<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Restrict Service Connection Access Based on User Group? in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/restrict-service-connection-access-based-on-user-group/m-p/565617#M619</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a quick question that I haven't been able to find a definitive answer to.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Background:&lt;BR /&gt;My users are 100% remote.&amp;nbsp; We have a Prisma SASE instance that we use for remote user access.&amp;nbsp; In this SASE instance, we have a service connection that connects to our Azure tenant via Azure Virtual Network Gateway.&amp;nbsp; We currently have 3 vNets that everyone can access in a "hub and spoke" formation (one central vNet with the VNG, the 2 spoke vNets each paired with only the hub vNet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a need to add a 3rd vNet "spoke" for another division of our company that we want to keep separate from a subset of our mobile user population.&amp;nbsp; Is there a way to configure Prisma SASE in such a way to only allow access to the "hub" vnet and the new "spoke" vNet based on criteria like username?&amp;nbsp; We are using Azure Active Directory for VPN authentication, and have tied in Azure AD into Cloud Identity Engine for username and group membership information.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Nov 2023 15:36:05 GMT</pubDate>
    <dc:creator>JMay21</dc:creator>
    <dc:date>2023-11-14T15:36:05Z</dc:date>
    <item>
      <title>Restrict Service Connection Access Based on User Group?</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/restrict-service-connection-access-based-on-user-group/m-p/565617#M619</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a quick question that I haven't been able to find a definitive answer to.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Background:&lt;BR /&gt;My users are 100% remote.&amp;nbsp; We have a Prisma SASE instance that we use for remote user access.&amp;nbsp; In this SASE instance, we have a service connection that connects to our Azure tenant via Azure Virtual Network Gateway.&amp;nbsp; We currently have 3 vNets that everyone can access in a "hub and spoke" formation (one central vNet with the VNG, the 2 spoke vNets each paired with only the hub vNet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a need to add a 3rd vNet "spoke" for another division of our company that we want to keep separate from a subset of our mobile user population.&amp;nbsp; Is there a way to configure Prisma SASE in such a way to only allow access to the "hub" vnet and the new "spoke" vNet based on criteria like username?&amp;nbsp; We are using Azure Active Directory for VPN authentication, and have tied in Azure AD into Cloud Identity Engine for username and group membership information.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 15:36:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/restrict-service-connection-access-based-on-user-group/m-p/565617#M619</guid>
      <dc:creator>JMay21</dc:creator>
      <dc:date>2023-11-14T15:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Service Connection Access Based on User Group?</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/restrict-service-connection-access-based-on-user-group/m-p/570137#M644</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/333254"&gt;@JMay21&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;First of all, security policies cannot be applied to Service Connection, so these controls must be applied at the Mobile Users' Gateway.&lt;BR /&gt;Since the authentication of Mobile Users means that Azure AD is used, the users who are allowed to access resources in each VNet are controlled using Security Groups in Azure AD. In addition, the destination VNet would need to be divided by network address and designated as a destination in a security rule. Specifically, I would take the following steps.&lt;/P&gt;
&lt;P&gt;1. create a group in Azure AD with the unit to which you want to restrict access to resources (e.g., Unit-X, Division-Y)&lt;/P&gt;
&lt;P&gt;2. configure a network address for each VNet unit (e.g. X-VNet-192.168.0.0_24)&lt;/P&gt;
&lt;P&gt;3. create rules such as the following (these are only minimum parameters; destinations and services should be limited to the minimum necessary to mitigate security threats) All rules to VNet that were not previously restricted should also be reviewed.&lt;BR /&gt;Src Zone: trust&lt;BR /&gt;Src User: Unit-X&lt;BR /&gt;Dst Zone: trust&lt;BR /&gt;Dst Address: X-VNet-192.168.0.0_24&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;4. communication from Mobile Users to Service Connection that does not match 3 above will be denied by matching the interzone-default rule, but since it is not logged by default, it is recommended that logging be enabled.&lt;/P&gt;
&lt;P&gt;5. In addition, you may want to include the following rule for communications between terminals connected by GlobalProtect, if you do not need to allow them. This is effective in preventing lateral movement&amp;nbsp; between terminals. Without this rule, the default is to match the intrazone-default rule and allow communication without logging.&lt;BR /&gt;Src Zone: trust&lt;BR /&gt;Src User: GlobalProtect-IP-Pool&lt;BR /&gt;Dst Zone: trust&lt;BR /&gt;Dst Address: GlobalProtect-IP-Pool&lt;BR /&gt;Action: deny&lt;/P&gt;</description>
      <pubDate>Sat, 16 Dec 2023 04:40:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/restrict-service-connection-access-based-on-user-group/m-p/570137#M644</guid>
      <dc:creator>Yusuke_Tahara</dc:creator>
      <dc:date>2023-12-16T04:40:34Z</dc:date>
    </item>
  </channel>
</rss>

