymously",
          "description": "Specifies which network shares can be accessed by anonymous users. The default configuration for this policy setting has little effect because all users have to be authenticated before they can access shared resources on the server."
        },
        "defaultValue": "0"
      },
      "webAppDisableRemoteDebuggingMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Remote debugging should be turned off for Web Application",
          "description": "Enable or disable the monitoring of remote debugging for Web App"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "apiAppEnforceHttpsMonitoringEffectV2": {
        "type": "String",
        "metadata": {
          "displayName": "API App should only be accessible over HTTPS V2",
          "description": "Enable or disable the monitoring of the use of HTTPS in API App V2"
        },
        "allowedValues": [
          "Audit",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "identityEnableMFAForWritePermissionsMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "MFA should be enabled accounts with write permissions on your subscription",
          "description": "Enable or disable the monitoring of MFA for accounts with write permissions in subscription"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "jitNetworkAccessMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Just-In-Time network access control should be applied on virtual machines",
          "description": "Enable or disable the monitoring of network just In time access"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "identityEnableMFAForOwnerPermissionsMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "MFA should be enabled on accounts with owner permissions on your subscription",
          "description": "Enable or disable the monitoring of MFA for accounts with owner permissions in subscription"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "kubernetesServiceRbacEnabledMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Role-Based Access Control (RBAC) should be used on Kubernetes Services",
          "description": "Enable or disable the monitoring of Kubernetes Services without RBAC enabled"
        },
        "allowedValues": [
          "Audit",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "restrictAccessToManagementPortsMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Management ports should be closed on your virtual machines",
          "description": "Enable or disable the monitoring of open management ports on Virtual Machines"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "vmssOsVulnerabilitiesMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Vulnerabilities in security configuration on your virtual machine scale sets should be remediated",
          "description": "Enable or disable virtual machine scale sets OS vulnerabilities monitoring"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "diagnosticsLogsInEventHubMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Diagnostic logs in Event Hub should be enabled",
          "description": "Enable or disable the monitoring of diagnostic logs in Event Hub accounts"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "diagnosticsLogsInEventHubRetentionDays": {
        "type": "String",
        "metadata": {
          "displayName": "Required retention (in days) of logs in Event Hub accounts",
          "description": "The required diagnostic logs retention period in days"
        },
        "defaultValue": "365"
      },
      "vmssSystemUpdatesMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "System updates on virtual machine scale sets should be installed",
          "description": "Enable or disable virtual machine scale sets reporting of system updates"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "diagnosticsLogsInServiceFabricMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "Diagnostic logs in Virtual Machine Scale Sets should be enabled",
          "description": "Enable or disable the monitoring of diagnostic logs in Service Fabric"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "systemUpdatesMonitoringEffect": {
        "type": "String",
        "metadata": {
          "displayName": "System updates should be installed on your machines",
          "description": "Enable or disable reporting of system updates"
        },
        "allowedValues": [
          "AuditIfNotExists",
          "Disabled"
        ],
        "defaultValue": "AuditIfNotExists"
      },
      "DeployAzureBaselineSecurityOptionsAccountsAccountsGuestAccountStatus": {
        "type": "String",
        "metadata": {
          "displayName": "Accounts: Guest account status",
          "description": "Specifies whether the local Guest account is disabled."
        },
        "defaultValue": "0"
      },
      "RecoveryConsoleAllowFloppyCopyAndAccessToAllDrivesAndAllFolders": {
        "type": "String",
        "metadata": {
          "displayName": "Recovery console: Allow floppy copy and access to all drives and all folders",
          "description": "Specifies whether to make the Recovery Console SET command available, which allows setting of recovery console environment variables."
        },
        "defaultValue": "0"
      },
      "AuditShutDownSystemImmediatelyIfUnableToLogSecurityAudits": {
        "type": "String",
        "metadata": {
          "displayName": "Audit: Shut down system immediately if unable to log security audits",
          "description": "Audits if the system will shut down when unable to log Security events."
        },
        "defaultValue": "0"
      },
      "DeployAzureBaselineSystemAuditPoliciesDetailedTrackingAuditProcessTermination": {
        "type": "String",
        "metadata": {
          "displayName": "Audit Process Termination",
          "description": "Specifies whether audit events are generated when a process has exited. Recommended for monitoring termination of critical processes."
        },
        "allowedValues": [
          "No Auditing",
          "Success",
          "Failure",
          "Success and Failure"
        ],
        "defaultValue": "No Auditing"
      },
      "WindowsFirewallDomainUseProfileSettings": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Domain): Use profile settings",
          "description": "Specifies whether Windows Firewall with Advanced Security uses the settings for the Domain profile to filter network traffic. If you select Off, Windows Firewall with Advanced Security will not use any of the firewall rules or connection security rules for this profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallDomainBehaviorForOutboundConnections": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Domain): Behavior for outbound connections",
          "description": "Specifies the behavior for outbound connections for the Domain profile that do not match an outbound firewall rule. The default value of 0 means to allow connections, and a value of 1 means to block connections."
        },
        "defaultValue": "0"
      },
      "WindowsFirewallDomainApplyLocalConnectionSecurityRules": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Domain): Apply local connection security rules",
          "description": "Specifies whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy for the Domain profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallDomainApplyLocalFirewallRules": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Domain): Apply local firewall rules",
          "description": "Specifies whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy for the Domain profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallDomainDisplayNotifications": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Domain): Display notifications",
          "description": "Specifies whether Windows Firewall with Advanced Security displays notifications to the user when a program is blocked from receiving inbound connections, for the Domain profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallPrivateUseProfileSettings": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Private): Use profile settings",
          "description": "Specifies whether Windows Firewall with Advanced Security uses the settings for the Private profile to filter network traffic. If you select Off, Windows Firewall with Advanced Security will not use any of the firewall rules or connection security rules for this profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallPrivateBehaviorForOutboundConnections": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Private): Behavior for outbound connections",
          "description": "Specifies the behavior for outbound connections for the Private profile that do not match an outbound firewall rule. The default value of 0 means to allow connections, and a value of 1 means to block connections."
        },
        "defaultValue": "0"
      },
      "WindowsFirewallPrivateApplyLocalConnectionSecurityRules": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Private): Apply local connection security rules",
          "description": "Specifies whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy for the Private profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallPrivateApplyLocalFirewallRules": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Private): Apply local firewall rules",
          "description": "Specifies whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy for the Private profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallPrivateDisplayNotifications": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Private): Display notifications",
          "description": "Specifies whether Windows Firewall with Advanced Security displays notifications to the user when a program is blocked from receiving inbound connections, for the Private profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallPublicUseProfileSettings": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Public): Use profile settings",
          "description": "Specifies whether Windows Firewall with Advanced Security uses the settings for the Public profile to filter network traffic. If you select Off, Windows Firewall with Advanced Security will not use any of the firewall rules or connection security rules for this profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallPublicBehaviorForOutboundConnections": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Public): Behavior for outbound connections",
          "description": "Specifies the behavior for outbound connections for the Public profile that do not match an outbound firewall rule. The default value of 0 means to allow connections, and a value of 1 means to block connections."
        },
        "defaultValue": "0"
      },
      "WindowsFirewallPublicApplyLocalConnectionSecurityRules": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Public): Apply local connection security rules",
          "description": "Specifies whether local administrators are allowed to create connection security rules that apply together with connection security rules configured by Group Policy for the Public profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallPublicApplyLocalFirewallRules": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Public): Apply local firewall rules",
          "description": "Specifies whether local administrators are allowed to create local firewall rules that apply together with firewall rules configured by Group Policy for the Public profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallPublicDisplayNotifications": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall (Public): Display notifications",
          "description": "Specifies whether Windows Firewall with Advanced Security displays notifications to the user when a program is blocked from receiving inbound connections, for the Public profile."
        },
        "defaultValue": "1"
      },
      "WindowsFirewallDomainAllowUnicastResponse": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall: Domain: Allow unicast response",
          "description": "Specifies whether Windows Firewall with Advanced Security permits the local computer to receive unicast responses to its outgoing multicast or broadcast messages; for the Domain profile."
        },
        "defaultValue": "0"
      },
      "WindowsFirewallPrivateAllowUnicastResponse": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall: Private: Allow unicast response",
          "description": "Specifies whether Windows Firewall with Advanced Security permits the local computer to receive unicast responses to its outgoing multicast or broadcast messages; for the Private profile."
        },
        "defaultValue": "0"
      },
      "WindowsFirewallPublicAllowUnicastResponse": {
        "type": "String",
        "metadata": {
          "displayName": "Windows Firewall: Public: Allow unicast response",
          "description": "Specifies whether Windows Firewall with Advanced Security permits the local computer to receive unicast responses to its outgoing multicast or broadcast messages; for the Public profile."
        },
        "defaultValue": "1"
      },
      "requiredRetentionDays": {
        "type": "String",
        "metadata": {
          "displayName": "Required retention (in days) of logs in Data Lake Store accounts",
          "description": "The required diagnostic logs retention period in days"
        },
        "defaultValue": "365"
      },
      "diagnosticsLogsInRedisCacheMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "Effect for policy: [Only secure connections to your Redis Cache should be enabled]",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "secureTransferToStorageAccountMonitoringEffect": {
        "type": "String",
        "metadata": {
        "displayName": "Effect for policy: [Secure transfer to storage accounts should be enabled]",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "usersOrGroupsThatMayAccessThisComputerFromTheNetwork": {
        "type": "String",
        "metadata": {
          "displayName": "Users or groups that may access this computer from the network",
          "description": "Specifies which remote users on the network are permitted to connect to the computer. This does not include Remote Desktop Connection."
        },
        "defaultValue": "Administrators, Authenticated Users"
      },
      "usersOrGroupsThatMayLogOnLocally": {
        "type": "String",
        "metadata": {
          "displayName": "Users or groups that may log on locally",
          "description": "Specifies which users or groups can interactively log on to the computer. Users who attempt to log on via Remote Desktop Connection or IIS also require this user right."
        },
        "defaultValue": "Administrators"
      },
      "usersOrGroupsThatMayLogOnThroughRemoteDesktopServices": {
        "type": "String",
        "metadata": {
          "displayName": "Users or groups that may log on through Remote Desktop Services",
          "description": "Specifies which users or groups are permitted to log on as a Terminal Services client, Remote Desktop, or for Remote Assistance."
        },
        "defaultValue": "Administrators, Remote Desktop Users"
      },
      "usersAndGroupsThatAreDeniedAccessToThisComputerFromTheNetwork": {
        "type": "String",
        "metadata": {
          "displayName": "Users and groups that are denied access from the network",
          "description": "Specifies which users or groups are explicitly prohibited from connecting across the network."
        },
        "defaultValue": "Guests"
      },
      "usersOrGroupsThatMayManageAuditingAndSecurityLog": {
        "type": "String",
        "metadata": {
          "displayName": "Users or groups that may manage auditing and security log",
          "description": "Specifies users and groups permitted to change the auditing options for files and directories and clear the Security log."
        },
        "defaultValue": "Administrators"
      },
      "usersOrGroupsThatMayBackUpFilesAndDirectories": {
        "type": "String",
        "metadata": {
          "displayName": "Users or groups that may back up files and directories",
          "description": "Specifies users and groups allowed to circumvent file and directory permissions to back up the system."
        },
        "defaultValue": "Administrators, Backup Operators"
      },
      "usersOrGroupsThatMayChangeTheSystemTime": {
        "type": "String",
        "metadata": {
          "displayName": "Users or groups that may change the system time",
          "description": "Specifies which users and groups are permitted to change the time and date on the internal clock of the computer."
        },
        "defaultValue": "Administrators, LOCAL SERVICE"
      },
      "usersOrGroupsThatMayChangeTheTimeZone": {
        "type": "String",
        "metadata": {
          "displayName": "Users or groups that may change the time zone",
          "description": "Specifies which users and groups are permitted to change the time zone of the computer."
        },
        "defaultValue": "Administrators, LOCAL SERVICE"
      },
      "usersOrGroupsThatMayCreateATokenObject": {
        "type": "String",
        "metadata": {
          "displayName": "Users or groups that may create a token object",
          "description": "Specifies which users and groups are permitted to create an access token, which may provide elevated rights to access sensitive data."
        },
        "defaultValue": "No One"
      },
      "usersAndGroupsThatAreDeniedLoggingOnAsABatchJob": {
        "type": "String",
        "metadata": {
          "displayName": "Users and groups that are denied logging on as a batch job",
          "description": "Specifies which users and groups are explicitly not permitted to log on to the computer as a batch job (i.e. scheduled task)."
        },
        "defaultValue": "Guests"
      },
      "usersAndGroupsThatAreDeniedLoggingOnAsAService": {
        "type": "String",
        "metadata": {
          "displayName": "Users and groups that are denied logging on as a service",
          "description": "Specifies which service accounts are explicitly not permitted to register a process as a service."
        },
        "defaultValue": "Guests"
      },
      "usersAndGroupsThatAreDeniedLocalLogon": {
        "type": "String",
        "metadata": {
          "displayName": "Users and groups that are denied local logon",
          "description": "Specifies which users and groups are explicitly not permitted to log on to the computer."
        },
        "defaultValue": "Guests"
      },
      "usersAndGroupsThatAreDeniedLogOnThroughRemoteDesktopServices": {
        "type": "String",
        "metadata": {
          "displayName": "Users and groups that are denied log on through Remote Desktop Services",
          "description": "Specifies which users and groups are explicitly not permitted to log on to the computer via Terminal Services/Remote Desktop Client."
        },
        "defaultValue": "Guests"
      },
      "userAndGroupsThatMayForceShutdownFromARemoteSystem": {
        "type": "String",
        "metadata": {
          "displayName": "User and groups that may force shutdown from a remote system",
          "description": "Specifies which users and groups are permitted to shut down the computer from a remote location on the network."
        },
        "defaultValue": "Administrators"
      },
      "usersAndGroupsThatMayRestoreFilesAndDirectories": {
        "type": "String",
        "metadata": {
          "displayName": "Users and groups that may restore files and directories",
          "description": "Specifies which users and groups are permitted to bypass file, directory, registry, and other persistent object permissions when restoring backed up files and directories."
        },
        "defaultValue": "Administrators, Backup Operators"
      },
      "usersAndGroupsThatMayShutDownTheSystem": {
        "type": "String",
        "metadata": {
          "displayName": "Users and groups that may shut down the system",
          "description": "Specifies which users and groups who are logged on locally to the computers in your environment are permitted to shut down the operating system with the Shut Down command."
        },
        "defaultValue": "Administrators"
      },
      "usersOrGroupsThatMayTakeOwnershipOfFilesOrOtherObjects": {
        "type": "String",
        "metadata": {
          "displayName": "Users or groups that may take ownership of files or other objects",
          "description": "Specifies which users and groups are permitted to take ownership of files, folders, registry keys, processes, or threads. This user right bypasses any permissions that are in place to protect objects to give ownership to the specified user."
        },
        "defaultValue": "Administrators"
      },
      "virtualMachinesShouldBeConnectedToAnApprovedVirtualNetworkEffect": {
        "type": "String",
        "metadata": {
        "displayName": "Effect for policy: [Virtual machines should be connected to an approved virtual network]",
          "description": "Azure Policy effect for this policy; for more information about effects, visit https://aka.ms/policyeffects"
        },
        "allowedValues": [
          "Audit",
          "Deny",
          "Disabled"
        ],
        "defaultValue": "Audit"
      },
      "uacAdminApprovalModeForTheBuiltinAdministratorAccount": {
        "type": "String",
        "metadata": {
          "displayName": "UAC: Admin Approval Mode for the Built-in Administrator account",
          "description": "Specifies the behavior of Admin Approval Mode for the built-in Administrator account."
        },
        "defaultValue": "1"
      },
      "uacBehaviorOfTheElevationPromptForAdministratorsInAdminApprovalMode": {
        "type": "String",
        "metadata": {
          "displayName": "UAC: Behavior of the elevation prompt for administrators in Admin Approval Mode",
          "description": "Specifies the behavior of the elevation prompt for administrators."
        },
        "defaultValue": "2"
      },
      "uacDetectApplicationInstallationsAndPromptForElevation": {
        "type": "String",
        "metadata": {
          "displayName": "UAC: Detect application installations and prompt for elevation",
          "description": "Specifies the behavior of application installation detection for the computer."
        },
        "defaultValue": "1"
      },
      "uacRunAllAdministratorsInAdminApprovalMode": {
        "type": "String",
        "metadata": {
          "displayName": "UAC: Run all administrators in Admin Approval Mode",
          "description": "Specifies the behavior of all User Account Control (UAC) policy settings for the computer."
        },
        "defaultValue": "1"
      }
    },
    "policyDefinitions": [
      {
        "policyDefinitionReferenceId": "DeploydefaultMicrosoftIaaSAntimalwareextensionforWindowsServer",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2835b622-407b-4114-9198-6f7064cbe0dc",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0201.09j1Organizational.124-09.j"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInBatchAccountMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/428256e6-1fac-4f48-a757-df34c2b3336d",
        "parameters": {
          "effect": {
          "value": "[parameters('diagnosticsLogsInBatchAccountMonitoringEffect')]"
          },
          "requiredRetentionDays": {
          "value": "[parameters('diagnosticsLogsInBatchAccountRetentionDays')]"
          }
        },
        "groupNames": [
          "hipaa-1205.09aa2System.1-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "systemUpdatesMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/86b3d65f-7626-441e-b690-81a8b71cff60",
        "parameters": {
          "effect": {
          "value": "[parameters('systemUpdatesMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0201.09j1Organizational.124-09.j"
        ]
      },
      {
        "policyDefinitionReferenceId": "RequireencryptiononDataLakeStoreaccounts",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a7ff3161-0087-490a-9ad9-ad6217f4f43a",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0304.09o3Organizational.1-09.o"
        ]
      },
      {
        "policyDefinitionReferenceId": "ensureManagedInstanceTDEIsEncryptedWithYourOwnKeyMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/048248b0-55cd-46da-b1ff-39efd52db260",
        "parameters": {
          "effect": {
          "value": "[parameters('ensureManagedInstanceTDEIsEncryptedWithYourOwnKeyMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0304.09o3Organizational.1-09.o"
        ]
      },
      {
        "policyDefinitionReferenceId": "diskEncryptionMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0961003e-5a0a-4549-abde-af6a37f2724d",
        "parameters": {
          "effect": {
          "value": "[parameters('diskEncryptionMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0302.09o2Organizational.1-09.o"
        ]
      },
      {
        "policyDefinitionReferenceId": "AuditSQLTransparentDataEncryptionStatus",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/17k78e20-9358-41c9-923c-fb736d382a12",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0301.09o1Organizational.123-09.o"
        ]
      },
      {
        "policyDefinitionReferenceId": "Prerequisite_AddSystemIdentityWhenNone",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/3cf2ab00-13f1-4d0c-8971-2ac904541a7e"
      },
      {
        "policyDefinitionReferenceId": "Prerequisite_AddSystemIdentityWhenUser",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/497dff13-db2a-4c0f-8603-28fa3b331ab6"
      },
      {
        "policyDefinitionReferenceId": "Prerequisite_DeployExtensionWindows",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/385f5831-96d4-41db-9a3c-cd3af78aaae6"
      },
      {
        "policyDefinitionReferenceId": "Prerequisite_DeployExtensionLinux",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/331e8ea8-378a-410f-a2e5-ae22f38bb0da"
      },
      {
        "policyDefinitionReferenceId": "InstalledApp",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ebb67efd-3c46-49b0-adfe-5599eb944998",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "installedApplication": {
          "value": "[parameters('installedApplicationsOnWindowsVM')]"
          }
        },
        "groupNames": [
          
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaseline_SecurityOptionsAudit",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/33936777-f2ac-45aa-82ec-07958ec9ade4",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "AuditShutDownSystemImmediatelyIfUnableToLogSecurityAudits": {
          "value": "[parameters('AuditShutDownSystemImmediatelyIfUnableToLogSecurityAudits')]"
          }
        },
        "groupNames": [
          "hipaa-0605.10h1System.12-10.h"
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaseline_SystemAuditPoliciesAccountManagement",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/94d9aca8-3757-46df-aa51-f218c5f11954",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "hipaa-0605.10h1System.12-10.h"
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaseline_SystemAuditPoliciesDetailedTracking",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/58383b73-94a9-4414-b382-4146eb02611b",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "AuditProcessTermination": {
          "value": "[parameters('DeployAzureBaselineSystemAuditPoliciesDetailedTrackingAuditProcessTermination')]"
          }
        },
        "groupNames": [
          "hipaa-0635.10k1Organizational.12-10.k",
          "hipaa-0636.10k2Organizational.1-10.k",
          "hipaa-0637.10k2Organizational.2-10.k",
          "hipaa-0638.10k2Organizational.34569-10.k",
          "hipaa-0639.10k2Organizational.78-10.k",
          "hipaa-0640.10k2Organizational.1012-10.k",
          "hipaa-0641.10k2Organizational.11-10.k",
          "hipaa-0642.10k3Organizational.12-10.k",
          "hipaa-0643.10k3Organizational.3-10.k",
          "hipaa-0644.10k3Organizational.4-10.k"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInSearchServiceMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b4330a05-a843-4bc8-bf9a-cacce50c67f4",
        "parameters": {
          "effect": {
          "value": "[parameters('diagnosticsLogsInSearchServiceMonitoringEffect')]"
          },
          "requiredRetentionDays": {
          "value": "[parameters('diagnosticsLogsInSearchServiceRetentionDays')]"
          }
        },
        "groupNames": [
          "hipaa-1208.09aa3System.1-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "AuditVirtualMachinesWithoutDisasterRecoveryConfigured",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0015ea4d-51ff-4ce3-8d8c-f3f8f0179a56",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1634.12b1Organizational.1-12.b",
          "hipaa-1638.12b2Organizational.345-12.b"
        ]
      },
      {
        "policyDefinitionReferenceId": "vulnerabilityAssessmentOnManagedInstanceMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1b7aa243-30e4-4c9e-bca8-d0d3022b634a",
        "parameters": {
          "effect": {
          "value": "[parameters('vulnerabilityAssessmentOnManagedInstanceMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0709.10m1Organizational.1-10.m",
          "hipaa-0710.10m2Organizational.1-10.m",
          "hipaa-0719.10m3Organizational.5-10.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "vulnerabilityAssessmentMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/760a85ff-6162-42b3-8d70-698e268f648c",
        "parameters": {
          "effect": {
          "value": "[parameters('vulnerabilityAssesmentMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0709.10m1Organizational.1-10.m",
          "hipaa-0712.10m2Organizational.4-10.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaseline_SecurityOptionsMicrosoftNetworkServer",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/caf2d518-f029-4f6b-833b-d7081702f253",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          "hipaa-0709.10m1Organizational.1-10.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaseline_AdministrativeTemplatesNetwork",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/67e010c1-640d-438e-a3a5-feaccb533a98",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "EnableInsecureGuestLogons": {
          "value": "[parameters('EnableInsecureGuestLogons')]"
          },
          "AllowSimultaneousConnectionsToTheInternetOrAWindowsDomain": {
          "value": "[parameters('AllowSimultaneousConnectionsToTheInternetOrAWindowsDomain')]"
          },
          "TurnOffMulticastNameResolution": {
          "value": "[parameters('TurnOffMulticastNameResolution')]"
          }
        },
        "groupNames": [
          
        ]
      },
      {
        "policyDefinitionReferenceId": "Deploynetworkwatcherwhenvirtualnetworksarecreated",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a9b99dd8-06c5-4317-8629-9d86a3c6e7d9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaseline_WindowsFirewallProperties",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/35d9882c-993d-44e6-87d2-db66ce21b636",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "WindowsFirewallDomainUseProfileSettings": {
          "value": "[parameters('WindowsFirewallDomainUseProfileSettings')]"
          },
          "WindowsFirewallDomainBehaviorForOutboundConnections": {
          "value": "[parameters('WindowsFirewallDomainBehaviorForOutboundConnections')]"
          },
          "WindowsFirewallDomainApplyLocalConnectionSecurityRules": {
          "value": "[parameters('WindowsFirewallDomainApplyLocalConnectionSecurityRules')]"
          },
          "WindowsFirewallDomainApplyLocalFirewallRules": {
          "value": "[parameters('WindowsFirewallDomainApplyLocalFirewallRules')]"
          },
          "WindowsFirewallDomainDisplayNotifications": {
          "value": "[parameters('WindowsFirewallDomainDisplayNotifications')]"
          },
          "WindowsFirewallPrivateUseProfileSettings": {
          "value": "[parameters('WindowsFirewallPrivateUseProfileSettings')]"
          },
          "WindowsFirewallPrivateBehaviorForOutboundConnections": {
          "value": "[parameters('WindowsFirewallPrivateBehaviorForOutboundConnections')]"
          },
          "WindowsFirewallPrivateApplyLocalConnectionSecurityRules": {
          "value": "[parameters('WindowsFirewallPrivateApplyLocalConnectionSecurityRules')]"
          },
          "WindowsFirewallPrivateApplyLocalFirewallRules": {
          "value": "[parameters('WindowsFirewallPrivateApplyLocalFirewallRules')]"
          },
          "WindowsFirewallPrivateDisplayNotifications": {
          "value": "[parameters('WindowsFirewallPrivateDisplayNotifications')]"
          },
          "WindowsFirewallPublicUseProfileSettings": {
          "value": "[parameters('WindowsFirewallPublicUseProfileSettings')]"
          },
          "WindowsFirewallPublicBehaviorForOutboundConnections": {
          "value": "[parameters('WindowsFirewallPublicBehaviorForOutboundConnections')]"
          },
          "WindowsFirewallPublicApplyLocalConnectionSecurityRules": {
          "value": "[parameters('WindowsFirewallPublicApplyLocalConnectionSecurityRules')]"
          },
          "WindowsFirewallPublicApplyLocalFirewallRules": {
          "value": "[parameters('WindowsFirewallPublicApplyLocalFirewallRules')]"
          },
          "WindowsFirewallPublicDisplayNotifications": {
          "value": "[parameters('WindowsFirewallPublicDisplayNotifications')]"
          },
          "WindowsFirewallDomainAllowUnicastResponse": {
          "value": "[parameters('WindowsFirewallDomainAllowUnicastResponse')]"
          },
          "WindowsFirewallPrivateAllowUnicastResponse": {
          "value": "[parameters('WindowsFirewallPrivateAllowUnicastResponse')]"
          },
          "WindowsFirewallPublicAllowUnicastResponse": {
          "value": "[parameters('WindowsFirewallPublicAllowUnicastResponse')]"
          }
        },
        "groupNames": [
          "hipaa-0858.09m1Organizational.4-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "nextGenerationFirewallMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9daedab3-fb2d-461e-b861-71790eead4f6",
        "parameters": {
          "effect": {
          "value": "[parameters('nextGenerationFirewallMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0858.09m1Organizational.4-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "ensureServerTDEIsEncryptedWithYourOwnKeyMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0d134df8-db83-46fb-ad72-fe0c9428c8dd",
        "parameters": {
          "effect": {
          "value": "[parameters('ensureServerTDEIsEncryptedWithYourOwnKeyMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0304.09o3Organizational.1-09.o"
        ]
      },
      {
        "policyDefinitionReferenceId": "apiAppDisableRemoteDebuggingMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e9c8d085-d9cc-4b17-9cdc-059f1f01f19e",
        "parameters": {
          "effect": {
          "value": "[parameters('apiAppDisableRemoteDebuggingMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0914.09s1Organizational.6-09.s",
          "hipaa-1196.01l3Organizational.24-01.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "classicComputeVMsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1d84d5fb-01f6-4d12-ba4f-4a26081d403d",
        "parameters": {
          "effect": {
          "value": "[parameters('classicComputeVMsMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0835.09n1Organizational.1-09.n"
        ]
      },
      {
        "policyDefinitionReferenceId": "disableUnrestrictedNetworkToStorageAccountMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/34c877ad-507e-4c82-993e-3452a6e0ad3c",
        "parameters": {
          "effect": {
          "value": "[parameters('disableUnrestrictedNetworkToStorageAccountMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0866.09m3Organizational.1516-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "adaptiveApplicationControlsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/47a6b606-51aa-4496-8bb7-64b11cf66adc",
        "parameters": {
          "effect": {
          "value": "[parameters('adaptiveApplicationControlsMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0201.09j1Organizational.124-09.j",
          "hipaa-0607.10h2System.23-10.h",
          "hipaa-1197.01l3Organizational.3-01.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "DeployDiagnosticSettingsforNetworkSecurityGroups",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c9c29499-c1d1-4195-99bd-2ec9e3a9dc89",
        "parameters": {
          "storagePrefix": {
          "value": "[parameters('DeployDiagnosticSettingsforNetworkSecurityGroupsstoragePrefix')]"
          },
          "rgName": {
          "value": "[parameters('DeployDiagnosticSettingsforNetworkSecurityGroupsrgName')]"
          }
        },
        "groupNames": [
          "hipaa-0860.09m1Organizational.9-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaseline_SecurityOptionsNetworkAccess",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/3ff60f98-7fa4-410a-9f7f-0b00f5afdbdd",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "NetworkAccessRemotelyAccessibleRegistryPaths": {
          "value": "[parameters('NetworkAccessRemotelyAccessibleRegistryPaths')]"
          },
          "NetworkAccessRemotelyAccessibleRegistryPathsAndSubpaths": {
          "value": "[parameters('NetworkAccessRemotelyAccessibleRegistryPathsAndSubpaths')]"
          },
          "NetworkAccessSharesThatCanBeAccessedAnonymously": {
          "value": "[parameters('NetworkAccessSharesThatCanBeAccessedAnonymously')]"
          }
        },
        "groupNames": [
          "hipaa-0861.09m2Organizational.67-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "webAppDisableRemoteDebuggingMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/cb510bfd-1cba-4d9f-a230-cb0976f4bb71",
        "parameters": {
          "effect": {
          "value": "[parameters('webAppDisableRemoteDebuggingMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0912.09s1Organizational.4-09.s",
          "hipaa-1194.01l2Organizational.2-01.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "PreviewAuditThatLinuxVMsHaveThePasswdFilePermissionsSeTTo0644",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e6955644-301c-44b5-a4c4-528577de6861",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          
        ]
      },
      {
        "policyDefinitionReferenceId": "AuditSqlServerLevelAuditingSettings",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a6fb4358-5bf4-4ad7-ba82-2cd2f41ce5e9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1211.09aa3System.4-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "Audit_WindowsCertificateInTrustedRoot",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/934345e1-4dfb-4c70-90d7-41990dc9608b",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "CertificateThumbprints": {
          "value": "[parameters('CertificateThumbprints')]"
          }
        },
        "groupNames": [
          "hipaa-0945.09y1Organizational.3-09.y"
        ]
      },
      {
        "policyDefinitionReferenceId": "apiAppEnforceHttpsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b7ddfbdc-1260-477d-91fd-98bd9be789a6",
        "parameters": {
          "effect": {
          "value": "[parameters('apiAppEnforceHttpsMonitoringEffectV2')]"
          }
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0949.09y2Organizational.5-09.y",
          "hipaa-1404.05i2Organizational.1-05.i"
        ]
      },
      {
        "policyDefinitionReferenceId": "PreviewAuditWindowsVmEnforcesPasswordComplexityRequirements",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/bf16e0bb-31e1-4646-8202-60a235cc7e74",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          }
        },
        "groupNames": [
          
        ]
      },
      {
        "policyDefinitionReferenceId": "identityEnableMFAForWritePermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/9297c21d-2ed6-4474-b48f-163f75654ce3",
        "parameters": {
          "effect": {
          "value": "[parameters('identityEnableMFAForWritePermissionsMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-1117.01j1Organizational.23-01.j",
          "hipaa-1173.01j1Organizational.6-01.j",
          "hipaa-1177.01j2Organizational.6-01.j",
          "hipaa-11110.01q1Organizational.6-01.q"
        ]
      },
      {
        "policyDefinitionReferenceId": "jitNetworkAccessMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b0f33259-77d7-4c9e-aac6-3aabcfae693c",
        "parameters": {
          "effect": {
          "value": "[parameters('jitNetworkAccessMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0858.09m1Organizational.4-09.m",
          "hipaa-11180.01c3System.6-01.c",
          "hipaa-1119.01j2Organizational.3-01.j",
          "hipaa-1175.01j1Organizational.8-01.j",
          "hipaa-1179.01j3Organizational.1-01.j",
          "hipaa-1192.01l1Organizational.1-01.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "identityEnableMFAForOwnerPermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/aa633080-8b72-40c4-a2d7-d00c03e80bed",
        "parameters": {
          "effect": {
          "value": "[parameters('identityEnableMFAForOwnerPermissionsMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-1116.01j1Organizational.145-01.j",
          "hipaa-1121.01j3Organizational.2-01.j",
          "hipaa-1176.01j2Organizational.5-01.j",
          "hipaa-11109.01q1Organizational.57-01.q"
        ]
      },
      {
        "policyDefinitionReferenceId": "kubernetesServiceRbacEnabledMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ac4a19c2-fa67-49b4-8ae5-0b2e78c49457",
        "parameters": {
          "effect": {
          "value": "[parameters('kubernetesServiceRbacEnabledMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-1149.01c2System.9-01.c",
          "hipaa-1153.01c3System.35-01.c",
          "hipaa-1229.09c1Organizational.1-09.c"
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaseline_SecurityOptionsAccounts",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ee984370-154a-4ee8-9726-19d900e56fc0",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "AccountsGuestAccountStatus": {
          "value": "[parameters('DeployAzureBaselineSecurityOptionsAccountsAccountsGuestAccountStatus')]"
          }
        },
        "groupNames": [
          "hipaa-1148.01c2System.78-01.c"
        ]
      },
      {
        "policyDefinitionReferenceId": "restrictAccessToManagementPortsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/22730e10-96f6-4aac-ad84-9383d35b5917",
        "parameters": {
          "effect": {
          "value": "[parameters('restrictAccessToManagementPortsMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-1143.01c1System.123-01.c",
          "hipaa-1150.01c2System.10-01.c",
          "hipaa-1193.01l2Organizational.13-01.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "vmssOsVulnerabilitiesMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/3c735d8a-a4ba-4a3a-b7cf-db7754cf57f4",
        "parameters": {
          "effect": {
          "value": "[parameters('vmssOsVulnerabilitiesMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0607.10h2System.23-10.h",
          "hipaa-0709.10m1Organizational.1-10.m",
          "hipaa-0714.10m2Organizational.7-10.m",
          "hipaa-0717.10m3Organizational.2-10.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInEventHubMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/83a214f7-d01a-484b-91a9-ed54470c9a6a",
        "parameters": {
          "effect": {
          "value": "[parameters('diagnosticsLogsInEventHubMonitoringEffect')]"
          },
          "requiredRetentionDays": {
          "value": "[parameters('diagnosticsLogsInEventHubRetentionDays')]"
          }
        },
        "groupNames": [
          "hipaa-1207.09aa2System.4-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "vmssSystemUpdatesMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c3f317a7-a95c-4547-b7e7-11017ebdf2fe",
        "parameters": {
          "effect": {
          "value": "[parameters('vmssSystemUpdatesMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-1202.09aa1System.1-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInServiceFabricMonitoringEffect",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7c1b1214-f927-48bf-8882-84f0af6588b1",
        "parameters": {
          "effect": {
          "value": "[parameters('diagnosticsLogsInServiceFabricMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-1206.09aa2System.23-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaseline_SecurityOptionsRecoveryconsole",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f71be03e-e25b-4d0f-b8bc-9b3e309b66c0",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "RecoveryConsoleAllowFloppyCopyAndAccessToAllDrivesAndAllFolders": {
          "value": "[parameters('RecoveryConsoleAllowFloppyCopyAndAccessToAllDrivesAndAllFolders')]"
          }
        },
        "groupNames": [
          "hipaa-1637.12b2Organizational.2-12.b"
        ]
      },
      {
        "policyDefinitionReferenceId": "azureBackupShouldBeEnabledForVirtualMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/013e242c-8828-4970-87b3-ab247555486d",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1620.09l1Organizational.8-09.l",
          "hipaa-1625.09l3Organizational.34-09.l",
          "hipaa-1699.09l1Organizational.10-09.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "networkTrafficDataCollectionAgentShouldBeInstalledOnLinuxVirtualMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/04c4380f-3fae-46e8-96c9-30193528f602",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0836.09.n2Organizational.1-09.n",
          "hipaa-0885.09n2Organizational.3-09.n"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInDataLakeStoreMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/057ef27e-665e-4328-8ea3-04b3122bd9fb",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "hipaa-1202.09aa1System.1-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "functionAppRestrictCORSAccessMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0820b7b9-23aa-4725-a1ce-ae4558f718e5",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0902.09s2Organizational.13-09.s",
          "hipaa-0960.09sCSPOrganizational.1-09.s"
        ]
      },
      {
        "policyDefinitionReferenceId": "adaptiveNetworkHardeningRecommendationsShouldBeAppliedOnInternetFacingVirtualMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/08e6af2d-db70-460a-bfe9-d5bd474ba9d6",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0859.09m1Organizational.78-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "identityDesignateMoreThanOneOwnerMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/09024ccc-0c5f-475e-9457-b7c0d9ed487b",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1145.01c2System.1-01.c",
          "hipaa-1152.01c3System.2-01.c",
          "hipaa-11208.01q1Organizational.8-01.q"
        ]
      },
      {
        "policyDefinitionReferenceId": "keyVaultObjectsShouldBeRecoverable",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0b60c0b2-2dc2-4e1c-b5c9-abbed971de53",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1635.12b1Organizational.2-12.b"
        ]
      },
      {
        "policyDefinitionReferenceId": "functionAppDisableRemoteDebuggingMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0e60b895-3786-45da-8377-9c6b4b6ac5f9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0913.09s1Organizational.5-09.s",
          "hipaa-1325.09s1Organizational.3-09.s",
          "hipaa-1195.01l3Organizational.1-01.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "geoRedundantBackupShouldBeEnabledForAzureDatabaseForMariaDB",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/0ec47710-77ff-4a3d-9181-6aa50af424d0",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1619.09l1Organizational.7-09.l",
          "hipaa-1624.09l3Organizational.12-09.l",
          "hipaa-1627.09l3Organizational.6-09.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "customSubscriptionOwnerRolesShouldNotExist",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/10ee2ea2-fb4d-45b8-a7e9-a2e770044cd9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1276.09c2Organizational.2-09.c",
          "hipaa-1278.09c2Organizational.56-09.c"
        ]
      },
      {
        "policyDefinitionReferenceId": "AuditWindowsVMsInWhichTheAdministratorsGroupContainsAnyOfTheSpecifiedMembers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/69bf4abd-ca1e-4cf6-8b5a-762d42e61d4f",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "membersToExclude": {
          "value": "[parameters('membersToExclude')]"
          }
        },
        "groupNames": [
          "hipaa-11210.01q2Organizational.10-01.q",
          "hipaa-1125.01q2System.1-01.q"
        ]
      },
      {
        "policyDefinitionReferenceId": "azureMonitorLogProfileShouldCollectLogsForCategoriesWrite,Delete,AndAction",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/1a4e592a-6a6e-44a5-9814-e36264ca96e7",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1212.09ab1System.1-09.ab",
          "hipaa-1219.09ab3System.10-09.ab"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInRedisCacheMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/22bee202-a82f-4305-9a2a-6d7f44d4dedb",
        "parameters": {
          "effect": {
          "value": "[parameters('diagnosticsLogsInRedisCacheMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0946.09y2Organizational.14-09.y",
          "hipaa-1451.05iCSPOrganizational.2-05.i"
        ]
      },
      {
        "policyDefinitionReferenceId": "serviceBusShouldUseAVirtualNetworkServiceEndpoint",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/235359c5-7c52-4b82-9055-01c75cf9f60e",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0860.09m1Organizational.9-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "vmssEndpointProtectionMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/26a828e1-e88f-464e-bbb3-c134a282b9de",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0201.09j1Organizational.124-09.j"
        ]
      },
      {
        "policyDefinitionReferenceId": "unattachedDisksShouldBeEncrypted",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2c89a2e5-7285-40fe-afe0-ae8654b92fb2",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0303.09o2Organizational.2-09.o"
        ]
      },
      {
        "policyDefinitionReferenceId": "appServiceShouldUseAVirtualNetworkServiceEndpoint",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2d21331d-a4c2-4def-a9ad-ee4e1e023beb",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0861.09m2Organizational.67-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "networkTrafficDataCollectionAgentShouldBeInstalledOnWindowsVirtualMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/2f2ee1de-44aa-4762-b6bd-0893fc3f306d",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0835.09n1Organizational.1-09.n",
          "hipaa-0887.09n2Organizational.5-09.n"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInLogicAppsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/34f95f76-5386-4de7-b824-0d8478470c9d",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "hipaa-1203.09aa1System.2-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "apiAppRestrictCORSAccessMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/358c20a6-3f9e-4f0e-97ff-c6ce485e2aac",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0911.09s1Organizational.2-09.s"
        ]
      },
      {
        "policyDefinitionReferenceId": "gatewaySubnetsShouldNotBeConfiguredWithANetworkSecurityGroup",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/35f9c03a-cc27-418e-9c0c-539ff999d010",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticLogsInIoTHubShouldBeEnabled",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/383856f8-de7f-44a2-81fc-e5135b5c2aa4",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "hipaa-1204.09aa1System.3-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "secureTransferToStorageAccountMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/404c3081-a854-4457-ae30-26a93ef643f9",
        "parameters": {
          "effect": {
          "value": "[parameters('secureTransferToStorageAccountMonitoringEffect')]"
          }
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0943.09y1Organizational.1-09.y",
          "hipaa-1401.05i1Organizational.1239-05.i"
        ]
      },
      {
        "policyDefinitionReferenceId": "azureMonitorShouldCollectActivityLogsFromAllRegions",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/41388f1c-2db0-4c25-95b2-35d7f5ccbfa9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1120.09ab3System.9-09.ab",
          "hipaa-1214.09ab2System.3456-09.ab"
        ]
      },
      {
        "policyDefinitionReferenceId": "automaticProvisioningOfTheLogAnalyticsMonitoringAgentShouldBeEnabledOnYourSubscription",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/475aae12-b88a-4572-8b36-9b712b2b3a17",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1213.09ab2System.128-09.ab",
          "hipaa-1220.09ab3System.56-09.ab"
        ]
      },
      {
        "policyDefinitionReferenceId": "geoRedundantBackupShouldBeEnabledForAzureDatabaseForPostgreSQL",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/48af4db5-9b8b-401c-8e74-076be876a430",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1618.09l1Organizational.45-09.l",
          "hipaa-1623.09l2Organizational.4-09.l",
          "hipaa-1626.09l3Organizational.5-09.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "identityDesignateLessThanOwnersMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/4f11b553-d42e-4e3a-89be-32ca364cad4c",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1144.01c1System.4-01.c",
          "hipaa-1151.01c3System.1-01.c",
          "hipaa-1154.01c3System.4-01.c",
          "hipaa-11112.01q2Organizational.67-01.q"
        ]
      },
      {
        "policyDefinitionReferenceId": "vulnerabilityAssessmentShouldBeEnabledOnVirtualMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/501541f7-f7e7-4cd6-868c-4190fdad3ac9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0709.10m1Organizational.1-10.m",
          "hipaa-0711.10m2Organizational.23-10.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "webAppRestrictCORSAccessMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5744710e-cc2f-4ee8-8809-3b11e89f4bc9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0901.09s1Organizational.1-09.s",
          "hipaa-0916.09s2Organizational.4-09.s"
        ]
      },
      {
        "policyDefinitionReferenceId": "ensureWEBAppHasClientCertificates(IncomingClientCertificates)SetToOn",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/5bb220d9-2698-4ee4-8404-b9c30c9df609",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0662.09sCSPOrganizational.2-09.s",
          "hipaa-0915.09s2Organizational.2-09.s"
        ]
      },
      {
        "policyDefinitionReferenceId": "storageAccountsShouldUseAVirtualNetworkServiceEndpoint",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/60d21c4f-21a3-4d94-85f4-b924e6aeeda4",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0867.09m3Organizational.17-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "auditWindowsLogAnalyticsAgentConnection",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6265018c-d7e2-432f-a75d-094d5f6f4465",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "workspaceId": {
          "value": "[parameters('workspaceId')]"
          }
        },
        "groupNames": [
          "hipaa-12102.09ab1Organizational.4-09.ab",
          "hipaa-1217.09ab3System.3-09.ab"
        ]
      },
      {
        "policyDefinitionReferenceId": "functionAppEnforceHttpsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/6d555dd1-86f2-4f1c-8ed7-5abae7c6cbab",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0949.09y2Organizational.5-09.y",
          "hipaa-1402.05i1Organizational.45-05.i"
        ]
      },
      {
        "policyDefinitionReferenceId": "auditDiagnosticSetting",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/7f89b1eb-583c-429a-8828-af049802c1d9",
        "parameters": {
          "listOfResourceTypes": {
          "value": "[parameters('listOfResourceTypes')]"
          }
        },
        "groupNames": [
          "hipaa-1210.09aa3System.3-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaselineUserRightsAssignment",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e068b215-0026-4354-b347-8fb2766f73a2",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "usersOrGroupsThatMayAccessThisComputerFromTheNetwork": {
          "value": "[parameters('usersOrGroupsThatMayAccessThisComputerFromTheNetwork')]"
          },
          "usersOrGroupsThatMayLogOnLocally": {
          "value": "[parameters('usersOrGroupsThatMayLogOnLocally')]"
          },
          "usersOrGroupsThatMayLogOnThroughRemoteDesktopServices": {
          "value": "[parameters('usersOrGroupsThatMayLogOnThroughRemoteDesktopServices')]"
          },
          "usersAndGroupsThatAreDeniedAccessToThisComputerFromTheNetwork": {
          "value": "[parameters('usersAndGroupsThatAreDeniedAccessToThisComputerFromTheNetwork')]"
          },
          "usersOrGroupsThatMayManageAuditingAndSecurityLog": {
          "value": "[parameters('usersOrGroupsThatMayManageAuditingAndSecurityLog')]"
          },
          "usersOrGroupsThatMayBackUpFilesAndDirectories": {
          "value": "[parameters('usersOrGroupsThatMayBackUpFilesAndDirectories')]"
          },
          "usersOrGroupsThatMayChangeTheSystemTime": {
          "value": "[parameters('usersOrGroupsThatMayChangeTheSystemTime')]"
          },
          "usersOrGroupsThatMayChangeTheTimeZone": {
          "value": "[parameters('usersOrGroupsThatMayChangeTheTimeZone')]"
          },
          "usersOrGroupsThatMayCreateATokenObject": {
          "value": "[parameters('usersOrGroupsThatMayCreateATokenObject')]"
          },
          "usersAndGroupsThatAreDeniedLoggingOnAsABatchJob": {
          "value": "[parameters('usersAndGroupsThatAreDeniedLoggingOnAsABatchJob')]"
          },
          "usersAndGroupsThatAreDeniedLoggingOnAsAService": {
          "value": "[parameters('usersAndGroupsThatAreDeniedLoggingOnAsAService')]"
          },
          "usersAndGroupsThatAreDeniedLocalLogon": {
          "value": "[parameters('usersAndGroupsThatAreDeniedLocalLogon')]"
          },
          "usersAndGroupsThatAreDeniedLogOnThroughRemoteDesktopServices": {
          "value": "[parameters('usersAndGroupsThatAreDeniedLogOnThroughRemoteDesktopServices')]"
          },
          "userAndGroupsThatMayForceShutdownFromARemoteSystem": {
          "value": "[parameters('userAndGroupsThatMayForceShutdownFromARemoteSystem')]"
          },
          "usersAndGroupsThatMayRestoreFilesAndDirectories": {
          "value": "[parameters('usersAndGroupsThatMayRestoreFilesAndDirectories')]"
          },
          "usersAndGroupsThatMayShutDownTheSystem": {
          "value": "[parameters('usersAndGroupsThatMayShutDownTheSystem')]"
          },
          "usersOrGroupsThatMayTakeOwnershipOfFilesOrOtherObjects": {
          "value": "[parameters('usersOrGroupsThatMayTakeOwnershipOfFilesOrOtherObjects')]"
          }
        },
        "groupNames": [
          "hipaa-1232.09c3Organizational.12-09.c"
        ]
      },
      {
        "policyDefinitionReferenceId": "geoRedundantBackupShouldBeEnabledForAzureDatabaseForMySQL",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/82339799-d096-41ae-8538-b108becf0970",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1617.09l1Organizational.23-09.l",
          "hipaa-1622.09l2Organizational.23-09.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "apiAppRequireLatestTlsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/8cb6aa8b-9e41-4f4e-aa25-089a7ac2581e",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0949.09y2Organizational.5-09.y"
        ]
      },
      {
        "policyDefinitionReferenceId": "TheAdministratorsGroupDoesNotContainAllOfTheSpecifiedMembers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/30f71ea1-ac77-4f26-9fc5-2d926bbd4ba7",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "membersToInclude": {
          "value": "[parameters('membersToInclude')]"
          }
        },
        "groupNames": [
          "hipaa-11211.01q2Organizational.11-01.q",
          "hipaa-1127.01q2System.3-01.q"
        ]
      },
      {
        "policyDefinitionReferenceId": "useRbacRulesMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a451c1ef-c6ca-483d-87ed-f49761e3ffb5",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1148.01c2System.78-01.c",
          "hipaa-1230.09c2Organizational.1-09.c"
        ]
      },
      {
        "policyDefinitionReferenceId": "webAppEnforceHttpsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a4af4a39-4135-47fb-b175-47fbdf85311d",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0949.09y2Organizational.5-09.y",
          "hipaa-1403.05i1Organizational.67-05.i"
        ]
      },
      {
        "policyDefinitionReferenceId": "logAnalyticsAgentShouldBeInstalledOnVirtualMachines",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/a70ca396-0a34-413a-88e1-b956c1e683be",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-12100.09ab2System.15-09.ab",
          "hipaa-1215.09ab2System.7-09.ab"
        ]
      },
      {
        "policyDefinitionReferenceId": "sqlServerShouldUseAVirtualNetworkServiceEndpoint",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ae5d2f14-d830-42b6-9899-df6cfe9c71a3",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0862.09m2Organizational.8-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "endpointProtectionMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/af6cd1bd-1635-48cb-bde7-5b15693900b9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0201.09j1Organizational.124-09.j"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInSelectiveAppServicesMonitoringEffect",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b607c5de-e7d9-4eee-9e5c-83f1bcee4fa0",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1209.09aa3System.2-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "networkWatcherShouldBeEnabled",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b6e2945c-0b7b-40f5-9233-7a5323b5cdc6",
        "parameters": {
          "listOfLocations": {
          "value": "[parameters('listOfLocations')]"
          },
          "resourceGroupName": {
          "value": "[parameters('NetworkWatcherResourceGroupName')]"
          }
        },
        "groupNames": [
          "hipaa-0837.09.n2Organizational.2-09.n",
          "hipaa-0886.09n2Organizational.4-09.n",
          "hipaa-0888.09n2Organizational.6-09.n"
        ]
      },
      {
        "policyDefinitionReferenceId": "AuditWindowsVMsInWhichTheAdministratorsGroupDoesNotContainOnlyTheSpecifiedMembers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/3d2a3320-2a72-4c67-ac5f-caa40fbee2b2",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "members": {
          "value": "[parameters('members')]"
          }
        },
        "groupNames": [
          "hipaa-1123.01q1System.2-01.q"
        ]
      },
      {
        "policyDefinitionReferenceId": "auditSpecificAdministrativeOperationsWithoutActivityLogAlerts",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/b954148f-4c11-4c38-8221-be76711e194a",
        "parameters": {
          "operationName": {
          "value": "[parameters('operationName')]"
          }
        },
        "groupNames": [
          "hipaa-1270.09ad1System.12-09.ad",
          "hipaa-1271.09ad1System.1-09.ad"
        ]
      },
      {
        "policyDefinitionReferenceId": "microsoftAntimalwareForAzureShouldBeConfiguredToAutomaticallyUpdateProtectionSignatures",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c43e4a30-77cb-48ab-a4dd-93f175c63b57",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0201.09j1Organizational.124-09.j"
        ]
      },
      {
        "policyDefinitionReferenceId": "containerRegistryShouldUseAVirtualNetworkServiceEndpoint",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c4857be7-912a-4c75-87e6-e30292bcdf78",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0868.09m3Organizational.18-09.m",
          "hipaa-0869.09m3Organizational.19-09.m",
          "hipaa-0870.09m3Organizational.20-09.m",
          "hipaa-0871.09m3Organizational.22-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInDataLakeAnalyticsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/c95c74d9-38fe-4f0d-af86-0c7d626a315c",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "hipaa-1210.09aa3System.3-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInKeyVaultMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/cf820ca0-f99e-4f3e-84fb-66e913812d21",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "hipaa-1211.09aa3System.4-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "enforceSSLConnectionShouldBeEnabledForPostgreSQLDatabaseServers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d158790f-bfb0-486c-8631-2dc6b4e8e6af",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0947.09y2Organizational.2-09.y",
          "hipaa-1450.05i2Organizational.2-05.i"
        ]
      },
      {
        "policyDefinitionReferenceId": "longtermGeoRedundantBackupEnabledAzureSQLDatabases",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d38fc420-0735-4ef3-ac11-c806f651a570",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1616.09l1Organizational.16-09.l",
          "hipaa-1621.09l2Organizational.1-09.l"
        ]
      },
      {
        "policyDefinitionReferenceId": "virtualMachinesShouldBeConnectedToAnApprovedVirtualNetwork",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d416745a-506c-48b6-8ab1-83cb814bcaa3",
        "parameters": {
          "effect": {
          "value": "[parameters('virtualMachinesShouldBeConnectedToAnApprovedVirtualNetworkEffect')]"
          },
          "virtualNetworkId": {
          "value": "[parameters('virtualNetworkId')]"
          }
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n"
        ]
      },
      {
        "policyDefinitionReferenceId": "eventHubShouldUseAVirtualNetworkServiceEndpoint",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/d63edb4a-c612-454d-b47d-191a724fcbf0",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0863.09m2Organizational.910-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "cosmosDBShouldUseAVirtualNetworkServiceEndpoint",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e0a2b1a3-f7f9-4569-807f-2a9edebdf4d9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0864.09m2Organizational.12-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "systemConfigurationsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e1e5fd5d-3e4c-4ce1-8661-7d1873ae6b15",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0605.10h1System.12-10.h",
          "hipaa-0709.10m1Organizational.1-10.m",
          "hipaa-0713.10m2Organizational.5-10.m",
          "hipaa-0718.10m3Organizational.34-10.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "identityEnableMFAForReadPermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e3576e28-8b17-4677-84c3-db2990658d64",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1118.01j2Organizational.124-01.j",
          "hipaa-1174.01j1Organizational.7-01.j",
          "hipaa-1178.01j2Organizational.7-01.j",
          "hipaa-11111.01q2System.4-01.q"
        ]
      },
      {
        "policyDefinitionReferenceId": "AzureBaselineSecurityOptionsUserAccountControl",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/492a29ed-d143-4f03-b6a4-705ce081b463",
        "parameters": {
          "IncludeArcMachines": {
          "value": "[parameters('IncludeArcMachines')]"
          },
          "uacAdminApprovalModeForTheBuiltinAdministratorAccount": {
          "value": "[parameters('uacAdminApprovalModeForTheBuiltinAdministratorAccount')]"
          },
          "uacBehaviorOfTheElevationPromptForAdministratorsInAdminApprovalMode": {
          "value": "[parameters('uacBehaviorOfTheElevationPromptForAdministratorsInAdminApprovalMode')]"
          },
          "uacDetectApplicationInstallationsAndPromptForElevation": {
          "value": "[parameters('uacDetectApplicationInstallationsAndPromptForElevation')]"
          },
          "uacRunAllAdministratorsInAdminApprovalMode": {
          "value": "[parameters('uacRunAllAdministratorsInAdminApprovalMode')]"
          }
        },
        "groupNames": [
          "hipaa-1277.09c2Organizational.4-09.c"
        ]
      },
      {
        "policyDefinitionReferenceId": "networkSecurityGroupsOnSubnetsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e71308d3-144b-4262-b144-efdc3cc90517",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n"
        ]
      },
      {
        "policyDefinitionReferenceId": "enforceSSLConnectionShouldBeEnabledForMySQLDatabaseServers",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e802a67a-daf5-4436-9ea6-f6d821dd0c5d",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0948.09y2Organizational.3-09.y",
          "hipaa-1418.05i1Organizational.8-05.i"
        ]
      },
      {
        "policyDefinitionReferenceId": "containerBenchmarkMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/e8cbc669-f12d-49eb-93e7-9273119e9933",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0606.10h2System.1-10.h",
          "hipaa-0709.10m1Organizational.1-10.m",
          "hipaa-0715.10m2Organizational.8-10.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "keyVaultShouldUseAVirtualNetworkServiceEndpoint",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ea4d6841-2173-4317-9747-ff522a45120f",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0865.09m2Organizational.13-09.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "identityRemoveDeprecatedAccountWithOwnerPermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ebb62a0c-3560-49e1-89ed-27e074e9f8ad",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1147.01c2System.456-01.c"
        ]
      },
      {
        "policyDefinitionReferenceId": "vulnerabilityAssessmentOnServerMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/ef2a8f2a-b3d9-49cd-a8a8-9a3aaaf647d9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0709.10m1Organizational.1-10.m"
        ]
      },
      {
        "policyDefinitionReferenceId": "theLogAnalyticsAgentShouldBeInstalledOnVirtualMachineScaleSets",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/efbde977-ba53-4479-b8e9-10b957924fbf",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-12101.09ab1Organizational.3-09.ab",
          "hipaa-1216.09ab3System.12-09.ab"
        ]
      },
      {
        "policyDefinitionReferenceId": "webAppRequireLatestTlsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f0e6e85b-9b9f-4a4b-b67b-f730d42f1b0b",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0949.09y2Organizational.5-09.y"
        ]
      },
      {
        "policyDefinitionReferenceId": "networkSecurityGroupsOnVirtualMachinesMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f6de0be7-9a8a-4b8a-b349-43cf02d22f7c",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0894.01m2Organizational.7-01.m",
          "hipaa-0805.01m1Organizational.12-01.m",
          "hipaa-0806.01m2Organizational.12356-01.m",
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n"
        ]
      },
      {
        "policyDefinitionReferenceId": "identityRemoveExternalAccountWithOwnerPermissionsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f8456c1c-aa66-4dfb-861a-25d127b775c9",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-1146.01c2System.23-01.c"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInServiceBusMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f8d36e2f-389b-4ee4-898d-21aeb69a0f45",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "hipaa-1208.09aa3System.1-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "diagnosticsLogsInStreamAnalyticsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f9be5368-9bf5-4b84-9e0a-7850da98bb46",
        "parameters": {
          "requiredRetentionDays": {
          "value": "[parameters('requiredRetentionDays')]"
          }
        },
        "groupNames": [
          "hipaa-1207.09aa2System.4-09.aa"
        ]
      },
      {
        "policyDefinitionReferenceId": "functionAppRequireLatestTlsMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/f9d614c5-c173-4d56-95a7-b4437057d193",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0809.01n2Organizational.1234-01.n",
          "hipaa-0810.01n2Organizational.5-01.n",
          "hipaa-0814.01n1Organizational.12-01.n",
          "hipaa-0812.01n2Organizational.8-01.n",
          "hipaa-0811.01n2Organizational.6-01.n",
          "hipaa-0949.09y2Organizational.5-09.y"
        ]
      },
      {
        "policyDefinitionReferenceId": "sqlDbVulnerabilityAssesmentMonitoring",
        "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/feedbf84-6b99-488c-acc2-71c829aa5ffc",
        "parameters": {
          
        },
        "groupNames": [
          "hipaa-0709.10m1Organizational.1-10.m",
          "hipaa-0716.10m3Organizational.1-10.m"
        ]
      }
    ],
    "policyDefinitionGroups": [
      {
        "name": "hipaa-0101.00a1Organizational.123-00.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0101.00a1Organizational.123-00.a"
      },
      {
        "name": "hipaa-0102.00a2Organizational.123-00.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0102.00a2Organizational.123-00.a"
      },
      {
        "name": "hipaa-0103.00a3Organizational.1234567-00.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0103.00a3Organizational.1234567-00.a"
      },
      {
        "name": "hipaa-0104.02a1Organizational.12-02.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0104.02a1Organizational.12-02.a"
      },
      {
        "name": "hipaa-0105.02a2Organizational.1-02.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0105.02a2Organizational.1-02.a"
      },
      {
        "name": "hipaa-0106.02a2Organizational.23-02.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0106.02a2Organizational.23-02.a"
      },
      {
        "name": "hipaa-0107.02d1Organizational.1-02.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0107.02d1Organizational.1-02.d"
      },
      {
        "name": "hipaa-0108.02d1Organizational.23-02.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0108.02d1Organizational.23-02.d"
      },
      {
        "name": "hipaa-0109.02d1Organizational.4-02.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0109.02d1Organizational.4-02.d"
      },
      {
        "name": "hipaa-0110.02d2Organizational.1-02.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0110.02d2Organizational.1-02.d"
      },
      {
        "name": "hipaa-0111.02d2Organizational.2-02.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0111.02d2Organizational.2-02.d"
      },
      {
        "name": "hipaa-01110.05a1Organizational.5-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-01110.05a1Organizational.5-05.a"
      },
      {
        "name": "hipaa-01111.05a2Organizational.5-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-01111.05a2Organizational.5-05.a"
      },
      {
        "name": "hipaa-0112.02d2Organizational.3-02.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0112.02d2Organizational.3-02.d"
      },
      {
        "name": "hipaa-0113.04a1Organizational.123-04.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0113.04a1Organizational.123-04.a"
      },
      {
        "name": "hipaa-0114.04b1Organizational.1-04.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0114.04b1Organizational.1-04.b"
      },
      {
        "name": "hipaa-0115.04b2Organizational.123-04.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0115.04b2Organizational.123-04.b"
      },
      {
        "name": "hipaa-0116.04b3Organizational.1-04.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0116.04b3Organizational.1-04.b"
      },
      {
        "name": "hipaa-0117.05a1Organizational.1-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0117.05a1Organizational.1-05.a"
      },
      {
        "name": "hipaa-0118.05a1Organizational.2-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0118.05a1Organizational.2-05.a"
      },
      {
        "name": "hipaa-0119.05a1Organizational.3-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0119.05a1Organizational.3-05.a"
      },
      {
        "name": "hipaa-0120.05a1Organizational.4-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0120.05a1Organizational.4-05.a"
      },
      {
        "name": "hipaa-0121.05a2Organizational.12-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0121.05a2Organizational.12-05.a"
      },
      {
        "name": "hipaa-0122.05a2Organizational.3-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0122.05a2Organizational.3-05.a"
      },
      {
        "name": "hipaa-0123.05a2Organizational.4-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0123.05a2Organizational.4-05.a"
      },
      {
        "name": "hipaa-0124.05a3Organizational.1-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0124.05a3Organizational.1-05.a"
      },
      {
        "name": "hipaa-0125.05a3Organizational.2-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0125.05a3Organizational.2-05.a"
      },
      {
        "name": "hipaa-0135.02f1Organizational.56-02.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0135.02f1Organizational.56-02.f"
      },
      {
        "name": "hipaa-0137.02a1Organizational.3-02.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0137.02a1Organizational.3-02.a"
      },
      {
        "name": "hipaa-0162.04b1Organizational.2-04.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0162.04b1Organizational.2-04.b"
      },
      {
        "name": "hipaa-0165.05a3Organizational.3-05.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0165.05a3Organizational.3-05.a"
      },
      {
        "name": "hipaa-0177.05h1Organizational.12-05.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0177.05h1Organizational.12-05.h"
      },
      {
        "name": "hipaa-0178.05h1Organizational.3-05.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0178.05h1Organizational.3-05.h"
      },
      {
        "name": "hipaa-0179.05h1Organizational.4-05.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0179.05h1Organizational.4-05.h"
      },
      {
        "name": "hipaa-0180.05h2Organizational.1-05.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0180.05h2Organizational.1-05.h"
      },
      {
        "name": "hipaa-0197.02d2Organizational.4-02.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0197.02d2Organizational.4-02.d"
      },
      {
        "name": "hipaa-0201.09j1Organizational.124-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0201.09j1Organizational.124-09.j"
      },
      {
        "name": "hipaa-0202.09j1Organizational.3-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0202.09j1Organizational.3-09.j"
      },
      {
        "name": "hipaa-0204.09j2Organizational.1-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0204.09j2Organizational.1-09.j"
      },
      {
        "name": "hipaa-0205.09j2Organizational.2-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0205.09j2Organizational.2-09.j"
      },
      {
        "name": "hipaa-0206.09j2Organizational.34-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0206.09j2Organizational.34-09.j"
      },
      {
        "name": "hipaa-0207.09j2Organizational.56-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0207.09j2Organizational.56-09.j"
      },
      {
        "name": "hipaa-0208.09j2Organizational.7-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0208.09j2Organizational.7-09.j"
      },
      {
        "name": "hipaa-0209.09m3Organizational.7-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0209.09m3Organizational.7-09.m"
      },
      {
        "name": "hipaa-0214.09j1Organizational.6-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0214.09j1Organizational.6-09.j"
      },
      {
        "name": "hipaa-0215.09j2Organizational.8-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0215.09j2Organizational.8-09.j"
      },
      {
        "name": "hipaa-0216.09j2Organizational.9-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0216.09j2Organizational.9-09.j"
      },
      {
        "name": "hipaa-0217.09j2Organizational.10-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0217.09j2Organizational.10-09.j"
      },
      {
        "name": "hipaa-0219.09j2Organizational.12-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0219.09j2Organizational.12-09.j"
      },
      {
        "name": "hipaa-0225.09k1Organizational.1-09.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0225.09k1Organizational.1-09.k"
      },
      {
        "name": "hipaa-0226.09k1Organizational.2-09.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0226.09k1Organizational.2-09.k"
      },
      {
        "name": "hipaa-0227.09k2Organizational.12-09.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0227.09k2Organizational.12-09.k"
      },
      {
        "name": "hipaa-0228.09k2Organizational.3-09.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0228.09k2Organizational.3-09.k"
      },
      {
        "name": "hipaa-0301.09o1Organizational.123-09.o",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0301.09o1Organizational.123-09.o"
      },
      {
        "name": "hipaa-0302.09o2Organizational.1-09.o",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0302.09o2Organizational.1-09.o"
      },
      {
        "name": "hipaa-0303.09o2Organizational.2-09.o",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0303.09o2Organizational.2-09.o"
      },
      {
        "name": "hipaa-0304.09o3Organizational.1-09.o",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0304.09o3Organizational.1-09.o"
      },
      {
        "name": "hipaa-0305.09q1Organizational.12-09.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0305.09q1Organizational.12-09.q"
      },
      {
        "name": "hipaa-0306.09q1Organizational.3-09.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0306.09q1Organizational.3-09.q"
      },
      {
        "name": "hipaa-0307.09q2Organizational.12-09.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0307.09q2Organizational.12-09.q"
      },
      {
        "name": "hipaa-0308.09q3Organizational.1-09.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0308.09q3Organizational.1-09.q"
      },
      {
        "name": "hipaa-0314.09q3Organizational.2-09.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0314.09q3Organizational.2-09.q"
      },
      {
        "name": "hipaa-0401.01x1System.124579-01.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0401.01x1System.124579-01.x"
      },
      {
        "name": "hipaa-0403.01x1System.8-01.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0403.01x1System.8-01.x"
      },
      {
        "name": "hipaa-0404.01x1System.1011-01.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0404.01x1System.1011-01.x"
      },
      {
        "name": "hipaa-0405.01y1Organizational.12345678-01.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0405.01y1Organizational.12345678-01.y"
      },
      {
        "name": "hipaa-0407.01y2Organizational.1-01.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0407.01y2Organizational.1-01.y"
      },
      {
        "name": "hipaa-0408.01y3Organizational.12-01.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0408.01y3Organizational.12-01.y"
      },
      {
        "name": "hipaa-0409.01y3Organizational.3-01.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0409.01y3Organizational.3-01.y"
      },
      {
        "name": "hipaa-0410.01x1System.12-01.xMobileComputingandCommunications",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0410.01x1System.12-01.xMobileComputingandCommunications"
      },
      {
        "name": "hipaa-0415.01y1Organizational.10-01.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0415.01y1Organizational.10-01.y"
      },
      {
        "name": "hipaa-0416.01y3Organizational.4-01.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0416.01y3Organizational.4-01.y"
      },
      {
        "name": "hipaa-0417.01y3Organizational.5-01.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0417.01y3Organizational.5-01.y"
      },
      {
        "name": "hipaa-0425.01x1System.13-01.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0425.01x1System.13-01.x"
      },
      {
        "name": "hipaa-0426.01x2System.1-01.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0426.01x2System.1-01.x"
      },
      {
        "name": "hipaa-0427.01x2System.2-01.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0427.01x2System.2-01.x"
      },
      {
        "name": "hipaa-0428.01x2System.3-01.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0428.01x2System.3-01.x"
      },
      {
        "name": "hipaa-0429.01x1System.14-01.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0429.01x1System.14-01.x"
      },
      {
        "name": "hipaa-0501.09m1Organizational.1-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0501.09m1Organizational.1-09.m"
      },
      {
        "name": "hipaa-0502.09m1Organizational.5-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0502.09m1Organizational.5-09.m"
      },
      {
        "name": "hipaa-0503.09m1Organizational.6-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0503.09m1Organizational.6-09.m"
      },
      {
        "name": "hipaa-0504.09m2Organizational.5-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0504.09m2Organizational.5-09.m"
      },
      {
        "name": "hipaa-0505.09m2Organizational.3-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0505.09m2Organizational.3-09.m"
      },
      {
        "name": "hipaa-0601.06g1Organizational.124-06.g",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0601.06g1Organizational.124-06.g"
      },
      {
        "name": "hipaa-0602.06g1Organizational.3-06.g",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0602.06g1Organizational.3-06.g"
      },
      {
        "name": "hipaa-0603.06g2Organizational.1-06.g",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0603.06g2Organizational.1-06.g"
      },
      {
        "name": "hipaa-0604.06g2Organizational.2-06.g",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0604.06g2Organizational.2-06.g"
      },
      {
        "name": "hipaa-0605.10h1System.12-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0605.10h1System.12-10.h"
      },
      {
        "name": "hipaa-0606.10h2System.1-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0606.10h2System.1-10.h"
      },
      {
        "name": "hipaa-0607.10h2System.23-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0607.10h2System.23-10.h"
      },
      {
        "name": "hipaa-0613.06h1Organizational.12-06.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0613.06h1Organizational.12-06.h"
      },
      {
        "name": "hipaa-0614.06h2Organizational.12-06.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0614.06h2Organizational.12-06.h"
      },
      {
        "name": "hipaa-0615.06h2Organizational.3-06.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0615.06h2Organizational.3-06.h"
      },
      {
        "name": "hipaa-0618.09b1System.1-09.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0618.09b1System.1-09.b"
      },
      {
        "name": "hipaa-0619.09b2System.12-09.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0619.09b2System.12-09.b"
      },
      {
        "name": "hipaa-0620.09b2System.3-09.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0620.09b2System.3-09.b"
      },
      {
        "name": "hipaa-0626.10h1System.3-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0626.10h1System.3-10.h"
      },
      {
        "name": "hipaa-0627.10h1System.45-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0627.10h1System.45-10.h"
      },
      {
        "name": "hipaa-0628.10h1System.6-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0628.10h1System.6-10.h"
      },
      {
        "name": "hipaa-0629.10h2System.45-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0629.10h2System.45-10.h"
      },
      {
        "name": "hipaa-0630.10h2System.6-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0630.10h2System.6-10.h"
      },
      {
        "name": "hipaa-0635.10k1Organizational.12-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0635.10k1Organizational.12-10.k"
      },
      {
        "name": "hipaa-0636.10k2Organizational.1-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0636.10k2Organizational.1-10.k"
      },
      {
        "name": "hipaa-0637.10k2Organizational.2-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0637.10k2Organizational.2-10.k"
      },
      {
        "name": "hipaa-0638.10k2Organizational.34569-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0638.10k2Organizational.34569-10.k"
      },
      {
        "name": "hipaa-0639.10k2Organizational.78-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0639.10k2Organizational.78-10.k"
      },
      {
        "name": "hipaa-0640.10k2Organizational.1012-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0640.10k2Organizational.1012-10.k"
      },
      {
        "name": "hipaa-0641.10k2Organizational.11-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0641.10k2Organizational.11-10.k"
      },
      {
        "name": "hipaa-0642.10k3Organizational.12-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0642.10k3Organizational.12-10.k"
      },
      {
        "name": "hipaa-0643.10k3Organizational.3-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0643.10k3Organizational.3-10.k"
      },
      {
        "name": "hipaa-0644.10k3Organizational.4-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0644.10k3Organizational.4-10.k"
      },
      {
        "name": "hipaa-0662.09sCSPOrganizational.2-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0662.09sCSPOrganizational.2-09.s"
      },
      {
        "name": "hipaa-0663.10h1System.7-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0663.10h1System.7-10.h"
      },
      {
        "name": "hipaa-0663.10h2Organizational.9-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0663.10h2Organizational.9-10.h"
      },
      {
        "name": "hipaa-0664.10h2Organizational.10-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0664.10h2Organizational.10-10.h"
      },
      {
        "name": "hipaa-0669.10hCSPSystem.1-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0669.10hCSPSystem.1-10.h"
      },
      {
        "name": "hipaa-0670.10hCSPSystem.2-10.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0670.10hCSPSystem.2-10.h"
      },
      {
        "name": "hipaa-0671.10k1System.1-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0671.10k1System.1-10.k"
      },
      {
        "name": "hipaa-0672.10k3System.5-10.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0672.10k3System.5-10.k"
      },
      {
        "name": "hipaa-068.06g2Organizational.34-06.g",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-068.06g2Organizational.34-06.g"
      },
      {
        "name": "hipaa-069.06g2Organizational.56-06.g",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-069.06g2Organizational.56-06.g"
      },
      {
        "name": "hipaa-0701.07a1Organizational.12-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0701.07a1Organizational.12-07.a"
      },
      {
        "name": "hipaa-0702.07a1Organizational.3-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0702.07a1Organizational.3-07.a"
      },
      {
        "name": "hipaa-0703.07a2Organizational.1-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0703.07a2Organizational.1-07.a"
      },
      {
        "name": "hipaa-0704.07a3Organizational.12-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0704.07a3Organizational.12-07.a"
      },
      {
        "name": "hipaa-0705.07a3Organizational.3-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0705.07a3Organizational.3-07.a"
      },
      {
        "name": "hipaa-0706.10b1System.12-10.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0706.10b1System.12-10.b"
      },
      {
        "name": "hipaa-0707.10b2System.1-10.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0707.10b2System.1-10.b"
      },
      {
        "name": "hipaa-0708.10b2System.2-10.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0708.10b2System.2-10.b"
      },
      {
        "name": "hipaa-0709.10m1Organizational.1-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0709.10m1Organizational.1-10.m"
      },
      {
        "name": "hipaa-0710.10m2Organizational.1-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0710.10m2Organizational.1-10.m"
      },
      {
        "name": "hipaa-0711.10m2Organizational.23-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0711.10m2Organizational.23-10.m"
      },
      {
        "name": "hipaa-0712.10m2Organizational.4-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0712.10m2Organizational.4-10.m"
      },
      {
        "name": "hipaa-0713.10m2Organizational.5-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0713.10m2Organizational.5-10.m"
      },
      {
        "name": "hipaa-0714.10m2Organizational.7-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0714.10m2Organizational.7-10.m"
      },
      {
        "name": "hipaa-0715.10m2Organizational.8-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0715.10m2Organizational.8-10.m"
      },
      {
        "name": "hipaa-0716.10m3Organizational.1-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0716.10m3Organizational.1-10.m"
      },
      {
        "name": "hipaa-0717.10m3Organizational.2-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0717.10m3Organizational.2-10.m"
      },
      {
        "name": "hipaa-0718.10m3Organizational.34-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0718.10m3Organizational.34-10.m"
      },
      {
        "name": "hipaa-0719.10m3Organizational.5-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0719.10m3Organizational.5-10.m"
      },
      {
        "name": "hipaa-0720.07a1Organizational.4-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0720.07a1Organizational.4-07.a"
      },
      {
        "name": "hipaa-0721.07a1Organizational.5-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0721.07a1Organizational.5-07.a"
      },
      {
        "name": "hipaa-0722.07a1Organizational.67-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0722.07a1Organizational.67-07.a"
      },
      {
        "name": "hipaa-0723.07a1Organizational.8-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0723.07a1Organizational.8-07.a"
      },
      {
        "name": "hipaa-0724.07a3Organizational.4-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0724.07a3Organizational.4-07.a"
      },
      {
        "name": "hipaa-0725.07a3Organizational.5-07.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0725.07a3Organizational.5-07.a"
      },
      {
        "name": "hipaa-0733.10b2System.4-10.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0733.10b2System.4-10.b"
      },
      {
        "name": "hipaa-0786.10m2Organizational.13-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0786.10m2Organizational.13-10.m"
      },
      {
        "name": "hipaa-0787.10m2Organizational.14-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0787.10m2Organizational.14-10.m"
      },
      {
        "name": "hipaa-0788.10m3Organizational.20-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0788.10m3Organizational.20-10.m"
      },
      {
        "name": "hipaa-0789.10m3Organizational.21-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0789.10m3Organizational.21-10.m"
      },
      {
        "name": "hipaa-0790.10m3Organizational.22-10.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0790.10m3Organizational.22-10.m"
      },
      {
        "name": "hipaa-0791.10b2Organizational.4-10.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0791.10b2Organizational.4-10.b"
      },
      {
        "name": "hipaa-0805.01m1Organizational.12-01.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0805.01m1Organizational.12-01.m"
      },
      {
        "name": "hipaa-0806.01m2Organizational.12356-01.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0806.01m2Organizational.12356-01.m"
      },
      {
        "name": "hipaa-0808.10b2System.3-10.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0808.10b2System.3-10.b"
      },
      {
        "name": "hipaa-0809.01n2Organizational.1234-01.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0809.01n2Organizational.1234-01.n"
      },
      {
        "name": "hipaa-0810.01n2Organizational.5-01.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0810.01n2Organizational.5-01.n"
      },
      {
        "name": "hipaa-08101.09m2Organizational.14-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-08101.09m2Organizational.14-09.m"
      },
      {
        "name": "hipaa-08102.09nCSPOrganizational.1-09.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-08102.09nCSPOrganizational.1-09.n"
      },
      {
        "name": "hipaa-0811.01n2Organizational.6-01.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0811.01n2Organizational.6-01.n"
      },
      {
        "name": "hipaa-0812.01n2Organizational.8-01.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0812.01n2Organizational.8-01.n"
      },
      {
        "name": "hipaa-0814.01n1Organizational.12-01.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0814.01n1Organizational.12-01.n"
      },
      {
        "name": "hipaa-0815.01o2Organizational.123-01.o",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0815.01o2Organizational.123-01.o"
      },
      {
        "name": "hipaa-0816.01w1System.1-01.w",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0816.01w1System.1-01.w"
      },
      {
        "name": "hipaa-0817.01w2System.123-01.w",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0817.01w2System.123-01.w"
      },
      {
        "name": "hipaa-0818.01w3System.12-01.w",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0818.01w3System.12-01.w"
      },
      {
        "name": "hipaa-0819.09m1Organizational.23-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0819.09m1Organizational.23-09.m"
      },
      {
        "name": "hipaa-0820.09m2Organizational.1-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0820.09m2Organizational.1-09.m"
      },
      {
        "name": "hipaa-0821.09m2Organizational.2-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0821.09m2Organizational.2-09.m"
      },
      {
        "name": "hipaa-0822.09m2Organizational.4-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0822.09m2Organizational.4-09.m"
      },
      {
        "name": "hipaa-0824.09m3Organizational.1-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0824.09m3Organizational.1-09.m"
      },
      {
        "name": "hipaa-0825.09m3Organizational.23-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0825.09m3Organizational.23-09.m"
      },
      {
        "name": "hipaa-0826.09m3Organizational.45-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0826.09m3Organizational.45-09.m"
      },
      {
        "name": "hipaa-0827.09m3Organizational.6-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0827.09m3Organizational.6-09.m"
      },
      {
        "name": "hipaa-0828.09m3Organizational.8-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0828.09m3Organizational.8-09.m"
      },
      {
        "name": "hipaa-0829.09m3Organizational.911-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0829.09m3Organizational.911-09.m"
      },
      {
        "name": "hipaa-0830.09m3Organizational.1012-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0830.09m3Organizational.1012-09.m"
      },
      {
        "name": "hipaa-0832.09m3Organizational.14-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0832.09m3Organizational.14-09.m"
      },
      {
        "name": "hipaa-0835.09n1Organizational.1-09.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0835.09n1Organizational.1-09.n"
      },
      {
        "name": "hipaa-0836.09.n2Organizational.1-09.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0836.09.n2Organizational.1-09.n"
      },
      {
        "name": "hipaa-0837.09.n2Organizational.2-09.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0837.09.n2Organizational.2-09.n"
      },
      {
        "name": "hipaa-0850.01o1Organizational.12-01.o",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0850.01o1Organizational.12-01.o"
      },
      {
        "name": "hipaa-0858.09m1Organizational.4-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0858.09m1Organizational.4-09.m"
      },
      {
        "name": "hipaa-0859.09m1Organizational.78-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0859.09m1Organizational.78-09.m"
      },
      {
        "name": "hipaa-0860.09m1Organizational.9-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0860.09m1Organizational.9-09.m"
      },
      {
        "name": "hipaa-0861.09m2Organizational.67-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0861.09m2Organizational.67-09.m"
      },
      {
        "name": "hipaa-0862.09m2Organizational.8-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0862.09m2Organizational.8-09.m"
      },
      {
        "name": "hipaa-0863.09m2Organizational.910-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0863.09m2Organizational.910-09.m"
      },
      {
        "name": "hipaa-0864.09m2Organizational.12-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0864.09m2Organizational.12-09.m"
      },
      {
        "name": "hipaa-0865.09m2Organizational.13-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0865.09m2Organizational.13-09.m"
      },
      {
        "name": "hipaa-0866.09m3Organizational.1516-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0866.09m3Organizational.1516-09.m"
      },
      {
        "name": "hipaa-0867.09m3Organizational.17-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0867.09m3Organizational.17-09.m"
      },
      {
        "name": "hipaa-0868.09m3Organizational.18-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0868.09m3Organizational.18-09.m"
      },
      {
        "name": "hipaa-0869.09m3Organizational.19-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0869.09m3Organizational.19-09.m"
      },
      {
        "name": "hipaa-0870.09m3Organizational.20-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0870.09m3Organizational.20-09.m"
      },
      {
        "name": "hipaa-0871.09m3Organizational.22-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0871.09m3Organizational.22-09.m"
      },
      {
        "name": "hipaa-0885.09n2Organizational.3-09.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0885.09n2Organizational.3-09.n"
      },
      {
        "name": "hipaa-0886.09n2Organizational.4-09.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0886.09n2Organizational.4-09.n"
      },
      {
        "name": "hipaa-0887.09n2Organizational.5-09.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0887.09n2Organizational.5-09.n"
      },
      {
        "name": "hipaa-0888.09n2Organizational.6-09.n",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0888.09n2Organizational.6-09.n"
      },
      {
        "name": "hipaa-0894.01m2Organizational.7-01.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0894.01m2Organizational.7-01.m"
      },
      {
        "name": "hipaa-0901.09s1Organizational.1-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0901.09s1Organizational.1-09.s"
      },
      {
        "name": "hipaa-0902.09s2Organizational.13-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0902.09s2Organizational.13-09.s"
      },
      {
        "name": "hipaa-0903.10f1Organizational.1-10.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0903.10f1Organizational.1-10.f"
      },
      {
        "name": "hipaa-0904.10f2Organizational.1-10.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0904.10f2Organizational.1-10.f"
      },
      {
        "name": "hipaa-0911.09s1Organizational.2-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0911.09s1Organizational.2-09.s"
      },
      {
        "name": "hipaa-0912.09s1Organizational.4-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0912.09s1Organizational.4-09.s"
      },
      {
        "name": "hipaa-0913.09s1Organizational.5-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0913.09s1Organizational.5-09.s"
      },
      {
        "name": "hipaa-0914.09s1Organizational.6-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0914.09s1Organizational.6-09.s"
      },
      {
        "name": "hipaa-0915.09s2Organizational.2-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0915.09s2Organizational.2-09.s"
      },
      {
        "name": "hipaa-0916.09s2Organizational.4-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0916.09s2Organizational.4-09.s"
      },
      {
        "name": "hipaa-0925.09v1Organizational.1-09.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0925.09v1Organizational.1-09.v"
      },
      {
        "name": "hipaa-0926.09v1Organizational.2-09.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0926.09v1Organizational.2-09.v"
      },
      {
        "name": "hipaa-0927.09v1Organizational.3-09.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0927.09v1Organizational.3-09.v"
      },
      {
        "name": "hipaa-0928.09v1Organizational.45-09.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0928.09v1Organizational.45-09.v"
      },
      {
        "name": "hipaa-0929.09v1Organizational.6-09.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0929.09v1Organizational.6-09.v"
      },
      {
        "name": "hipaa-0938.09x1Organizational.1-09.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0938.09x1Organizational.1-09.x"
      },
      {
        "name": "hipaa-0939.09x2Organizational.12-09.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0939.09x2Organizational.12-09.x"
      },
      {
        "name": "hipaa-0940.09x2Organizational.3-09.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0940.09x2Organizational.3-09.x"
      },
      {
        "name": "hipaa-0941.09x2Organizational.4-09.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0941.09x2Organizational.4-09.x"
      },
      {
        "name": "hipaa-0942.09x2Organizational.5-09.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0942.09x2Organizational.5-09.x"
      },
      {
        "name": "hipaa-0943.09y1Organizational.1-09.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0943.09y1Organizational.1-09.y"
      },
      {
        "name": "hipaa-0944.09y1Organizational.2-09.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0944.09y1Organizational.2-09.y"
      },
      {
        "name": "hipaa-0945.09y1Organizational.3-09.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0945.09y1Organizational.3-09.y"
      },
      {
        "name": "hipaa-0946.09y2Organizational.14-09.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0946.09y2Organizational.14-09.y"
      },
      {
        "name": "hipaa-0947.09y2Organizational.2-09.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0947.09y2Organizational.2-09.y"
      },
      {
        "name": "hipaa-0948.09y2Organizational.3-09.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0948.09y2Organizational.3-09.y"
      },
      {
        "name": "hipaa-0949.09y2Organizational.5-09.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0949.09y2Organizational.5-09.y"
      },
      {
        "name": "hipaa-0960.09sCSPOrganizational.1-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0960.09sCSPOrganizational.1-09.s"
      },
      {
        "name": "hipaa-0961.09v1Organizational.7-09.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-0961.09v1Organizational.7-09.v"
      },
      {
        "name": "hipaa-099.09m2Organizational.11-09.m",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-099.09m2Organizational.11-09.m"
      },
      {
        "name": "hipaa-1002.01d1System.1-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1002.01d1System.1-01.d"
      },
      {
        "name": "hipaa-1003.01d1System.3-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1003.01d1System.3-01.d"
      },
      {
        "name": "hipaa-1004.01d1System.8913-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1004.01d1System.8913-01.d"
      },
      {
        "name": "hipaa-1005.01d1System.1011-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1005.01d1System.1011-01.d"
      },
      {
        "name": "hipaa-1006.01d2System.1-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1006.01d2System.1-01.d"
      },
      {
        "name": "hipaa-1007.01d2System.2-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1007.01d2System.2-01.d"
      },
      {
        "name": "hipaa-1008.01d2System.3-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1008.01d2System.3-01.d"
      },
      {
        "name": "hipaa-1009.01d2System.4-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1009.01d2System.4-01.d"
      },
      {
        "name": "hipaa-1010.01d2System.5-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1010.01d2System.5-01.d"
      },
      {
        "name": "hipaa-1014.01d1System.12-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1014.01d1System.12-01.d"
      },
      {
        "name": "hipaa-1015.01d1System.14-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1015.01d1System.14-01.d"
      },
      {
        "name": "hipaa-1022.01d1System.15-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1022.01d1System.15-01.d"
      },
      {
        "name": "hipaa-1027.01d2System.6-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1027.01d2System.6-01.d"
      },
      {
        "name": "hipaa-1031.01d1System.34510-01.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1031.01d1System.34510-01.d"
      },
      {
        "name": "hipaa-1106.01b1System.1-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1106.01b1System.1-01.b"
      },
      {
        "name": "hipaa-1107.01b1System.2-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1107.01b1System.2-01.b"
      },
      {
        "name": "hipaa-1108.01b1System.3-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1108.01b1System.3-01.b"
      },
      {
        "name": "hipaa-1109.01b1System.479-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1109.01b1System.479-01.b"
      },
      {
        "name": "hipaa-1110.01b1System.5-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1110.01b1System.5-01.b"
      },
      {
        "name": "hipaa-11109.01q1Organizational.57-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11109.01q1Organizational.57-01.q"
      },
      {
        "name": "hipaa-1111.01b2System.1-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1111.01b2System.1-01.b"
      },
      {
        "name": "hipaa-11110.01q1Organizational.6-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11110.01q1Organizational.6-01.q"
      },
      {
        "name": "hipaa-11111.01q2System.4-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11111.01q2System.4-01.q"
      },
      {
        "name": "hipaa-11112.01q2Organizational.67-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11112.01q2Organizational.67-01.q"
      },
      {
        "name": "hipaa-1112.01b2System.2-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1112.01b2System.2-01.b"
      },
      {
        "name": "hipaa-11126.01t1Organizational.12-01.t",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11126.01t1Organizational.12-01.t"
      },
      {
        "name": "hipaa-1114.01h1Organizational.123-01.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1114.01h1Organizational.123-01.h"
      },
      {
        "name": "hipaa-1115.01h1Organizational.45-01.h",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1115.01h1Organizational.45-01.h"
      },
      {
        "name": "hipaa-11154.02i1Organizational.5-02.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11154.02i1Organizational.5-02.i"
      },
      {
        "name": "hipaa-11155.02i2Organizational.2-02.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11155.02i2Organizational.2-02.i"
      },
      {
        "name": "hipaa-1116.01j1Organizational.145-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1116.01j1Organizational.145-01.j"
      },
      {
        "name": "hipaa-1117.01j1Organizational.23-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1117.01j1Organizational.23-01.j"
      },
      {
        "name": "hipaa-1118.01j2Organizational.124-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1118.01j2Organizational.124-01.j"
      },
      {
        "name": "hipaa-11180.01c3System.6-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11180.01c3System.6-01.c"
      },
      {
        "name": "hipaa-1119.01j2Organizational.3-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1119.01j2Organizational.3-01.j"
      },
      {
        "name": "hipaa-11190.01t1Organizational.3-01.t",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11190.01t1Organizational.3-01.t"
      },
      {
        "name": "hipaa-1120.09ab3System.9-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1120.09ab3System.9-09.ab"
      },
      {
        "name": "hipaa-11200.01b2Organizational.3-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11200.01b2Organizational.3-01.b"
      },
      {
        "name": "hipaa-11208.01q1Organizational.8-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11208.01q1Organizational.8-01.q"
      },
      {
        "name": "hipaa-11209.01q2Organizational.9-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11209.01q2Organizational.9-01.q"
      },
      {
        "name": "hipaa-1121.01j3Organizational.2-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1121.01j3Organizational.2-01.j"
      },
      {
        "name": "hipaa-11210.01q2Organizational.10-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11210.01q2Organizational.10-01.q"
      },
      {
        "name": "hipaa-11211.01q2Organizational.11-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11211.01q2Organizational.11-01.q"
      },
      {
        "name": "hipaa-11219.01b1Organizational.10-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11219.01b1Organizational.10-01.b"
      },
      {
        "name": "hipaa-1122.01q1System.1-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1122.01q1System.1-01.q"
      },
      {
        "name": "hipaa-11220.01b1System.10-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-11220.01b1System.10-01.b"
      },
      {
        "name": "hipaa-1123.01q1System.2-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1123.01q1System.2-01.q"
      },
      {
        "name": "hipaa-1124.01q1System.34-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1124.01q1System.34-01.q"
      },
      {
        "name": "hipaa-1125.01q2System.1-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1125.01q2System.1-01.q"
      },
      {
        "name": "hipaa-1127.01q2System.3-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1127.01q2System.3-01.q"
      },
      {
        "name": "hipaa-1128.01q2System.5-01.q",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1128.01q2System.5-01.q"
      },
      {
        "name": "hipaa-1129.01v1System.12-01.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1129.01v1System.12-01.v"
      },
      {
        "name": "hipaa-1130.01v2System.1-01.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1130.01v2System.1-01.v"
      },
      {
        "name": "hipaa-1131.01v2System.2-01.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1131.01v2System.2-01.v"
      },
      {
        "name": "hipaa-1132.01v2System.3-01.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1132.01v2System.3-01.v"
      },
      {
        "name": "hipaa-1133.01v2System.4-01.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1133.01v2System.4-01.v"
      },
      {
        "name": "hipaa-1134.01v3System.1-01.v",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1134.01v3System.1-01.v"
      },
      {
        "name": "hipaa-1135.02i1Organizational.1234-02.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1135.02i1Organizational.1234-02.i"
      },
      {
        "name": "hipaa-1136.02i2Organizational.1-02.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1136.02i2Organizational.1-02.i"
      },
      {
        "name": "hipaa-1137.06e1Organizational.1-06.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1137.06e1Organizational.1-06.e"
      },
      {
        "name": "hipaa-1138.06e2Organizational.12-06.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1138.06e2Organizational.12-06.e"
      },
      {
        "name": "hipaa-1139.01b1System.68-01.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1139.01b1System.68-01.b"
      },
      {
        "name": "hipaa-1143.01c1System.123-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1143.01c1System.123-01.c"
      },
      {
        "name": "hipaa-1144.01c1System.4-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1144.01c1System.4-01.c"
      },
      {
        "name": "hipaa-1145.01c2System.1-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1145.01c2System.1-01.c"
      },
      {
        "name": "hipaa-1146.01c2System.23-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1146.01c2System.23-01.c"
      },
      {
        "name": "hipaa-1147.01c2System.456-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1147.01c2System.456-01.c"
      },
      {
        "name": "hipaa-1148.01c2System.78-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1148.01c2System.78-01.c"
      },
      {
        "name": "hipaa-1149.01c2System.9-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1149.01c2System.9-01.c"
      },
      {
        "name": "hipaa-1150.01c2System.10-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1150.01c2System.10-01.c"
      },
      {
        "name": "hipaa-1151.01c3System.1-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1151.01c3System.1-01.c"
      },
      {
        "name": "hipaa-1152.01c3System.2-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1152.01c3System.2-01.c"
      },
      {
        "name": "hipaa-1153.01c3System.35-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1153.01c3System.35-01.c"
      },
      {
        "name": "hipaa-1154.01c3System.4-01.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1154.01c3System.4-01.c"
      },
      {
        "name": "hipaa-1166.01e1System.12-01.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1166.01e1System.12-01.e"
      },
      {
        "name": "hipaa-1167.01e2System.1-01.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1167.01e2System.1-01.e"
      },
      {
        "name": "hipaa-1168.01e2System.2-01.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1168.01e2System.2-01.e"
      },
      {
        "name": "hipaa-1173.01j1Organizational.6-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1173.01j1Organizational.6-01.j"
      },
      {
        "name": "hipaa-1174.01j1Organizational.7-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1174.01j1Organizational.7-01.j"
      },
      {
        "name": "hipaa-1175.01j1Organizational.8-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1175.01j1Organizational.8-01.j"
      },
      {
        "name": "hipaa-1176.01j2Organizational.5-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1176.01j2Organizational.5-01.j"
      },
      {
        "name": "hipaa-1177.01j2Organizational.6-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1177.01j2Organizational.6-01.j"
      },
      {
        "name": "hipaa-1178.01j2Organizational.7-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1178.01j2Organizational.7-01.j"
      },
      {
        "name": "hipaa-1179.01j3Organizational.1-01.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1179.01j3Organizational.1-01.j"
      },
      {
        "name": "hipaa-1192.01l1Organizational.1-01.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1192.01l1Organizational.1-01.l"
      },
      {
        "name": "hipaa-1193.01l2Organizational.13-01.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1193.01l2Organizational.13-01.l"
      },
      {
        "name": "hipaa-1194.01l2Organizational.2-01.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1194.01l2Organizational.2-01.l"
      },
      {
        "name": "hipaa-1195.01l3Organizational.1-01.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1195.01l3Organizational.1-01.l"
      },
      {
        "name": "hipaa-1196.01l3Organizational.24-01.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1196.01l3Organizational.24-01.l"
      },
      {
        "name": "hipaa-1197.01l3Organizational.3-01.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1197.01l3Organizational.3-01.l"
      },
      {
        "name": "hipaa-1201.06e1Organizational.2-06.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1201.06e1Organizational.2-06.e"
      },
      {
        "name": "hipaa-1202.09aa1System.1-09.aa",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1202.09aa1System.1-09.aa"
      },
      {
        "name": "hipaa-1203.09aa1System.2-09.aa",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1203.09aa1System.2-09.aa"
      },
      {
        "name": "hipaa-1204.09aa1System.3-09.aa",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1204.09aa1System.3-09.aa"
      },
      {
        "name": "hipaa-1205.09aa2System.1-09.aa",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1205.09aa2System.1-09.aa"
      },
      {
        "name": "hipaa-1206.09aa2System.23-09.aa",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1206.09aa2System.23-09.aa"
      },
      {
        "name": "hipaa-1207.09aa2System.4-09.aa",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1207.09aa2System.4-09.aa"
      },
      {
        "name": "hipaa-1208.09aa3System.1-09.aa",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1208.09aa3System.1-09.aa"
      },
      {
        "name": "hipaa-1209.09aa3System.2-09.aa",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1209.09aa3System.2-09.aa"
      },
      {
        "name": "hipaa-1210.09aa3System.3-09.aa",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1210.09aa3System.3-09.aa"
      },
      {
        "name": "hipaa-12100.09ab2System.15-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-12100.09ab2System.15-09.ab"
      },
      {
        "name": "hipaa-12101.09ab1Organizational.3-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-12101.09ab1Organizational.3-09.ab"
      },
      {
        "name": "hipaa-12102.09ab1Organizational.4-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-12102.09ab1Organizational.4-09.ab"
      },
      {
        "name": "hipaa-12103.09ab1Organizational.5-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-12103.09ab1Organizational.5-09.ab"
      },
      {
        "name": "hipaa-1211.09aa3System.4-09.aa",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1211.09aa3System.4-09.aa"
      },
      {
        "name": "hipaa-1212.09ab1System.1-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1212.09ab1System.1-09.ab"
      },
      {
        "name": "hipaa-1213.09ab2System.128-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1213.09ab2System.128-09.ab"
      },
      {
        "name": "hipaa-1214.09ab2System.3456-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1214.09ab2System.3456-09.ab"
      },
      {
        "name": "hipaa-1215.09ab2System.7-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1215.09ab2System.7-09.ab"
      },
      {
        "name": "hipaa-1216.09ab3System.12-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1216.09ab3System.12-09.ab"
      },
      {
        "name": "hipaa-1217.09ab3System.3-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1217.09ab3System.3-09.ab"
      },
      {
        "name": "hipaa-1218.09ab3System.47-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1218.09ab3System.47-09.ab"
      },
      {
        "name": "hipaa-1219.09ab3System.10-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1219.09ab3System.10-09.ab"
      },
      {
        "name": "hipaa-1220.09ab3System.56-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1220.09ab3System.56-09.ab"
      },
      {
        "name": "hipaa-1222.09ab3System.8-09.ab",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1222.09ab3System.8-09.ab"
      },
      {
        "name": "hipaa-1229.09c1Organizational.1-09.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1229.09c1Organizational.1-09.c"
      },
      {
        "name": "hipaa-1230.09c2Organizational.1-09.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1230.09c2Organizational.1-09.c"
      },
      {
        "name": "hipaa-1231.09c2Organizational.23-09.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1231.09c2Organizational.23-09.c"
      },
      {
        "name": "hipaa-1232.09c3Organizational.12-09.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1232.09c3Organizational.12-09.c"
      },
      {
        "name": "hipaa-1233.09c3Organizational.3-09.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1233.09c3Organizational.3-09.c"
      },
      {
        "name": "hipaa-1270.09ad1System.12-09.ad",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1270.09ad1System.12-09.ad"
      },
      {
        "name": "hipaa-1271.09ad1System.1-09.ad",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1271.09ad1System.1-09.ad"
      },
      {
        "name": "hipaa-1276.09c2Organizational.2-09.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1276.09c2Organizational.2-09.c"
      },
      {
        "name": "hipaa-1277.09c2Organizational.4-09.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1277.09c2Organizational.4-09.c"
      },
      {
        "name": "hipaa-1278.09c2Organizational.56-09.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1278.09c2Organizational.56-09.c"
      },
      {
        "name": "hipaa-1279.09c3Organizational.4-09.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1279.09c3Organizational.4-09.c"
      },
      {
        "name": "hipaa-1301.02e1Organizational.12-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1301.02e1Organizational.12-02.e"
      },
      {
        "name": "hipaa-1302.02e2Organizational.134-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1302.02e2Organizational.134-02.e"
      },
      {
        "name": "hipaa-1303.02e2Organizational.2-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1303.02e2Organizational.2-02.e"
      },
      {
        "name": "hipaa-1304.02e3Organizational.1-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1304.02e3Organizational.1-02.e"
      },
      {
        "name": "hipaa-1305.02e3Organizational.23-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1305.02e3Organizational.23-02.e"
      },
      {
        "name": "hipaa-1306.06e1Organizational.5-06.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1306.06e1Organizational.5-06.e"
      },
      {
        "name": "hipaa-1307.07c1Organizational.124-07.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1307.07c1Organizational.124-07.c"
      },
      {
        "name": "hipaa-1308.09j1Organizational.5-09.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1308.09j1Organizational.5-09.j"
      },
      {
        "name": "hipaa-1309.01x1System.36-01.x",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1309.01x1System.36-01.x"
      },
      {
        "name": "hipaa-1310.01y1Organizational.9-01.y",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1310.01y1Organizational.9-01.y"
      },
      {
        "name": "hipaa-1311.12c2Organizational.3-12.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1311.12c2Organizational.3-12.c"
      },
      {
        "name": "hipaa-1313.02e1Organizational.3-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1313.02e1Organizational.3-02.e"
      },
      {
        "name": "hipaa-1314.02e2Organizational.5-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1314.02e2Organizational.5-02.e"
      },
      {
        "name": "hipaa-1315.02e2Organizational.67-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1315.02e2Organizational.67-02.e"
      },
      {
        "name": "hipaa-1324.07c1Organizational.3-07.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1324.07c1Organizational.3-07.c"
      },
      {
        "name": "hipaa-1325.09s1Organizational.3-09.s",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1325.09s1Organizational.3-09.s"
      },
      {
        "name": "hipaa-1326.02e1Organizational.4-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1326.02e1Organizational.4-02.e"
      },
      {
        "name": "hipaa-1327.02e2Organizational.8-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1327.02e2Organizational.8-02.e"
      },
      {
        "name": "hipaa-1331.02e3Organizational.4-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1331.02e3Organizational.4-02.e"
      },
      {
        "name": "hipaa-1334.02e2Organizational.12-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1334.02e2Organizational.12-02.e"
      },
      {
        "name": "hipaa-1336.02e1Organizational.5-02.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1336.02e1Organizational.5-02.e"
      },
      {
        "name": "hipaa-1401.05i1Organizational.1239-05.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1401.05i1Organizational.1239-05.i"
      },
      {
        "name": "hipaa-1402.05i1Organizational.45-05.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1402.05i1Organizational.45-05.i"
      },
      {
        "name": "hipaa-1403.05i1Organizational.67-05.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1403.05i1Organizational.67-05.i"
      },
      {
        "name": "hipaa-1404.05i2Organizational.1-05.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1404.05i2Organizational.1-05.i"
      },
      {
        "name": "hipaa-1406.05k1Organizational.110-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1406.05k1Organizational.110-05.k"
      },
      {
        "name": "hipaa-1407.05k2Organizational.1-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1407.05k2Organizational.1-05.k"
      },
      {
        "name": "hipaa-1408.09e1System.1-09.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1408.09e1System.1-09.e"
      },
      {
        "name": "hipaa-1409.09e2System.1-09.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1409.09e2System.1-09.e"
      },
      {
        "name": "hipaa-1410.09e2System.23-09.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1410.09e2System.23-09.e"
      },
      {
        "name": "hipaa-1411.09f1System.1-09.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1411.09f1System.1-09.f"
      },
      {
        "name": "hipaa-1412.09f2System.12-09.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1412.09f2System.12-09.f"
      },
      {
        "name": "hipaa-1413.09f2System.3-09.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1413.09f2System.3-09.f"
      },
      {
        "name": "hipaa-1416.10l1Organizational.1-10.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1416.10l1Organizational.1-10.l"
      },
      {
        "name": "hipaa-1417.10l2Organizational.1-10.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1417.10l2Organizational.1-10.l"
      },
      {
        "name": "hipaa-1418.05i1Organizational.8-05.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1418.05i1Organizational.8-05.i"
      },
      {
        "name": "hipaa-1419.05j1Organizational.12-05.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1419.05j1Organizational.12-05.j"
      },
      {
        "name": "hipaa-1421.05j2Organizational.12-05.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1421.05j2Organizational.12-05.j"
      },
      {
        "name": "hipaa-1422.05j2Organizational.3-05.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1422.05j2Organizational.3-05.j"
      },
      {
        "name": "hipaa-1423.05j2Organizational.4-05.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1423.05j2Organizational.4-05.j"
      },
      {
        "name": "hipaa-1424.05j2Organizational.5-05.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1424.05j2Organizational.5-05.j"
      },
      {
        "name": "hipaa-1428.05k1Organizational.2-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1428.05k1Organizational.2-05.k"
      },
      {
        "name": "hipaa-1429.05k1Organizational.34-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1429.05k1Organizational.34-05.k"
      },
      {
        "name": "hipaa-1430.05k1Organizational.56-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1430.05k1Organizational.56-05.k"
      },
      {
        "name": "hipaa-1431.05k1Organizational.7-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1431.05k1Organizational.7-05.k"
      },
      {
        "name": "hipaa-1432.05k1Organizational.89-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1432.05k1Organizational.89-05.k"
      },
      {
        "name": "hipaa-1438.09e2System.4-09.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1438.09e2System.4-09.e"
      },
      {
        "name": "hipaa-1442.09f2System.456-09.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1442.09f2System.456-09.f"
      },
      {
        "name": "hipaa-1450.05i2Organizational.2-05.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1450.05i2Organizational.2-05.i"
      },
      {
        "name": "hipaa-1451.05iCSPOrganizational.2-05.i",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1451.05iCSPOrganizational.2-05.i"
      },
      {
        "name": "hipaa-1452.05kCSPOrganizational.1-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1452.05kCSPOrganizational.1-05.k"
      },
      {
        "name": "hipaa-1453.05kCSPOrganizational.2-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1453.05kCSPOrganizational.2-05.k"
      },
      {
        "name": "hipaa-1454.05kCSPOrganizational.3-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1454.05kCSPOrganizational.3-05.k"
      },
      {
        "name": "hipaa-1455.05kCSPOrganizational.4-05.k",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1455.05kCSPOrganizational.4-05.k"
      },
      {
        "name": "hipaa-1464.09e2Organizational.5-09.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1464.09e2Organizational.5-09.e"
      },
      {
        "name": "hipaa-1501.02f1Organizational.123-02.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1501.02f1Organizational.123-02.f"
      },
      {
        "name": "hipaa-1502.02f1Organizational.4-02.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1502.02f1Organizational.4-02.f"
      },
      {
        "name": "hipaa-1503.02f2Organizational.12-02.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1503.02f2Organizational.12-02.f"
      },
      {
        "name": "hipaa-1504.06e1Organizational.34-06.e",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1504.06e1Organizational.34-06.e"
      },
      {
        "name": "hipaa-1505.11a1Organizational.13-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1505.11a1Organizational.13-11.a"
      },
      {
        "name": "hipaa-1506.11a1Organizational.2-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1506.11a1Organizational.2-11.a"
      },
      {
        "name": "hipaa-1507.11a1Organizational.4-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1507.11a1Organizational.4-11.a"
      },
      {
        "name": "hipaa-1508.11a2Organizational.1-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1508.11a2Organizational.1-11.a"
      },
      {
        "name": "hipaa-1509.11a2Organizational.236-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1509.11a2Organizational.236-11.a"
      },
      {
        "name": "hipaa-1510.11a2Organizational.47-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1510.11a2Organizational.47-11.a"
      },
      {
        "name": "hipaa-1511.11a2Organizational.5-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1511.11a2Organizational.5-11.a"
      },
      {
        "name": "hipaa-1512.11a2Organizational.8-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1512.11a2Organizational.8-11.a"
      },
      {
        "name": "hipaa-1514.11a3Organizational.12-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1514.11a3Organizational.12-11.a"
      },
      {
        "name": "hipaa-1515.11a3Organizational.3-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1515.11a3Organizational.3-11.a"
      },
      {
        "name": "hipaa-1516.11c1Organizational.12-11.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1516.11c1Organizational.12-11.c"
      },
      {
        "name": "hipaa-1517.11c1Organizational.3-11.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1517.11c1Organizational.3-11.c"
      },
      {
        "name": "hipaa-1518.11c2Organizational.13-11.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1518.11c2Organizational.13-11.c"
      },
      {
        "name": "hipaa-1519.11c2Organizational.2-11.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1519.11c2Organizational.2-11.c"
      },
      {
        "name": "hipaa-1520.11c2Organizational.4-11.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1520.11c2Organizational.4-11.c"
      },
      {
        "name": "hipaa-1521.11c2Organizational.56-11.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1521.11c2Organizational.56-11.c"
      },
      {
        "name": "hipaa-1522.11c3Organizational.13-11.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1522.11c3Organizational.13-11.c"
      },
      {
        "name": "hipaa-1523.11c3Organizational.24-11.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1523.11c3Organizational.24-11.c"
      },
      {
        "name": "hipaa-1524.11a1Organizational.5-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1524.11a1Organizational.5-11.a"
      },
      {
        "name": "hipaa-1525.11a1Organizational.6-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1525.11a1Organizational.6-11.a"
      },
      {
        "name": "hipaa-1560.11d1Organizational.1-11.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1560.11d1Organizational.1-11.d"
      },
      {
        "name": "hipaa-1561.11d2Organizational.14-11.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1561.11d2Organizational.14-11.d"
      },
      {
        "name": "hipaa-1562.11d2Organizational.2-11.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1562.11d2Organizational.2-11.d"
      },
      {
        "name": "hipaa-1563.11d2Organizational.3-11.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1563.11d2Organizational.3-11.d"
      },
      {
        "name": "hipaa-1577.11aCSPOrganizational.1-11.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1577.11aCSPOrganizational.1-11.a"
      },
      {
        "name": "hipaa-1581.02f1Organizational.7-02.f",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1581.02f1Organizational.7-02.f"
      },
      {
        "name": "hipaa-1587.11c2Organizational.10-11.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1587.11c2Organizational.10-11.c"
      },
      {
        "name": "hipaa-1589.11c1Organizational.5-11.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1589.11c1Organizational.5-11.c"
      },
      {
        "name": "hipaa-1601.12c1Organizational.1238-12.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1601.12c1Organizational.1238-12.c"
      },
      {
        "name": "hipaa-1602.12c1Organizational.4567-12.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1602.12c1Organizational.4567-12.c"
      },
      {
        "name": "hipaa-1603.12c1Organizational.9-12.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1603.12c1Organizational.9-12.c"
      },
      {
        "name": "hipaa-1604.12c2Organizational.16789-12.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1604.12c2Organizational.16789-12.c"
      },
      {
        "name": "hipaa-1605.12c2Organizational.2-12.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1605.12c2Organizational.2-12.c"
      },
      {
        "name": "hipaa-1607.12c2Organizational.4-12.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1607.12c2Organizational.4-12.c"
      },
      {
        "name": "hipaa-1608.12c2Organizational.5-12.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1608.12c2Organizational.5-12.c"
      },
      {
        "name": "hipaa-1609.12c3Organizational.12-12.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1609.12c3Organizational.12-12.c"
      },
      {
        "name": "hipaa-1616.09l1Organizational.16-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1616.09l1Organizational.16-09.l"
      },
      {
        "name": "hipaa-1617.09l1Organizational.23-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1617.09l1Organizational.23-09.l"
      },
      {
        "name": "hipaa-1618.09l1Organizational.45-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1618.09l1Organizational.45-09.l"
      },
      {
        "name": "hipaa-1619.09l1Organizational.7-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1619.09l1Organizational.7-09.l"
      },
      {
        "name": "hipaa-1620.09l1Organizational.8-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1620.09l1Organizational.8-09.l"
      },
      {
        "name": "hipaa-1621.09l2Organizational.1-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1621.09l2Organizational.1-09.l"
      },
      {
        "name": "hipaa-1622.09l2Organizational.23-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1622.09l2Organizational.23-09.l"
      },
      {
        "name": "hipaa-1623.09l2Organizational.4-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1623.09l2Organizational.4-09.l"
      },
      {
        "name": "hipaa-1624.09l3Organizational.12-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1624.09l3Organizational.12-09.l"
      },
      {
        "name": "hipaa-1625.09l3Organizational.34-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1625.09l3Organizational.34-09.l"
      },
      {
        "name": "hipaa-1626.09l3Organizational.5-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1626.09l3Organizational.5-09.l"
      },
      {
        "name": "hipaa-1627.09l3Organizational.6-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1627.09l3Organizational.6-09.l"
      },
      {
        "name": "hipaa-1634.12b1Organizational.1-12.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1634.12b1Organizational.1-12.b"
      },
      {
        "name": "hipaa-1635.12b1Organizational.2-12.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1635.12b1Organizational.2-12.b"
      },
      {
        "name": "hipaa-1636.12b2Organizational.1-12.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1636.12b2Organizational.1-12.b"
      },
      {
        "name": "hipaa-1637.12b2Organizational.2-12.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1637.12b2Organizational.2-12.b"
      },
      {
        "name": "hipaa-1638.12b2Organizational.345-12.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1638.12b2Organizational.345-12.b"
      },
      {
        "name": "hipaa-1666.12d1Organizational.1235-12.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1666.12d1Organizational.1235-12.d"
      },
      {
        "name": "hipaa-1667.12d1Organizational.4-12.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1667.12d1Organizational.4-12.d"
      },
      {
        "name": "hipaa-1668.12d1Organizational.67-12.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1668.12d1Organizational.67-12.d"
      },
      {
        "name": "hipaa-1669.12d1Organizational.8-12.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1669.12d1Organizational.8-12.d"
      },
      {
        "name": "hipaa-1670.12d2Organizational.1-12.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1670.12d2Organizational.1-12.d"
      },
      {
        "name": "hipaa-1671.12d2Organizational.2-12.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1671.12d2Organizational.2-12.d"
      },
      {
        "name": "hipaa-1672.12d2Organizational.3-12.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1672.12d2Organizational.3-12.d"
      },
      {
        "name": "hipaa-1699.09l1Organizational.10-09.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1699.09l1Organizational.10-09.l"
      },
      {
        "name": "hipaa-1704.03b1Organizational.12-03.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1704.03b1Organizational.12-03.b"
      },
      {
        "name": "hipaa-1705.03b2Organizational.12-03.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1705.03b2Organizational.12-03.b"
      },
      {
        "name": "hipaa-1706.03b1Organizational.3-03.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1706.03b1Organizational.3-03.b"
      },
      {
        "name": "hipaa-1707.03c1Organizational.12-03.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1707.03c1Organizational.12-03.c"
      },
      {
        "name": "hipaa-1708.03c2Organizational.12-03.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1708.03c2Organizational.12-03.c"
      },
      {
        "name": "hipaa-17101.10a3Organizational.6-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-17101.10a3Organizational.6-10.a"
      },
      {
        "name": "hipaa-17120.10a3Organizational.5-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-17120.10a3Organizational.5-10.a"
      },
      {
        "name": "hipaa-17126.03c1System.6-03.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-17126.03c1System.6-03.c"
      },
      {
        "name": "hipaa-1713.03c1Organizational.3-03.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1713.03c1Organizational.3-03.c"
      },
      {
        "name": "hipaa-1733.03d1Organizational.1-03.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1733.03d1Organizational.1-03.d"
      },
      {
        "name": "hipaa-1734.03d2Organizational.1-03.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1734.03d2Organizational.1-03.d"
      },
      {
        "name": "hipaa-1735.03d2Organizational.23-03.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1735.03d2Organizational.23-03.d"
      },
      {
        "name": "hipaa-1736.03d2Organizational.4-03.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1736.03d2Organizational.4-03.d"
      },
      {
        "name": "hipaa-1737.03d2Organizational.5-03.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1737.03d2Organizational.5-03.d"
      },
      {
        "name": "hipaa-1780.10a1Organizational.1-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1780.10a1Organizational.1-10.a"
      },
      {
        "name": "hipaa-1781.10a1Organizational.23-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1781.10a1Organizational.23-10.a"
      },
      {
        "name": "hipaa-1782.10a1Organizational.4-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1782.10a1Organizational.4-10.a"
      },
      {
        "name": "hipaa-1783.10a1Organizational.56-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1783.10a1Organizational.56-10.a"
      },
      {
        "name": "hipaa-1784.10a1Organizational.7-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1784.10a1Organizational.7-10.a"
      },
      {
        "name": "hipaa-1785.10a1Organizational.8-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1785.10a1Organizational.8-10.a"
      },
      {
        "name": "hipaa-1786.10a1Organizational.9-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1786.10a1Organizational.9-10.a"
      },
      {
        "name": "hipaa-1787.10a2Organizational.1-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1787.10a2Organizational.1-10.a"
      },
      {
        "name": "hipaa-1788.10a2Organizational.2-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1788.10a2Organizational.2-10.a"
      },
      {
        "name": "hipaa-1789.10a2Organizational.3-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1789.10a2Organizational.3-10.a"
      },
      {
        "name": "hipaa-1790.10a2Organizational.45-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1790.10a2Organizational.45-10.a"
      },
      {
        "name": "hipaa-1791.10a2Organizational.6-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1791.10a2Organizational.6-10.a"
      },
      {
        "name": "hipaa-1792.10a2Organizational.7814-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1792.10a2Organizational.7814-10.a"
      },
      {
        "name": "hipaa-1793.10a2Organizational.91011-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1793.10a2Organizational.91011-10.a"
      },
      {
        "name": "hipaa-1794.10a2Organizational.12-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1794.10a2Organizational.12-10.a"
      },
      {
        "name": "hipaa-1795.10a2Organizational.13-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1795.10a2Organizational.13-10.a"
      },
      {
        "name": "hipaa-1796.10a2Organizational.15-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1796.10a2Organizational.15-10.a"
      },
      {
        "name": "hipaa-1797.10a3Organizational.1-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1797.10a3Organizational.1-10.a"
      },
      {
        "name": "hipaa-1798.10a3Organizational.2-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1798.10a3Organizational.2-10.a"
      },
      {
        "name": "hipaa-1799.10a3Organizational.34-10.a",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1799.10a3Organizational.34-10.a"
      },
      {
        "name": "hipaa-1801.08b1Organizational.124-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1801.08b1Organizational.124-08.b"
      },
      {
        "name": "hipaa-1802.08b1Organizational.3-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1802.08b1Organizational.3-08.b"
      },
      {
        "name": "hipaa-1803.08b1Organizational.5-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1803.08b1Organizational.5-08.b"
      },
      {
        "name": "hipaa-1804.08b2Organizational.12-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1804.08b2Organizational.12-08.b"
      },
      {
        "name": "hipaa-1805.08b2Organizational.3-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1805.08b2Organizational.3-08.b"
      },
      {
        "name": "hipaa-1806.08b2Organizational.4-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1806.08b2Organizational.4-08.b"
      },
      {
        "name": "hipaa-1807.08b2Organizational.56-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1807.08b2Organizational.56-08.b"
      },
      {
        "name": "hipaa-1808.08b2Organizational.7-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1808.08b2Organizational.7-08.b"
      },
      {
        "name": "hipaa-1809.08b3Organizational.1-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1809.08b3Organizational.1-08.b"
      },
      {
        "name": "hipaa-1810.08b3Organizational.2-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1810.08b3Organizational.2-08.b"
      },
      {
        "name": "hipaa-18108.08j1Organizational.1-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-18108.08j1Organizational.1-08.j"
      },
      {
        "name": "hipaa-18109.08j1Organizational.4-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-18109.08j1Organizational.4-08.j"
      },
      {
        "name": "hipaa-1811.08b3Organizational.3-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1811.08b3Organizational.3-08.b"
      },
      {
        "name": "hipaa-18110.08j1Organizational.5-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-18110.08j1Organizational.5-08.j"
      },
      {
        "name": "hipaa-18111.08j1Organizational.6-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-18111.08j1Organizational.6-08.j"
      },
      {
        "name": "hipaa-18112.08j3Organizational.4-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-18112.08j3Organizational.4-08.j"
      },
      {
        "name": "hipaa-1812.08b3Organizational.46-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1812.08b3Organizational.46-08.b"
      },
      {
        "name": "hipaa-18127.08l1Organizational.3-08.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-18127.08l1Organizational.3-08.l"
      },
      {
        "name": "hipaa-1813.08b3Organizational.56-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1813.08b3Organizational.56-08.b"
      },
      {
        "name": "hipaa-18130.09p1Organizational.24-09.p",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-18130.09p1Organizational.24-09.p"
      },
      {
        "name": "hipaa-18131.09p1Organizational.3-09.p",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-18131.09p1Organizational.3-09.p"
      },
      {
        "name": "hipaa-1814.08d1Organizational.12-08.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1814.08d1Organizational.12-08.d"
      },
      {
        "name": "hipaa-18145.08b3Organizational.7-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-18145.08b3Organizational.7-08.b"
      },
      {
        "name": "hipaa-18146.08b3Organizational.8-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-18146.08b3Organizational.8-08.b"
      },
      {
        "name": "hipaa-1815.08d2Organizational.123-08.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1815.08d2Organizational.123-08.d"
      },
      {
        "name": "hipaa-1816.08d2Organizational.4-08.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1816.08d2Organizational.4-08.d"
      },
      {
        "name": "hipaa-1817.08d3Organizational.12-08.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1817.08d3Organizational.12-08.d"
      },
      {
        "name": "hipaa-1818.08d3Organizational.3-08.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1818.08d3Organizational.3-08.d"
      },
      {
        "name": "hipaa-1819.08j1Organizational.23-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1819.08j1Organizational.23-08.j"
      },
      {
        "name": "hipaa-1820.08j2Organizational.1-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1820.08j2Organizational.1-08.j"
      },
      {
        "name": "hipaa-1821.08j2Organizational.3-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1821.08j2Organizational.3-08.j"
      },
      {
        "name": "hipaa-1822.08j2Organizational.2-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1822.08j2Organizational.2-08.j"
      },
      {
        "name": "hipaa-1823.08j3Organizational.12-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1823.08j3Organizational.12-08.j"
      },
      {
        "name": "hipaa-1824.08j3Organizational.3-08.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1824.08j3Organizational.3-08.j"
      },
      {
        "name": "hipaa-1825.08l1Organizational.12456-08.l",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1825.08l1Organizational.12456-08.l"
      },
      {
        "name": "hipaa-1826.09p1Organizational.1-09.p",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1826.09p1Organizational.1-09.p"
      },
      {
        "name": "hipaa-1827.09p2Organizational.1-09.p",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1827.09p2Organizational.1-09.p"
      },
      {
        "name": "hipaa-1844.08b1Organizational.6-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1844.08b1Organizational.6-08.b"
      },
      {
        "name": "hipaa-1845.08b1Organizational.7-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1845.08b1Organizational.7-08.b"
      },
      {
        "name": "hipaa-1846.08b2Organizational.8-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1846.08b2Organizational.8-08.b"
      },
      {
        "name": "hipaa-1847.08b2Organizational.910-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1847.08b2Organizational.910-08.b"
      },
      {
        "name": "hipaa-1848.08b2Organizational.11-08.b",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1848.08b2Organizational.11-08.b"
      },
      {
        "name": "hipaa-1862.08d1Organizational.3-08.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1862.08d1Organizational.3-08.d"
      },
      {
        "name": "hipaa-1863.08d1Organizational.4-08.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1863.08d1Organizational.4-08.d"
      },
      {
        "name": "hipaa-1901.06d1Organizational.1-06.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1901.06d1Organizational.1-06.d"
      },
      {
        "name": "hipaa-1902.06d1Organizational.2-06.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1902.06d1Organizational.2-06.d"
      },
      {
        "name": "hipaa-1903.06d1Organizational.3456711-06.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1903.06d1Organizational.3456711-06.d"
      },
      {
        "name": "hipaa-1904.06.d2Organizational.1-06.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1904.06.d2Organizational.1-06.d"
      },
      {
        "name": "hipaa-1906.06.c1Organizational.2-06.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1906.06.c1Organizational.2-06.c"
      },
      {
        "name": "hipaa-1907.06.c1Organizational.3-06.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1907.06.c1Organizational.3-06.c"
      },
      {
        "name": "hipaa-1908.06.c1Organizational.4-06.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1908.06.c1Organizational.4-06.c"
      },
      {
        "name": "hipaa-1911.06d1Organizational.13-06.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-1911.06d1Organizational.13-06.d"
      },
      {
        "name": "hipaa-19134.05j1Organizational.5-05.j",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-19134.05j1Organizational.5-05.j"
      },
      {
        "name": "hipaa-19141.06c1Organizational.7-06.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-19141.06c1Organizational.7-06.c"
      },
      {
        "name": "hipaa-19142.06c1Organizational.8-06.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-19142.06c1Organizational.8-06.c"
      },
      {
        "name": "hipaa-19143.06c1Organizational.9-06.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-19143.06c1Organizational.9-06.c"
      },
      {
        "name": "hipaa-19144.06c2Organizational.1-06.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-19144.06c2Organizational.1-06.c"
      },
      {
        "name": "hipaa-19145.06c2Organizational.2-06.c",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-19145.06c2Organizational.2-06.c"
      },
      {
        "name": "hipaa-19242.06d1Organizational.14-06.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-19242.06d1Organizational.14-06.d"
      },
      {
        "name": "hipaa-19243.06d1Organizational.15-06.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-19243.06d1Organizational.15-06.d"
      },
      {
        "name": "hipaa-19245.06d2Organizational.2-06.d",
        "additionalMetadataId": "/providers/Microsoft.PolicyInsights/policyMetadata/hipaa-19245.06d2Organizational.2-06.d"
      }
    ]
  },
  "id": "/providers/Microsoft.Authorization/policySetDefinitions/a169a624-5599-4385-a696-c8d643089fab",
  "type": "Microsoft.Authorization/policySetDefinitions",
  "name": "a169a624-5599-4385-a696-c8d643089fab"
}