Sample-Reports/IndividualReports/PowerPlatformReport.json
[
{ "ReportSummary": { "Failures": 0, "Errors": 0, "Passes": 5, "Warnings": 1, "Manual": 2, "Date": "08/02/2024 14:25:11 Central Daylight Time", "Omits": 0 }, "Results": [ { "GroupName": "Creation of Power Platform Environments", "GroupNumber": "1", "GroupReferenceURL": "https://github.com/cisagov/ScubaGear/blob/v1.4.0/PowerShell/ScubaGear/baselines/powerplatform.md#1-creation-of-power-platform-environments", "Controls": [ { "Control ID": "MS.POWERPLATFORM.1.1v1", "Requirement": "The ability to create production and sandbox environments SHALL be restricted to admins.", "Result": "Pass", "Criticality": "Shall", "Details": "Requirement met" }, { "Control ID": "MS.POWERPLATFORM.1.2v1", "Requirement": "The ability to create trial environments SHALL be restricted to admins.", "Result": "Pass", "Criticality": "Shall", "Details": "Requirement met" } ] }, { "GroupName": "Power Platform Data Loss Prevention Policies", "GroupNumber": "2", "GroupReferenceURL": "https://github.com/cisagov/ScubaGear/blob/v1.4.0/PowerShell/ScubaGear/baselines/powerplatform.md#2-power-platform-data-loss-prevention-policies", "Controls": [ { "Control ID": "MS.POWERPLATFORM.2.1v1", "Requirement": "A DLP policy SHALL be created to restrict connector access in the default Power Platform environment.", "Result": "Pass", "Criticality": "Shall", "Details": "Requirement met" }, { "Control ID": "MS.POWERPLATFORM.2.2v1", "Requirement": "Non-default environments SHOULD have at least one DLP policy affecting them.", "Result": "Warning", "Criticality": "Should", "Details": "1 Subsequent environments without DLP policies: 407cbeff-b477-e3b4-9ca7-097888a9ec4e" } ] }, { "GroupName": "Power Platform Tenant Isolation", "GroupNumber": "3", "GroupReferenceURL": "https://github.com/cisagov/ScubaGear/blob/v1.4.0/PowerShell/ScubaGear/baselines/powerplatform.md#3-power-platform-tenant-isolation", "Controls": [ { "Control ID": "MS.POWERPLATFORM.3.1v1", "Requirement": "Power Platform tenant isolation SHALL be enabled.", "Result": "Pass", "Criticality": "Shall", "Details": "Requirement met" }, { "Control ID": "MS.POWERPLATFORM.3.2v1", "Requirement": "An inbound/outbound connection allowlist SHOULD be configured.", "Result": "N/A", "Criticality": "Should/Not-Implemented", "Details": "This product does not currently have the capability to check compliance for this policy. See <a href=\"https://github.com/cisagov/ScubaGear/blob/v1.4.0/PowerShell/ScubaGear/baselines/powerplatform.md#mspowerplatform32v1\" target=\"_blank\">Secure Configuration Baseline policy</a> for instructions on manual check" } ] }, { "GroupName": "Power Apps Content Security Policy", "GroupNumber": "4", "GroupReferenceURL": "https://github.com/cisagov/ScubaGear/blob/v1.4.0/PowerShell/ScubaGear/baselines/powerplatform.md#4-power-apps-content-security-policy", "Controls": [ { "Control ID": "MS.POWERPLATFORM.4.1v1", "Requirement": "Content Security Policy SHALL be enforced for model-driven and canvas Power Apps.", "Result": "N/A", "Criticality": "Shall/Not-Implemented", "Details": "This product does not currently have the capability to check compliance for this policy. See <a href=\"https://github.com/cisagov/ScubaGear/blob/v1.4.0/PowerShell/ScubaGear/baselines/powerplatform.md#mspowerplatform41v1\" target=\"_blank\">Secure Configuration Baseline policy</a> for instructions on manual check" } ] }, { "GroupName": "Power Pages Creation", "GroupNumber": "5", "GroupReferenceURL": "https://github.com/cisagov/ScubaGear/blob/v1.4.0/PowerShell/ScubaGear/baselines/powerplatform.md#5-power-pages-creation", "Controls": [ { "Control ID": "MS.POWERPLATFORM.5.1v1", "Requirement": "The ability to create Power Pages sites SHOULD be restricted to admins.", "Result": "Pass", "Criticality": "Should", "Details": "Requirement met" } ] } ], "MetaData": { "Tenant Display Name": "tqhjy", "Report Date": "08/02/2024 14:25:11 Central Daylight Time", "Baseline Version": "1", "Module Version": "1.4.0" } } ] |