TestCasesMaster.json

[
    {
        "TestCaseID": "Test-Set-AzSDKOMSSettings",
        "Priority": "1",
        "Feature": "AlertMonitoring",
        "ModuleName": "OMS",
        "Type": "BVT",
        "Enabled": "True",
        "AutomationStatus": "Manual",
        "ManualSteps": "",
        "TestMethod": "TestSetAzSDKOMSSettings",
        "Description": "Command should be able to set OMS settings."
    },
    {
        "TestCaseID": "Test-Set-AzSDKOMSSettings-WithSource",
        "Priority": "1",
        "Feature": "AlertMonitoring",
        "ModuleName": "OMS",
        "Type": "BVT",
        "Enabled": "True",
        "AutomationStatus": "Manual",
        "ManualSteps": "",
        "TestMethod": "TestSetAzSDKOMSSettingsWithSource",
        "Description": "Command should be able to set OMS settings with source."
    },
    {
        "TestCaseID": "Test-Set-AzSDKOMSSettings-Disable",
        "Priority": "1",
        "Feature": "AlertMonitoring",
        "ModuleName": "OMS",
        "Type": "BVT",
        "Enabled": "True",
        "AutomationStatus": "Manual",
        "ManualSteps": "",
        "TestMethod": "TestSetAzSDKOMSSettingsDisable",
        "Description": "Command should be able to disbale OMS settings."
    },
    {
        "TestCaseID": "Test-Install-AzSDKOMSSolution-All",
        "Priority": "1",
        "Feature": "AlertMonitoring",
        "ModuleName": "OMS",
        "Type": "BVT",
        "AutomationStatus": "Manual",
        "ManualSteps": "",
        "Enabled": "True",
        "TestMethod": "TestInstallAzSDKOMSSolutionAll",
        "Description": "Command should install OMS sample view, queries and alerts."
    },
    {
        "TestCaseID": "Test-Install-AzSDKOMSSolution-Queries",
        "Priority": "1",
        "Feature": "AlertMonitoring",
        "ModuleName": "OMS",
        "Type": "FVT",
        "Enabled": "True",
        "AutomationStatus": "Manual",
        "ManualSteps": "",
        "TestMethod": "TestInstallAzSDKOMSSolutionQueries",
        "Description": "Command should install only OMS queries."
    },
    {
        "TestCaseID": "Test-Install-AzSDKOMSSolution-Alerts",
        "Priority": "1",
        "Feature": "AlertMonitoring",
        "ModuleName": "OMS",
        "Type": "FVT",
        "AutomationStatus": "Manual",
        "ManualSteps": "",
        "Enabled": "True",
        "TestMethod": "TestInstallAzSDKOMSSolutionAlerts",
        "Description": "Command should install only OMS alerts."
    },
    {
        "TestCaseID": "Test-Install-AzSDKOMSSolution-SampleView",
        "Priority": "1",
        "Feature": "AlertMonitoring",
        "ModuleName": "OMS",
        "Type": "FVT",
        "Enabled": "True",
        "AutomationStatus": "Manual",
        "ManualSteps": "",
        "TestMethod": "TestInstallAzSDKOMSSolutionSampleView",
        "Description": "Command should install only OMS sample view."
    },
    {
        "TestCaseID": "Test-Uninstall-AzSDKOMSetup",
        "Priority": "1",
        "Feature": "AlertMonitoring",
        "ModuleName": "OMS",
        "Type": "BVT",
        "Enabled": "False",
        "AutomationStatus": "Manual",
        "ManualSteps": "",
        "TestMethod": "TestUninstallAzSDKOMSetup",
        "Description": "Command should uninstall OMS queries and alerts."
    },
    {
        "TestCaseID": "Test-Run-CICDTask-On-Hosted-Agent",
        "Priority": "1",
        "Feature": "CICDPipeline",
        "ModuleName": "CICD",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "",
        "ManualSteps": "Trigger CICD build with SVT task on a hosted agent.",
        "AutomationStatus": "Manual",
        "Description": "Verify if CICD task is running successfully on a hosted agent."
    },
    {
        "TestCaseID": "Test-Run-CICDTask-On-NonHosted-Agent",
        "Priority": "1",
        "Feature": "CICDPipeline",
        "ModuleName": "CICD",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "",
        "ManualSteps": "Trigger CICD build with SVT task on a non-hosted agent.",
        "AutomationStatus": "Manual",
        "Description": "Verify if CICD task is running successfully on a non-hosted agent."
    },
    {
        "TestCaseID": "Test-Install-AzSDKContinuousAssurance-CleanInstall",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestInstallAzSDKContinuousAssuranceCleanInstall",
        "ManualSteps": "In case you see the test status as \u0027manual\u0027 then it is because it needs manual input. You can either verify the test case manually or you can run the automation and provide manual input whenever the dialogue box appears.",
        "AutomationStatus": "Manual",
        "Description": "Run Install-AzSDKContinuousAssurance command on subscription without having previous installation of CA."
    },
    {
        "TestCaseID": "Test-Install-AzSDKContinuousAssurance-Existing",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestInstallAzSDKContinuousAssuranceExisting",
        "AutomationStatus": "Manual",
        "ManualSteps": "In case you see the test status as \u0027manual\u0027 then it is because it needs manual input. You can either verify the test case manually or you can run the automation and provide manual input whenever the dialogue box appears.",
        "Description": "Run Install-AzSDKContinuousAssurance command on subscription having already installed CA."
    },
    {
        "TestCaseID": "Test-Install-AzSDKContinuousAssurance-InvalidOMSCredentials",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "",
        "AutomationStatus": "Manual",
        "ManualSteps": "Please verify this test case manually until we have it automated.",
        "Description": "Run Install-AzSDKContinuousAssurance command on subscription with invalid OMS credentials"
    },
    {
        "TestCaseID": "Test-Install-AzSDKContinuousAssurance-InvalidSubscriptionId",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "",
        "AutomationStatus": "Manual",
        "ManualSteps": "Please verify this test case manually until we have it automated.",
        "Description": "Run Install-AzSDKContinuousAssurance command on subscription with invalid subscription Id."
    },
    {
        "TestCaseID": "Test-Update-AzSDKContinuousAssurance-Clean",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestUpdateAzSDKContinuousAssuranceClean",
        "AutomationStatus": "Manual",
        "ManualSteps": "Please verify this test case manually until we have it automated.",
        "Description": "Run Update-AzSDKContinuousAssurance command on subscription without having previous installation of CA."
    },
    {
        "TestCaseID": "Test-Install-AzSDKContinuousAssurance-InvalidParameters",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "",
        "AutomationStatus": "Manual",
        "ManualSteps": "Please verify this test case manually until we have it automated.",
        "Description": "Run Install-AzSDKContinuousAssurance command on subscription with 1 or 2 invalid parameters."
    },
    {
        "TestCaseID": "Test-Update-AzSDKContinuousAssurance-ExistingAll",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestUpdateAzSDKContinuousAssuranceExistingAll",
        "AutomationStatus": "Automated",
        "Description": "Run Update-AzSDKContinuousAssurance command on subscription having already installed CA."
    },
    {
        "TestCaseID": "Test-Update-AzSDKContinuousAssurance-ExistingDefault",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestUpdateAzSDKContinuousAssuranceExistingDefault",
        "AutomationStatus": "Automated",
        "Description": "Run Update-AzSDKContinuousAssurance command on subscription having already installed CA."
    },
    {
        "TestCaseID": "Test-Update-AzSDKContinuousAssurance-invalidSubscriptionId",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "",
        "AutomationStatus": "Manual",
        "ManualSteps": "Please verify this test case manually until we have it automated.",
        "Description": "Update command with invalid subscription id."
    },
    {
        "TestCaseID": "Test-Remove-AzSDKContinuousAssurance-Existing",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestRemoveAzSDKContinuousAssuranceExisting",
        "AutomationStatus": "Manual",
        "ManualSteps": "Please verify this test case manually until we have it automated.",
        "Description": "Already existing Continuous Assurance account must be removed."
    },
    {
        "TestCaseID": "Test-Remove-AzSDKContinuousAssurance-WithStorage",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestRemoveAzSDKContinuousAssuranceWithStorageStorage",
        "AutomationStatus": "Manual",
        "ManualSteps": "Please verify this test case manually until we have it automated.",
        "Description": "Already existing Continuous Assurance account must be removed."
    },
    {
        "TestCaseID": "Test-Remove-AzSDKContinuousAssurance-NotExisting",
        "Priority": "1",
        "Feature": "ContinuousCompliance",
        "ModuleName": "ContinuousAssurance",
        "Type": "BVT",
        "Enabled": true,
        "AutomationStatus": "Manual",
        "ManualSteps": "Please verify this test case manually until we have it automated.",
        "TestMethod": "TestRemoveAzSDKContinuousAssuranceNotExisting",
        "Description": "Remove command when CA account does not exist."
    },
    {
        "TestCaseID": "Test-Install-SecIntel-On-VS2015",
        "Priority": "1",
        "Feature": "SecurityIntellisense",
        "ModuleName": "SecIntel",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "",
        "ManualSteps": "Install the SecIntel extension on VS2015 and verify whether It installed properly or not.",
        "AutomationStatus": "Manual",
        "Description": "Install \u0027security Intellisense-Preview\u0027 extension on Visual Studio 2015."
    },
    {
        "TestCaseID": "Test-Install-SecIntel-On-VS2017",
        "Priority": "1",
        "Feature": "SecurityIntellisense",
        "ModuleName": "SecIntel",
        "Type": "BVT",
        "Enabled": false,
        "TestMethod": "",
        "ManualSteps": "Install the SecIntel extension on VS2017 and verify whether It installed properly or not.",
        "AutomationStatus": "Manual",
        "Description": "Install SecIntel extension from https://marketplace.visualstudio.com/items?itemName=AzSDKTeam.SecurityIntelliSense-Preview on Visual Studio 2017."
    },
    {
        "TestCaseID": "Test-InstallAzSDK-OSS",
        "Priority": "1",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestInstallAzSDKOSS",
        "ManualSteps": "Run command \u0027Install-Module AzSDK -Scope CurrentUser -AllowClobber\u0027. Verify if it installs OSS version of AzSDK.",
        "AutomationStatus": "Manual",
        "Description": "Verify the command successfully installs the AzSDK OSS version for a new user."
    },
    {
        "TestCaseID": "Test-InstallAzSDK-MSIT",
        "Priority": "1",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "BVT",
        "Enabled": true,
        "ManualSteps": "Run command \u0027iwr \u0027https://aka.ms/azsdk/install.ps1\u0027 -UseBasicParsing | iex\u0027. Verify if it installs MSIT version of AzSDK.",
        "AutomationStatus": "Manual",
        "TestMethod": "TestAzSDKMSITInstallation",
        "Description": "Verify the command successfully installs the AzSDK MSIT version for a new user."
    },
    {
        "TestCaseID": "Test-UpdateAzSDK",
        "Priority": "1",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "FVT",
        "Enabled": true,
        "ManualSteps": "Try installing AzSDK on a machine having an earlier version of AzSDK installed already. It should successfully install the newer version. ",
        "AutomationStatus": "Manual",
        "TestMethod": "TestUpdateAzSDK",
        "Description": "Verify if you are able to install the AzSDK successfully and required modules are installed on a machine having earlier version of AzSDK."
    },
    {
        "TestCaseID": "Test-InstallAzSDK-PreExisting-AzurePowershell",
        "Priority": "2",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "FVT",
        "Enabled": true,
        "ManualSteps": "Install Azure Powershell on your machine using the web platform installer. Then try instlling the AzSDK. Verify that it is able to install all the modules successfully.",
        "AutomationStatus": "Manual",
        "TestMethod": "TestInstallAzSDKMSIT",
        "Description": "Verify if you are able to install the AzSDK in case where system has pre-existing Azure Powershell modules which are installed via Web Platform Installer."
    },
    {
        "TestCaseID": "Test-UninstallAzSDK",
        "Priority": "2",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "FVT",
        "Enabled": true,
        "ManualSteps": "First have the AzSDK installed on your machine. Then run command \u0027Uninstall-Module AzSDK\u0027. Verify if removes all the AzSDK modules from your computer.",
        "AutomationStatus": "Manual",
        "TestMethod": "",
        "Description": "Verify if you are able to uninstall AzSDK successfully."
    },
    {
        "TestCaseID": "Test-InstallAzSDK-UnrestrictedPolicy",
        "Priority": "2",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "FVT",
        "Enabled": true,
        "ManualSteps": "Run command \u0027Set-ExecutionPolicy -ExecutionPolicy Unrestricted\u0027. Then run command \u0027Install-Module AzSDK -Scope CurrentUser -AllowClobber\u0027. Verify if it installs all the AzSDK modules successfully.",
        "AutomationStatus": "Manual",
        "TestMethod": "",
        "Description": "Verify if you are able to uninstall AzSDK successfully."
    },
    {
        "TestCaseID": "Test-InstallAzSDK-AzureRM38",
        "Priority": "2",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "FVT",
        "Enabled": true,
        "ManualSteps": "First install AzureRM version 3.8 on your machine. Then install AzSDK. Verify that it installs latest supported version of AzureRM along with AzSDK successfully.",
        "AutomationStatus": "Manual",
        "TestMethod": "",
        "Description": "Verify if you are able to install AzSDK successfully on a system having AzureRM version 3.8"
    },
    {
        "TestCaseID": "Test-InstallAzSDK-AzureRM41",
        "Priority": "2",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "FVT",
        "Enabled": true,
        "ManualSteps": "First install AzureRM version 4.1 on your machine. Then install AzSDK. Verify that it installs AzSDK successfully without installing the Azure RM again.",
        "AutomationStatus": "Manual",
        "TestMethod": "",
        "Description": "Verify if you are able to install AzSDK successfully on a system having AzureRM version 4.1"
    },
    {
        "TestCaseID": "Test-InstallAzSDK-AzureRM42",
        "Priority": "2",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "FVT",
        "Enabled": true,
        "ManualSteps": "First install AzureRM version 4.2 on your machine. Then install AzSDK. Verify that it installs Azure RM 4.1 along with AzSDK successfully.",
        "AutomationStatus": "Manual",
        "TestMethod": "",
        "Description": "Verify if you are able to install AzSDK successfully on a system having AzureRM version 4.2"
    },
    {
        "TestCaseID": "Test-InstallAzSDK-AllSignedPolicy",
        "Priority": "2",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "FVT",
        "Enabled": true,
        "ManualSteps": "Run command \u0027Set-ExecutionPolicy -ExecutionPolicy AllSigned\u0027. Then run command \u0027Install-Module AzSDK -Scope CurrentUser -AllowClobber\u0027. The dialogue should appear for changing policy to RemoteSigned. Verify that if the change is confirmed then it installs all the AzSDK modules successfully.",
        "AutomationStatus": "Manual",
        "TestMethod": "",
        "Description": "Verify if you are able to install AzSDK successfully on a system having execution policy set to AllSigned."
    },
    {
        "TestCaseID": "Test-InstallAzSDK-RemoteSignedPolicy",
        "Priority": "2",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "FVT",
        "Enabled": true,
        "ManualSteps": "Run command \u0027Set-ExecutionPolicy -ExecutionPolicy RemoteSigned\u0027. Then run command \u0027Install-Module AzSDK -Scope CurrentUser -AllowClobber\u0027. Verify that it installs all the AzSDK modules successfully without asking for change in policy.",
        "AutomationStatus": "Manual",
        "TestMethod": "",
        "Description": "Verify if you are able to install AzSDK successfully on a system having execution policy set to RemoteSigned."
    },
    {
        "TestCaseID": "Test-InstallAzSDK-Version230",
        "Priority": "2",
        "Feature": "Setup",
        "ModuleName": "Installation",
        "Type": "FVT",
        "Enabled": true,
        "ManualSteps": "Run command \u0027Install-Module AzSDK -RequiredVersion 2.3.0 -Scope CurrentUser\u0027. It should install AzSDK version 2.3.0. Then again run command \u0027Install-Module AzSDK -Scope CurrentUser\u0027. It should uninstall version 2.3.0 and install version 2.3.1",
        "AutomationStatus": "Manual",
        "TestMethod": "",
        "Description": "Verify if you are able to install AzSDK successfully on a system having AzSDK version 2.3.0 pre-installed."
    },
    {
        "TestCaseID": "Test-Get-AzSDKSubscriptionSecurityStatus-WithLogin",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSHealth",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestGetAzSDKSubscriptionSecurityStatus",
        "Description": "Command should run the subscription health scan without any error in case executed within active Azure session."
    },
    {
        "TestCaseID": "Test-Get-AzSDKSubscriptionSecurityStatus-WithControlIds",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSHealth",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestGetAzSDKSubscriptionSecurityStatusWithControlIds",
        "Description": "Command should run the subscription health scan without any error in case executed with control id parameter."
    },
    {
        "TestCaseID": "Test-Get-AzSDKSubscriptionSecurityStatus-Withoutlogin",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSHealth",
        "Type": "BVT",
        "AzureLoginRequired": false,
        "Enabled": true,
        "AutomationStatus": "Manual",
        "ManualSteps": "Logout from your Azure powershell session and then run command \u0027Get-AzSDKSubscriptionSecurityStatus -SubscriptionId \u003csubscriptionid\u003e\u0027. It should initialize the login workflow and then should scan the subscription successfully.",
        "TestMethod": "TestGetAzSDKSubscriptionSecurityStatus",
        "Description": "Command should run the subscription health scan without any error in case executed without logging into Azure."
    },
    {
        "TestCaseID": "Test-Get-AzSDKSubscriptionSecurityStatus-WithFilterTags",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSHealth",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestGetAzSDKSubscriptionSecurityStatusWithFilterTags",
        "Description": "Command should run the subscription health scan without any error in case executed with filter tags."
    },
    {
        "TestCaseID": "Test-Get-AzSDKSubscriptionSecurityStatus-WithExcludeTags",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSHealth",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestGetAzSDKSubscriptionSecurityStatusWithExcludeTags",
        "Description": "Command should run the subscription health scan without any error in case executed with exclude tags."
    },
    {
        "TestCaseID": "Test-Set-AzSDKSubscriptionSecurity-WithLogin",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSHealth",
        "Type": "BVT",
        "Enabled": true,
        "BaselineOutput": "",
        "TestMethod": "TestSetAzSDKSubscriptionSecurity",
        "Description": "Command should setup the subscription security without any error.",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_Subscription_Config_ARM_Policy",
                                     "ControlStatus": "Passed"
                                 },
                                 {
                                     "ControlID": "Azure_Subscription_Audit_Configure_Critical_Alerts",
                                     "ControlStatus": "Passed"
                                 },
                                 {
                                     "ControlID": "Azure_Subscription_Config_Azure_Security_Center",
                                     "ControlStatus": "Passed"
                                 },
                                 {
                                     "ControlID": "Azure_Subscription_AuthZ_Add_Required_Central_Accounts",
                                     "ControlStatus": "Passed"
                                 },
                                 {
                                     "ControlID": "Azure_Subscription_AuthZ_Remove_Deprecated_Accounts",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "Test-Set-AzSDKSubscriptionSecurity-WithoutLogin",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSHealth",
        "Type": "BVT",
        "Enabled": true,
        "AzureLoginRequired": false,
        "TestMethod": "TestSetAzSDKSubscriptionSecurity",
        "AutomationStatus": "Manual",
        "ManualSteps": "Logout from your Azure powershell session and then run command \u0027Set-AzSDKSubscriptionSecurity -SubscriptionId \u003csubscriptionid\u003e -SecurityContactEmails \u003cEmails\u003e -SecurityPhoneNumber \u003cPhoneNo\u003e\u0027. It should initialize the login workflow and then should set the subscription security successfully.",
        "Description": "Command should setup the subscription security without any error."
    },
    {
        "TestCaseID": "Test-Remove-AzSDKSubscriptionSecurity-WithLogin",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSHealth",
        "Type": "BVT",
        "Enabled": true,
        "TestMethod": "TestRemoveAzSDKSubscriptionSecurity",
        "Description": "Command should remove the subscription security without any error."
    },
    {
        "TestCaseID": "Test-Remove-AzSDKSubscriptionSecurity-WithoutLogin",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSHealth",
        "Type": "BVT",
        "Enabled": true,
        "AzureLoginRequired": false,
        "TestMethod": "TestRemoveAzSDKSubscriptionSecurity",
        "AutomationStatus": "Manual",
        "ManualSteps": "Logout from your Azure powershell session and then run command \u0027Remove-AzSDKSubscriptionSecurity -SubscriptionId \u003csubscriptionid\u003e -Tags \u003ctags\u003e. It should remove the subscription security successfully.\u0027",
        "Description": "Command should remove the subscription security without any error."
    },
    {
        "TestCaseID": "Test-Set-AzSDKAlerts",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSProvisioning",
        "Type": "BVT",
        "TestMethod": "TestSetAzSDKAlerts",
        "Description": "Set-AzSDKAlerts must register AzSDK alerts."
    },
    {
        "TestCaseID": "Test-Remove-AzSDKAlertsJustOne",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSProvisioning",
        "Type": "BVT",
        "TestMethod": "TestRemoveAzSDKAlertsJustOne",
        "Description": "Remove-AzSDKAlerts with alertName must remove just that alert."
    },
    {
        "TestCaseID": "Test-Remove-AzSDKAlerts",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSProvisioning",
        "Type": "BVT",
        "TestMethod": "TestRemoveAzSDKAlerts",
        "Description": "Remove-AzSDKAlerts must remove all AzSDK alerts"
    },
    {
        "TestCaseID": "Test-Set-AzSDKARMPolicies",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSProvisioning",
        "Type": "BVT",
        "TestMethod": "TestSetAzSDKARMPolicies",
        "Description": "Set-AzSDKARMPolicies must add AzSDK policies"
    },
    {
        "TestCaseID": "Test-Remove-AzSDKARMPolicies",
        "Priority": "1",
        "Feature": "SubscriptionSecurity",
        "ModuleName": "SSProvisioning",
        "Type": "BVT",
        "TestMethod": "TestRemoveAzSDKARMPolicies",
        "Description": "Remove-AzSDKARMPolicies must remove AzSDK policies"
    },
    {
        "TestCaseID": "TC_ADLA_PossiblePassed",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "ADLA",
        "ParamFileName": "",
        "Type": "BVT",
        "TemplateFileName": "",
        "BaselineOutput": "BaseControlStatus_ADLA_PossiblePassed.csv",
        "PresetMethods": "SetADLADiagnosticsOn",
        "Description": "Verify ADLA SVTs with encryption enabled on default ADLS, diagnostics turned on."
    },
    {
        "TestCaseID": "TC_ADLA_PossibleFailed",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "ADLA",
        "ParamFileName": "",
        "TemplateFileName": "",
        "Type": "FVT",
        "BaselineOutput": "BaseControlStatus_ADLA_PossibleFailed.csv",
        "PresetMethods": "",
        "ResetMethods": "",
        "Description": "Verify ADLA SVTs with encryption disabled on default ADLS, diagnostics turned off."
    },
    {
        "TestCaseID": "TC_ADLS_PossiblePassed",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "ADLS",
        "ParamFileName": "",
        "TemplateFileName": "",
        "BaselineOutput": "",
        "Type": "BVT",
        "PresetMethods": "SetDiagnosticsOn;EnableFirewall",
        "Description": "Verify SVTs on ADLS with proper diagnostics, firewall and encryption.",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_DataLakeStore_Audit_Enable_Diagnostics_Log",
                                     "ControlStatus": "Passed"
                                 },
                                 {
                                     "ControlID": "Azure_DataLakeStore_AuthZ_Enable_Firewall",
                                     "ControlStatus": "Passed"
                                 },
                                 {
                                     "ControlID": "Azure_DataLakeStore_DP_Encrypt_At_Rest",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_ADLS_PossibleFailed",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "ADLS",
        "ParamFileName": "",
        "TemplateFileName": "",
        "BaselineOutput": "",
        "PresetMethods": "",
        "Type": "FVT",
        "Description": "Verify SVTs on ADLS with diagnostics off, firewall disabled, encryption disabled",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_DataLakeStore_Audit_Enable_Diagnostics_Log",
                                     "ControlStatus": "Failed"
                                 },
                                 {
                                     "ControlID": "Azure_DataLakeStore_AuthZ_Enable_Firewall",
                                     "ControlStatus": "Failed"
                                 },
                                 {
                                     "ControlID": "Azure_DataLakeStore_DP_Encrypt_At_Rest",
                                     "ControlStatus": "Failed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_ADLS_PossibleVerify",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "ADLS",
        "ParamFileName": "",
        "TemplateFileName": "",
        "BaselineOutput": "",
        "Type": "FVT",
        "PresetMethods": "SetFirewallRule",
        "Description": "Verify SVTs on ADLS with firewal rule set.",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_DataLakeStore_AuthZ_Enable_Firewall",
                                     "ControlStatus": "Verify"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_AnalysisSvc_VerifyDefaultCompliance",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "AnalysisServices",
        "Enabled": true,
        "Type": "FVT",
        "ParamFileName": "Params_AnalysisSvc_Default.json",
        "TemplateFileName": "Template_AnalysisSvc_Default.json",
        "BaselineOutput": "BaseControlStatus_AnalysisSvc_DefaultCompliance.csv",
        "Description": "Verify SVTs on a security compliant for Blank Analysis Services Resource",
        "PresetMethods": "StartAnalysisServices"
    },
    {
        "TestCaseID": "TC_AnalysisSvc_Verify_2Admins_RBAC",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "AnalysisServices",
        "Enabled": true,
        "Type": "FVT",
        "ParamFileName": "Params_AnalysisSvc_Default.json",
        "TemplateFileName": "Template_AnalysisSvc_Default.json",
        "BaselineOutput": "BaseControlStatus_AnalysisSvc_2Admins_RBAC.csv",
        "PresetMethods": "AddTwoAnalysisServiceAdmin",
        "ResetMethods": "StartAnalysisServices;AddDefaultAnalysisServiceAdmin",
        "Description": "Verify SVTs on an analysis services with 2 admins and inherited RBAC access."
    },
    {
        "TestCaseID": "TC_AnalysisSvc_Verify_3Admins",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "AnalysisServices",
        "Enabled": true,
        "Type": "FVT",
        "ParamFileName": "Params_AnalysisSvc_Default.json",
        "TemplateFileName": "Template_AnalysisSvc_Default.json",
        "Description": "Verify Analysis Services Admin control check fails in case of no. of admins defined as 3",
        "PresetMethods": "AddThreeAnalysisServiceAdmin",
        "ResetMethods": "StartAnalysisServices;AddDefaultAnalysisServiceAdmin",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_AnalysisServices_AuthZ_Min_Admin",
                                     "ControlStatus": "Failed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_AnalysisSvc_Verify_PausedState",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "AnalysisServices",
        "Enabled": true,
        "Type": "FVT",
        "ParamFileName": "Params_AnalysisSvc_Default.json",
        "TemplateFileName": "Template_AnalysisSvc_Default.json",
        "Description": "Verify Analysis Services Admin control check in case of Analysis Services state is \u0027Paused\u0027",
        "PresetMethods": "PauseAnalysisServices",
        "ResetMethods": "StartAnalysisServices",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_AnalysisServices_AuthZ_Min_Admin",
                                     "ControlStatus": "Manual"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_AppSvc_Verify_All_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "AppService",
        "Enabled": false,
        "TemplateFileName": "Template_AppSvc_All_Compliant.json",
        "BaselineOutput": "BaseControlStatus_AppSvc_All_Compliant.csv",
        "Type": "FVT",
        "PresetMethods": "SetAppBackup;RemoveWebsiteLoadCertificates",
        "Description": "Verify SVTs on a compliant App Service. This will not verify custom domain, AAD and HTTPs redirect controls."
    },
    {
        "TestCaseID": "TC_AppSvc_Verify_All_Non_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "Enabled": false,
        "ModuleName": "AppService",
        "TemplateFileName": "Template_AppSvc_All_Non_Compliant.json",
        "BaselineOutput": "BaseControlStatus_AppSvc_All_Non_Compliant.csv",
        "Type": "FVT",
        "PresetMethods": "RemoveAppBackup;AddWebsiteLoadCertificates",
        "Description": "Verify SVTs on a non-compliant App Service."
    },
    {
        "TestCaseID": "TC_Batch_Verify_All_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "Batch",
        "TemplateFileName": "Template_Batch_All_Compliant.json",
        "BaselineOutput": "BaseControlStatus_Batch_All_Compliant.csv",
        "PresetMethods": "",
        "Type": "FVT",
        "Description": "Verify SVTs on a compliant Batch account."
    },
    {
        "TestCaseID": "TC_Batch_Verify_All_Non_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "Batch",
        "TemplateFileName": "Template_Batch_All_Non_Compliant.json",
        "BaselineOutput": "BaseControlStatus_Batch_All_Non_Compliant.csv",
        "PresetMethods": "",
        "Type": "FVT",
        "Description": "Verify SVTs on a non compliant Batch account."
    },
    {
        "TestCaseID": "TC_CDN_Verify_All_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "CDN",
        "Type": "FVT",
        "TemplateFileName": "Template_CDN_All_Compliant.json",
        "BaselineOutput": "BaseControlStatus_CDN_All_Compliant.csv",
        "PresetMethods": "",
        "ResetMethods": "",
        "Description": "Verify SVTs on a compliant CDN account."
    },
    {
        "TestCaseID": "TC_CDN_Verify_All_Non_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "Type": "FVT",
        "ModuleName": "CDN",
        "TemplateFileName": "Template_CDN_All_Non_Compliant.json",
        "BaselineOutput": "BaseControlStatus_CDN_All_Non_Compliant.csv",
        "PresetMethods": "",
        "ResetMethods": "",
        "Description": "Verify SVTs on a non compliant CDN account."
    },
    {
        "TestCaseID": "TC_DataFactory_Verify_LinkedSvc",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "DataFactory",
        "BaselineOutput": "BaseControlStatus_DataFactory_LinkedSvc.csv",
        "PresetMethods": "SetLinkedService",
        "Type": "FVT",
        "Description": "Verify SVTs on a Data Factory having linked services with secured connection strings."
    },
    {
        "TestCaseID": "TC_DataFactory_Verify_NoLinkedSvc",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "DataFactory",
        "Enabled": false,
        "BaselineOutput": "BaseControlStatus_DataFactory_NoLinkedSvc.csv",
        "PresetMethods": "RemoveLinkedService",
        "Type": "FVT",
        "Description": "Verify SVTs on a Data Factory having no linked services."
    },
    {
        "TestCaseID": "TC_EventHub_Verify_EH_Policies",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "EventHub",
        "BaselineOutput": "BaseControlStatus_EventHub_EH_Policies.csv",
        "PresetMethods": "AddEventHubAccessPolicies",
        "Type": "FVT",
        "Description": "Verify SVTs on a Event Hub having access policies at Event Hub level."
    },
    {
        "TestCaseID": "TC_EventHub_Verify_EH_No_Policies",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "EventHub",
        "BaselineOutput": "BaseControlStatus_EventHub_EH_No_Policies.csv",
        "PresetMethods": "RemoveEventHubAccessPolicies",
        "Type": "FVT",
        "Description": "Verify SVTs on a Event Hub having no access policies at Event Hub level."
    },
    {
        "TestCaseID": "TC_Functions_Verify_All_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "Functions",
        "Enabled": true,
        "TemplateFileName": "Template_TC_Functions_Possible_Passed.json",
        "BaselineOutput": "BaseControlStatus_Functions_Possible_Passed.csv",
        "Type": "FVT",
        "PresetMethods": "ChangeFunctionsEditMode",
        "Description": "Verify SVTs on a compliant Azure Functions service. This will not verify custom domain and AAD related controls."
    },
    {
        "TestCaseID": "TC_Functions_Verify_All_NonCompliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "Functions",
        "Enabled": true,
        "TemplateFileName": "Template_TC_Functions_Possible_Failed.json",
        "BaselineOutput": "BaseControlStatus_Functions_Possible_Failed.csv",
        "Type": "FVT",
        "PresetMethods": "AddWebsiteLoadCertificates",
        "Description": "Verify SVTs on a non-compliant Azure Functions service. This will not verify custom domain, AAD related and function authorization level controls."
    },
    {
        "TestCaseID": "TC_KeyVault_Verify_DefaultCompliance",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "KeyVault",
        "Enabled": false,
        "ParamFileName": "Params_KeyVault_DefaultCompliance.json",
        "TemplateFileName": "Template_KeyVault_DefaultCompliance.json",
        "BaselineOutput": "BaseControlStatus_KeyVault_DefaultCompliance.csv",
        "Description": "Verify SVTs on a default KeyVault Resource",
        "Type": "FVT",
        "PresetMethods": "GetReadAcessOnKey"
    },
    {
        "TestCaseID": "TC_KeyVault_Verify_Diagnostics_Log_On",
        "Priority": "1",
        "Feature": "SVT",
        "Enabled": false,
        "ModuleName": "KeyVault",
        "ParamFileName": "Params_KeyVault_DefaultCompliance.json",
        "TemplateFileName": "Template_KeyVault_DefaultCompliance.json",
        "BaselineOutput": "BaseControlStatus_KeyVault_DefaultCompliance.csv",
        "Description": "Verify SVT on KeyVault Resource for Daignostics settings",
        "PresetMethods": "SetKVDiagnosticsOn",
        "ResetMethods": "SetKVDiagnosticsOff",
        "Type": "FVT",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_KeyVault_Audit_Enable_Diagnostics_Log",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_KeyVault_Verify_AdvancedAccessPolicies_AllEnabled",
        "Priority": "1",
        "Feature": "SVT",
        "Enabled": false,
        "ModuleName": "KeyVault",
        "ParamFileName": "Params_KeyVault_DefaultCompliance.json",
        "TemplateFileName": "Template_KeyVault_DefaultCompliance.json",
        "BaselineOutput": "BaseControlStatus_KeyVault_DefaultCompliance.csv",
        "Description": "Verify SVT on KeyVault Resource for Advanced Access Policies all enabled",
        "PresetMethods": "SetAllAdvanceAcessPolicies",
        "ResetMethods": "ResetAllAdvanceAcessPolicies",
        "Type": "FVT",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_KeyVault_AuthZ_Configure_Advanced_Access_Policies",
                                     "ControlStatus": "Failed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_KeyVault_Verify_AccessPolicies_AllEnabled",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "KeyVault",
        "Enabled": false,
        "ParamFileName": "Params_KeyVault_DefaultCompliance.json",
        "TemplateFileName": "Template_KeyVault_DefaultCompliance.json",
        "BaselineOutput": "BaseControlStatus_KeyVault_DefaultCompliance.csv",
        "Description": "Verify SVT on KeyVault Resource for Access Policies all enabled",
        "PresetMethods": "SetAllAcessPolicies",
        "ResetMethods": "ResetAllAcessPolicies",
        "Type": "FVT",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_KeyVault_AuthZ_Grant_Min_Access_policies",
                                     "ControlStatus": "Failed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_KeyVault_Verify_NonHSMKeyWithExpiryDate",
        "Priority": "1",
        "Feature": "SVT",
        "Enabled": false,
        "ModuleName": "KeyVault",
        "ParamFileName": "Params_KeyVault_DefaultCompliance.json",
        "TemplateFileName": "Template_KeyVault_DefaultCompliance.json",
        "BaselineOutput": "BaseControlStatus_KeyVault_DefaultCompliance.csv",
        "Description": "Verify SVT on KeyVault Resource for non HSM keys with expiry date",
        "PresetMethods": "AddNonHSMKeyWithExpiryDate",
        "Type": "FVT",
        "ResetMethods": "RemoveResource",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_KeyVault_DP_Keys_Protect_By_HSM",
                                     "ControlStatus": "Failed"
                                 },
                                 {
                                     "ControlID": "Azure_KeyVault_DP_Keys_Secrets_Set_Expiry_Date",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_KeyVault_Verify_SVTs_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "KeyVault",
        "ParamFileName": "Params_TC_KeyVault_Compliant.json",
        "TemplateFileName": "Template_TC_KeyVault_Compliant.json",
        "BaselineOutput": "BaseControlStatus_TC_KeyVault_Compliant.csv",
        "Description": "Verify SVTs on a security compliant KeyVault.",
        "PresetMethods": "GetReadAcessOnKey;SetKVDiagnosticsOn",
        "Type": "FVT",
        "Enabled": false,
        "ResetMethods": "RemoveResource"
    },
    {
        "TestCaseID": "TC_LoadBalancer_Verify_PublicIP",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "LoadBalancer",
        "BaselineOutput": "BaseControlStatus_LoadBalancer_Public_IP.csv",
        "PresetMethods": "AddPublicIpAddress",
        "Type": "FVT",
        "Description": "Verify SVT on a Load Balancer having access public IP."
    },
    {
        "TestCaseID": "TC_LoadBalancer_Verify_No_PublicIP",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "LoadBalancer",
        "BaselineOutput": "BaseControlStatus_LoadBalancer_No_Public_IP.csv",
        "PresetMethods": "RemovePublicIpAddress",
        "Type": "FVT",
        "Description": "Verify SVTs on a Load Balancer having no public IP."
    },
    {
        "TestCaseID": "TC_LogicApps_PossiblePassed",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "LogicApps",
        "ParamFileName": "Params_LogicApps_Default.json",
        "TemplateFileName": "Template_LogicApps_Default.json",
        "BaselineOutput": "",
        "PresetMethods": "SetLogicAppDiagnosticsOn",
        "ResetMethods": "SetLogicAppDiagnosticsOff",
        "Type": "FVT",
        "Description": "Verify Logic apps SVTs with diagnostics turned on and access control configured.",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_LogicApps_Audit_Enable_Diagnostics_Log",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_LogicApps_PossibleFailed",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "LogicApps",
        "ParamFileName": "Params_LogicApps_Default.json",
        "TemplateFileName": "Template_LogicApps_Default.json",
        "BaselineOutput": "",
        "PresetMethods": "SetLogicAppInvalidAccessControl;SetLogicAppDiagnosticsOff",
        "ResetMethods": "RemoveLogicAppAccessControl",
        "Type": "FVT",
        "Description": "Verify Logic apps SVTs with diagnostics,access control off/any to any rule.",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_LogicApps_Audit_Enable_diagnostics_Log",
                                     "ControlStatus": "Failed"
                                 },
                                 {
                                     "ControlID": "Azure_LogicApps_AuthZ_Provide_Triggers_Access_Control",
                                     "ControlStatus": "Failed"
                                 },
                                 {
                                     "ControlID": "Azure_LogicApps_AuthZ_Provide_Contents_Access_Control",
                                     "ControlStatus": "Failed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_LogicApps_PossibleVerify",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "LogicApps",
        "ParamFileName": "Params_LogicApps_Default.json",
        "TemplateFileName": "Template_LogicApps_Default.json",
        "BaselineOutput": "",
        "PresetMethods": "SetLogicAppValidAccessControl",
        "ResetMethods": "RemoveLogicAppAccessControl",
        "Type": "FVT",
        "Description": "Verify Logic apps SVTs with diagnostics turned on and access control configured.",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_LogicApps_AuthZ_Provide_Triggers_Access_Control",
                                     "ControlStatus": "Verify"
                                 },
                                 {
                                     "ControlID": "Azure_LogicApps_AuthZ_Provide_Contents_Access_Control",
                                     "ControlStatus": "Verify"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_NotificationHub_AllPassed",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "NotificationHub",
        "ParamFileName": "Params_TC_NotificationHub.json",
        "TemplateFileName": "Template_TC_NotificationHub.json",
        "BaselineOutput": "BaseControlStatus_NotificationHub_PossiblePassed.csv",
        "PresetMethods": "RemoveDefaultNotificationPolicy",
        "ResetMethods": "RemoveNotificationHubResource",
        "Type": "FVT",
        "Description": "Verify SVTs on a security compliant Notification Hub resource."
    },
    {
        "TestCaseID": "TC_NotificationHub_AllFailed",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "NotificationHub",
        "ParamFileName": "Params_TC_NotificationHub.json",
        "TemplateFileName": "Template_TC_NotificationHub.json",
        "BaselineOutput": "BaseControlStatus_NotificationHub_PossibleFailed.csv",
        "Enabled": false,
        "PresetMethods": "",
        "ResetMethods": "RemoveNotificationHubResource",
        "Type": "FVT",
        "Description": "Verify SVTs on a security non-compliant Notification Hub resource."
    },
    {
        "TestCaseID": "TC_RedisCache_VerifyDefaultCompliance",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "RedisCache",
        "Enabled": true,
        "Type": "FVT",
        "ParamFileName": "Params_RedisCache_Default.json",
        "TemplateFileName": "Template_RedisCache_Default.json",
        "BaselineOutput": "BaseControlStatus_RedisCache_DefaultCompliance.csv",
        "Description": "Verify SVTs on a security compliant for Blank Premium Redis Cache",
        "PresetMethods": ""
    },
    {
        "TestCaseID": "TC_RedisCache_NonSSLPortCheck",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "RedisCache",
        "Enabled": true,
        "Type": "FVT",
        "ParamFileName": "Params_RedisCache_Default.json",
        "TemplateFileName": "Template_RedisCache_Default.json",
        "BaselineOutput": "BaseControlStatus_RedisCache_DefaultCompliance.csv",
        "Description": "Verify Analysis Non-SSL control check fails in case of Non-SSL port is enabled",
        "PresetMethods": "EnableNonSSLPort",
        "ResetMethods": "DisableNonSSLPort",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_RedisCache_DP_Use_SSL_Port",
                                     "ControlStatus": "Failed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_RedisCache_VerifyBackUpEnabled",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "RedisCache",
        "Enabled": true,
        "Type": "FVT",
        "ParamFileName": "Params_RedisCache_Default.json",
        "TemplateFileName": "Template_RedisCache_Default.json",
        "BaselineOutput": "BaseControlStatus_RedisCache_DefaultCompliance.csv",
        "Description": "Verify Redis Cache Back up is enabled",
        "PresetMethods": "EnableRedisBackUp",
        "ResetMethods": "DisableRedisBackUp",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_RedisCache_BCDR_Use_RDB_Backup",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_Search_Verify_All_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "Search",
        "TemplateFileName": "Template_Search_All_Compliant.json",
        "BaselineOutput": "BaseControlStatus_Search_All_Compliant.csv",
        "PresetMethods": "",
        "Type": "BVT",
        "Description": "Verify SVTs on a compliant Search service."
    },
    {
        "TestCaseID": "TC_Search_Verify_All_Non_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "Search",
        "TemplateFileName": "Template_Search_All_Non_Compliant.json",
        "BaselineOutput": "BaseControlStatus_Search_All_Non_Compliant.csv",
        "PresetMethods": "",
        "Type": "FVT",
        "Description": "Verify SVTs on a non compliant Search service."
    },
    {
        "TestCaseID": "TC_ServiceBus_Verify_Queue_Policies",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "ServiceBus",
        "BaselineOutput": "BaseControlStatus_ServiceBus_Queue_Policies.csv",
        "PresetMethods": "AddQueueAccessPolicies",
        "Type": "FVT",
        "Description": "Verify SVTs on a Service Bus having access policies on Queue."
    },
    {
        "TestCaseID": "TC_ServiceBus_Verify_Queue_No_Policies",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "ServiceBus",
        "BaselineOutput": "BaseControlStatus_ServiceBus_Queue_No_Policies.csv",
        "PresetMethods": "RemoveQueueAccessPolicies",
        "Type": "FVT",
        "Description": "Verify SVTs on a Service Bus having no access policies in Queue."
    },
    {
        "TestCaseID": "TC_SQLDB_Verify_DefaultCompliance",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SQLDB",
        "ParamFileName": "Params_SQLDB_DefaultCompliance.json",
        "TemplateFileName": "Template_SQLDB_DefaultCompliance.json",
        "BaselineOutput": "BaseControlStatus_SQLDB_DefaultCompliance.csv",
        "Enabled": false,
        "Type": "FVT",
        "Description": "Verify SQL Server SVT on a default SQLDB Resource"
    },
    {
        "TestCaseID": "TC_SQLDB_Verify_SqlServerAuditing",
        "Priority": "1",
        "Feature": "SVT",
        "Enabled": false,
        "ModuleName": "SQLDB",
        "ParamFileName": "Params_SQLDB_DefaultCompliance.json",
        "TemplateFileName": "Template_SQLDB_DefaultCompliance.json",
        "BaselineOutput": "",
        "Description": "Verify SQL Server SVT on a Sql Server Auditing enaled",
        "PresetMethods": "EnableSqlServerAuditing",
        "ResetMethods": "DisableSqlServerAuditing",
        "Type": "FVT",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_SQLDatabase_Audit_Enable_Logging_and_Monitoring_Server",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_SQLDB_Verify_SqlServerThreatDetectionPolicy",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SQLDB",
        "Enabled": false,
        "ParamFileName": "Params_SQLDB_DefaultCompliance.json",
        "TemplateFileName": "Template_SQLDB_DefaultCompliance.json",
        "BaselineOutput": "",
        "Description": "Verify SQL Server SVT on a Sql Server Threat Detection Policy enaled",
        "PresetMethods": "EnableSqlServerThreatDetectionPolicy",
        "ResetMethods": "DisableSqlServerThreatDetectionPolicy",
        "Type": "FVT",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_SQLDatabase_Audit_Enable_Threat_Detection_Server",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_SQLDB_Verify_SqlServerActiveDirectoryAdmin",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SQLDB",
        "Enabled": false,
        "ParamFileName": "Params_SQLDB_DefaultCompliance.json",
        "TemplateFileName": "Template_SQLDB_DefaultCompliance.json",
        "BaselineOutput": "",
        "Description": "Verify SQL Server SVT on a Sql Server Active Directory Administrator(s) present",
        "PresetMethods": "SetSqlServerActiveDirectoryAdmin",
        "ResetMethods": "RemoveSqlServerActiveDirectoryAdmin",
        "Type": "FVT",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_SQLDatabase_AuthZ_Use_AAD_Admin",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_SQLDB_Verify_FirewallIPAddressRanges",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SQLDB",
        "Enabled": false,
        "ParamFileName": "Params_SQLDB_DefaultCompliance.json",
        "TemplateFileName": "Template_SQLDB_DefaultCompliance.json",
        "BaselineOutput": "",
        "Description": "Verify SQL Server SVT on a Sql Server Firewall IP Address Ranges",
        "PresetMethods": "SetSqlServerFirewallIPAddressRanges",
        "ResetMethods": "RemoveSqlServerFirewallIPAddressRanges",
        "Type": "FVT",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_SQLDatabase_AuthZ_Enable_Firewall",
                                     "ControlStatus": "Passed"
                                 },
                                 {
                                     "ControlID": "Azure_SQLDatabase_AuthZ_Configure_IP_Range",
                                     "ControlStatus": "Verify"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_SQLDB_Verify_AnytoAnyFirewallRule",
        "Priority": "1",
        "Feature": "SVT",
        "Enabled": false,
        "ModuleName": "SQLDB",
        "ParamFileName": "Params_SQLDB_DefaultCompliance.json",
        "TemplateFileName": "Template_SQLDB_DefaultCompliance.json",
        "BaselineOutput": "",
        "Description": "Verify SQL Server SVT on a Sql Server Any to Any FirewallRule",
        "PresetMethods": "SetSqlServerAnyToAnyFirewallRule",
        "ResetMethods": "RemoveSqlServerAnyToAnyFirewallRule",
        "Type": "FVT",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_SQLDatabase_AuthZ_Enable_Firewall",
                                     "ControlStatus": "Passed"
                                 },
                                 {
                                     "ControlID": "Azure_SQLDatabase_AuthZ_Configure_IP_Range",
                                     "ControlStatus": "Failed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_SQLDB_Verify_SingleDB",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SQLDB",
        "Enabled": false,
        "ParamFileName": "Params_SQLDB_DefaultCompliance.json",
        "TemplateFileName": "Template_SQLDB_DefaultCompliance.json",
        "BaselineOutput": "",
        "Description": "Verify SQL Server SVT\u0027s on a Sql Server contains single database with Auditing,Threat Detection Policy setting is inherited from parent sql server",
        "PresetMethods": "AddDataBase;EnableSqlServerAuditing;EnableSqlServerThreatDetectionPolicy",
        "ResetMethods": "RemoveDatabase;DisableSqlServerAuditing;DisableSqlServerThreatDetectionPolicy",
        "Type": "FVT",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_SQLDatabase_Audit_Enable_Logging_and_Monitoring_DB",
                                     "ControlStatus": "Passed"
                                 },
                                 {
                                     "ControlID": "Azure_SQLDatabase_Audit_Enable_Threat_Detection_Server",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_SQLDB_Verify_DBTransparentDataEncryption",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SQLDB",
        "Enabled": false,
        "ParamFileName": "Params_SQLDB_DefaultCompliance.json",
        "TemplateFileName": "Template_SQLDB_DefaultCompliance.json",
        "BaselineOutput": "",
        "Description": "Verify SQL Server SVT on a Transparent Data Encryption for database present inside sql server",
        "PresetMethods": "AddDataBase;EnableSqlDatabaseTransparentDataEncryption",
        "ResetMethods": "RemoveDatabase;DisableSqlServerAuditing;DisableSqlServerThreatDetectionPolicy",
        "Type": "FVT",
        "ControlResultSet": [
                                 {
                                     "ControlID": "Azure_SQLDatabase_DP_Enable_TDE",
                                     "ControlStatus": "Passed"
                                 }
                             ]
    },
    {
        "TestCaseID": "TC_Storage_Verify_DefaultCompliance",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "Storage",
        "ParamFileName": "Params_Storage_DefaultCompliance.json",
        "TemplateFileName": "Template_Storage_DefaultCompliance.json",
        "BaselineOutput": "BaseControlStatus_Storage_DefaultCompliance.csv",
        "PresetMethods": "RemoveAzSDKTestStorageContainer;RemoveAzSDKTestStorageAlerts",
        "Type": "FVT",
        "Description": "Verify SVTs on a default Storage Resource"
    },
    {
        "TestCaseID": "TC_Storage_Verify_Non_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "Storage",
        "ParamFileName": "Params_Storage_DefaultCompliance.json",
        "TemplateFileName": "Template_Storage_DefaultCompliance.json",
        "BaselineOutput": "BaseControlStatus_Storage_Non_Compliant.csv",
        "Description": "Verify SVTs on a storage with diagnostics off, alerts not configured, storage encryption disabled and account type is not Geo-Reundant",
        "PresetMethods": "AddContainerWithPublicAcess",
        "Type": "FVT",
        "ResetMethods": "RemoveAzSDKTestStorageContainer"
    },
    {
        "TestCaseID": "TC_Storage_Verify_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "Storage",
        "ParamFileName": "Params_TC_Storage_StdGRS_Encyption_On.json",
        "TemplateFileName": "Template_Storage_DefaultCompliance.json",
        "BaselineOutput": "BaseControlStatus_Storage_Compliant.csv",
        "Description": "Verify SVTs on a storage with diagnostics on, alerts configured, storage encryption enabled and account type is Geo-Reundant",
        "PresetMethods": "SetStorageDiagnisticsOn;AddAzSDKTestStorageAlerts;SetFileEncryptionAtRest;SetEnableHttpsTrafficOnly",
        "Type": "FVT",
        "ResetMethods": "RemoveAzSDKTestStorageContainer;RemoveAzSDKTestStorageAlerts"
    },
    {
        "TestCaseID": "Test_SVTWithoutLogin",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SVTCommon",
        "Type": "BVT",
        "Description": "Run \u0027Get-AzSDKAzureServicesSecurityStatus\u0027 command without login",
        "Enabled": "True",
        "TestMethod": "TestSVTWithoutLogin"
    },
    {
        "TestCaseID": "Test_SVTWithLogin_OSS_LeastParams",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SVTCommon",
        "Type": "BVT",
        "Description": "Run \u0027Get-AzSDKAzureServicesSecurityStatus\u0027 command with OSS settings with only mandatory parameters",
        "Enabled": "True",
        "TestMethod": "TestSVTWithLoginOSSLeastParams"
    },
    {
        "TestCaseID": "Test_SVTWithLogin_MSIT_LeastParams",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SVTCommon",
        "Type": "BVT",
        "Description": "Run \u0027Get-AzSDKAzureServicesSecurityStatus\u0027 command with MSIT settings with only mandatory parameters",
        "Enabled": "True",
        "TestMethod": "TestSVTWithLoginMSITLeastParams"
    },
    {
        "TestCaseID": "Test_SVTWithLogin_OSS_TagParamsSet",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SVTCommon",
        "Type": "BVT",
        "Description": "Run \u0027Get-AzSDKAzureServicesSecurityStatus\u0027 command with OSS settings with Tag parameter set",
        "Enabled": "True",
        "TestMethod": "TestSVTWithLoginOSSTagParamsSet"
    },
    {
        "TestCaseID": "Test_SVTWithLogin_OSS_ResourceParamsSet",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SVTCommon",
        "Type": "BVT",
        "Description": "Run \u0027Get-AzSDKAzureServicesSecurityStatus\u0027 command with OSS settings with resource filter parameters",
        "Enabled": false,
        "TestMethod": "TestSVTWithLoginOSSResourceParamsSet"
    },
    {
        "TestCaseID": "Test_SVTSubscriptionCoreCommonCommand",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SVTCommon",
        "Type": "BVT",
        "Description": "Run \u0027Get-AzSDKControlsStatus\u0027 command with OSS settings with resource filter parameters",
        "Enabled": false,
        "TestMethod": "TestSVTSubscriptionCoreCommonCommand"
    },
    {
        "TestCaseID": "Test_SetOnlinePolicy",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SVTCommon",
        "Type": "BVT",
        "Description": "Run \u0027Set-AzSDKPolicySettings\u0027 to check if online policy is set successfully",
        "Enabled": "True",
        "TestMethod": "TestSetOnlinePolicy"
    },
    {
        "TestCaseID": "Test_DisableOnlinePolicy",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "SVTCommon",
        "Type": "BVT",
        "Description": "Run \u0027Set-AzSDKPolicySettings\u0027 to check if online policy is getting disabled successfully",
        "Enabled": "True",
        "TestMethod": "TestDisableOnlinePolicy"
    },
    {
        "TestCaseID": "TC_TrafficManager_Verify_All_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "Type": "BVT",
        "ModuleName": "TrafficManager",
        "TemplateFileName": "Template_TrafficManager_All_Compliant.json",
        "BaselineOutput": "BaseControlStatus_TrafficManager_All_Compliant.csv",
        "PresetMethods": "",
        "ResetMethods": "",
        "Description": "Verify SVTs on a compliant Traffic Manager Profile."
    },
    {
        "TestCaseID": "TC_TrafficManager_Verify_All_Non_Compliant",
        "Priority": "1",
        "Feature": "SVT",
        "Type": "FVT",
        "ModuleName": "TrafficManager",
        "TemplateFileName": "Template_TrafficManager_All_Non_Compliant.json",
        "BaselineOutput": "BaseControlStatus_TrafficManager_All_Non_Compliant.csv",
        "PresetMethods": "",
        "ResetMethods": "",
        "Description": "Verify SVTs on a non compliant Traffic Manager Profile."
    },
    {
        "TestCaseID": "TC_VirtualMachine_01",
        "Enabled": false,
        "Priority": "0",
        "Feature": "SVT",
        "ModuleName": "VirtualMachine",
        "ParamFileName": "",
        "TemplateFileName": "",
        "BaselineOutput": "",
        "Type": "FVT",
        "Description": ""
    },
    {
        "TestCaseID": "TC_VirtualNetwork_WithoutPeering",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "VirtualNetwork",
        "BaselineOutput": "BaseControlStatus_VirtualNetwork_WithoutPeer.csv",
        "PresetMethods": "ResetConfigurationBase",
        "Type": "FVT",
        "Description": "Verify SVTs on a Virtual Network without peering."
    },
    {
        "TestCaseID": "TC_VirtualNetwork_WithPeering",
        "Priority": "1",
        "Feature": "SVT",
        "ModuleName": "VirtualNetwork",
        "BaselineOutput": "BaseControlStatus_VirtualNetwork_WithPeer.csv",
        "PresetMethods": "AddVnetPeer",
        "Type": "FVT",
        "Description": "Verify SVTs on a Virtual Network with peering."
    }
]