Question: Question : Hello, I have a sample JSON output below and need to render that info to WebUI. Simply it should be 2 columns Description
Question : Hello, I have a sample JSON output below and need to render that info to WebUI. Simply it should be 2 columns "Description" and "Status". Also I would like to know a possible way to render this info via a tabular kind of way as well(ex: bar chart, pie chart, etc.)
[
[
{
"desc": "2.2 Ensure that Azure Defender is set to On for App Service (Manual)",
"status": "False"
},
{
"desc": "2.3 Ensure that Azure Defender is set to On for Azure SQL database servers (Manual)",
"status": "False"
},
{
"desc": "2.4 Ensure that Azure Defender is set to On for Storage (Manual)",
"status": "False"
},
{
"desc": "2.1 Ensure that Azure Defender is set to On for Servers (Manual)",
"status": "False"
},
{
"desc": "2.5 Ensure that Azure Defender is set to On for Kubernetes (Manual)",
"status": "Manual"
},
{
"desc": "2.6 Ensure that Azure Defender is set to On for Key Vault (Manual)",
"status": "Manual"
},
{
"desc": "2.7 Ensure that Windows Defender ATP (WDATP) integration with Security Center is selected (Manual)",
"status": "True"
},
{
"desc": "2.8 Ensure that Microsoft Cloud App Security (MCAS) integration with Security Center is selected (Manual)",
"status": "True"
},
{
"desc": "2.9 Ensure that 'Automatic provisioning of monitoring agent' is set to 'On' (Automated)",
"status": "True"
},
{
"desc": "2.10 Ensure any of the ASC Default policy setting is not set to \"Disabled\" (Manual)",
"status": "Manual"
},
{
"desc": "2.11 Ensure 'Additional email addresses' is configured with a security contact email (Automated)",
"status": "False"
},
{
"desc": "2.12 Ensure that 'Notify about alerts with the following severity' is set to 'High' (Automated)",
"status": "False"
},
{
"desc": "2.13 Ensure that 'All users with the following roles' is set to 'Owner' (Automated)",
"status": "False"
}
],
[
{
"desc": "5.1.1 Ensure that a 'Diagnostics Setting' exists (Automated)",
"status": "Manual"
},
{
"desc": "5.1.2 Ensure audit profile captures all the activities (Automated)",
"status": false
},
{
"desc": "5.1.3 Ensure the storage container storing the activity logs is not publicly accessible (Automated)",
"status": false
},
{
"desc": "5.1.4 Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key) (Automated)",
"status": "Unknown"
},
{
"desc": "5.1.5 Ensure that logging for Azure KeyVault is 'Enabled' (Automated)",
"status": "Unknown"
},
{
"desc": "5.2.1 Ensure that Activity Log Alert exists for Create Policy Assignment (Automated)",
"status": "Unknown"
},
{
"desc": "5.2.2 Ensure that Activity Log Alert exists for Create or Update Network Security Group (Automated)",
"status": "Unknown"
},
{
"desc": "5.2.3 Ensure that Activity Log Alert exists for Delete Network Security Group (Automated)",
"status": "Unknown"
},
{
"desc": "5.2.4 Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule (Automated)",
"status": "Unknown"
},
{
"desc": "5.2.5 Ensure that activity log alert exists for the Delete Network Security Group Rule (Automated)",
"status": "Unknown"
},
{
"desc": "5.2.6 Ensure that Activity Log Alert exists for Create or Update Security Solution (Automated)",
"status": "Unknown"
},
{
"desc": "5.2.7 Ensure that Activity Log Alert exists for Delete Security Solution (Automated)",
"status": "Unknown"
},
{
"desc": "5.2.8 Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule (Automated)",
"status": "Unknown"
}
],
[
{
"desc": "6.1 Ensure that RDP access is restricted from the internet (Automated)",
"status": true
},
{
"desc": "6.2 Ensure that SSH access is restricted from the internet (Automated)",
"status": true
},
{
"desc": "6.4 Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' (Automated)",
"status": null
},
{
"desc": "6.5 Ensure that Network Watcher is 'Enabled' (Manual)",
"status": true
},
{
"desc": "6.6 Ensure that UDP Services are restricted from the Internet (Automated)",
"status": true
},
{
"desc": "7.1 Ensure Virtual Machines are utilizing Managed Disks (Manual)",
"status": "Unknown"
},
{
"desc": "7.2 Ensure that 'OS and Data' disks are encrypted with CMK (Automated)",
"status": "Manual"
},
{
"desc": "7.3 Ensure that 'Unattached disks' are encrypted with CMK (Automated)",
"status": "Unknown"
},
{
"desc": "7.4 Ensure that only approved extensions are installed (Manual)",
"status": "Unknown"
},
{
"desc": "7.5 Ensure that the latest OS Patches for all Virtual Machines are applied (Manual)",
"status": "Manual"
},
{
"desc": "7.6 Ensure that the endpoint protection for all Virtual Machines is installed (Manual)",
"status": false
}
]
]
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
