Question: Question : Hello, I have a sample JSON output below and need to render that info to WebUI. Simply it should be 2 columns Description

Question : Hello, I have a sample JSON output below and need to render that info to WebUI. Simply it should be 2 columns "Description" and "Status". Also I would like to know a possible way to render this info via a tabular kind of way as well(ex: bar chart, pie chart, etc.)

[

[

{

"desc": "2.2 Ensure that Azure Defender is set to On for App Service (Manual)",

"status": "False"

},

{

"desc": "2.3 Ensure that Azure Defender is set to On for Azure SQL database servers (Manual)",

"status": "False"

},

{

"desc": "2.4 Ensure that Azure Defender is set to On for Storage (Manual)",

"status": "False"

},

{

"desc": "2.1 Ensure that Azure Defender is set to On for Servers (Manual)",

"status": "False"

},

{

"desc": "2.5 Ensure that Azure Defender is set to On for Kubernetes (Manual)",

"status": "Manual"

},

{

"desc": "2.6 Ensure that Azure Defender is set to On for Key Vault (Manual)",

"status": "Manual"

},

{

"desc": "2.7 Ensure that Windows Defender ATP (WDATP) integration with Security Center is selected (Manual)",

"status": "True"

},

{

"desc": "2.8 Ensure that Microsoft Cloud App Security (MCAS) integration with Security Center is selected (Manual)",

"status": "True"

},

{

"desc": "2.9 Ensure that 'Automatic provisioning of monitoring agent' is set to 'On' (Automated)",

"status": "True"

},

{

"desc": "2.10 Ensure any of the ASC Default policy setting is not set to \"Disabled\" (Manual)",

"status": "Manual"

},

{

"desc": "2.11 Ensure 'Additional email addresses' is configured with a security contact email (Automated)",

"status": "False"

},

{

"desc": "2.12 Ensure that 'Notify about alerts with the following severity' is set to 'High' (Automated)",

"status": "False"

},

{

"desc": "2.13 Ensure that 'All users with the following roles' is set to 'Owner' (Automated)",

"status": "False"

}

],

[

{

"desc": "5.1.1 Ensure that a 'Diagnostics Setting' exists (Automated)",

"status": "Manual"

},

{

"desc": "5.1.2 Ensure audit profile captures all the activities (Automated)",

"status": false

},

{

"desc": "5.1.3 Ensure the storage container storing the activity logs is not publicly accessible (Automated)",

"status": false

},

{

"desc": "5.1.4 Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key) (Automated)",

"status": "Unknown"

},

{

"desc": "5.1.5 Ensure that logging for Azure KeyVault is 'Enabled' (Automated)",

"status": "Unknown"

},

{

"desc": "5.2.1 Ensure that Activity Log Alert exists for Create Policy Assignment (Automated)",

"status": "Unknown"

},

{

"desc": "5.2.2 Ensure that Activity Log Alert exists for Create or Update Network Security Group (Automated)",

"status": "Unknown"

},

{

"desc": "5.2.3 Ensure that Activity Log Alert exists for Delete Network Security Group (Automated)",

"status": "Unknown"

},

{

"desc": "5.2.4 Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule (Automated)",

"status": "Unknown"

},

{

"desc": "5.2.5 Ensure that activity log alert exists for the Delete Network Security Group Rule (Automated)",

"status": "Unknown"

},

{

"desc": "5.2.6 Ensure that Activity Log Alert exists for Create or Update Security Solution (Automated)",

"status": "Unknown"

},

{

"desc": "5.2.7 Ensure that Activity Log Alert exists for Delete Security Solution (Automated)",

"status": "Unknown"

},

{

"desc": "5.2.8 Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule (Automated)",

"status": "Unknown"

}

],

[

{

"desc": "6.1 Ensure that RDP access is restricted from the internet (Automated)",

"status": true

},

{

"desc": "6.2 Ensure that SSH access is restricted from the internet (Automated)",

"status": true

},

{

"desc": "6.4 Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' (Automated)",

"status": null

},

{

"desc": "6.5 Ensure that Network Watcher is 'Enabled' (Manual)",

"status": true

},

{

"desc": "6.6 Ensure that UDP Services are restricted from the Internet (Automated)",

"status": true

},

{

"desc": "7.1 Ensure Virtual Machines are utilizing Managed Disks (Manual)",

"status": "Unknown"

},

{

"desc": "7.2 Ensure that 'OS and Data' disks are encrypted with CMK (Automated)",

"status": "Manual"

},

{

"desc": "7.3 Ensure that 'Unattached disks' are encrypted with CMK (Automated)",

"status": "Unknown"

},

{

"desc": "7.4 Ensure that only approved extensions are installed (Manual)",

"status": "Unknown"

},

{

"desc": "7.5 Ensure that the latest OS Patches for all Virtual Machines are applied (Manual)",

"status": "Manual"

},

{

"desc": "7.6 Ensure that the endpoint protection for all Virtual Machines is installed (Manual)",

"status": false

}

]

]

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!