<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Network Isolation via Auto Remediation Alert Rule in Prisma Cloud Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/network-isolation-via-auto-remediation-alert-rule/m-p/352073#M321</link>
    <description>&lt;P&gt;Hi&amp;nbsp;@Retired Member&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can run the RQL to find all "Internet exposed instances" where talking with&amp;nbsp;&lt;SPAN&gt;Suspicious IPs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;NETWORK WHERE src.publicnetwork IN ('Suspicious IPs','Internet IPs') AND dest.resource IN ( resource where role not in ( 'AWS NAT Gateway' , 'AWS ELB' ) ) and protocol not in ( 'ICMP' , 'ICMP6' )&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The problem is that Auto-remediation is not supported for Network and audit policies only for config policies.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But maybe you can do something like this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;RQL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;config where cloud.type = 'aws' AND api.name='aws-ec2-describe-images' AND json.rule='image.public is true'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remediation:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aws ec2 --region ${region} modify-image-attribute --image-id ${resourceId} --launch-permission "{\"Remove\": [{\"Group\":\"all\"}]}"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I hope i could help you a bit with that&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Torsten&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 25 Sep 2020 08:45:51 GMT</pubDate>
    <dc:creator>tostern</dc:creator>
    <dc:date>2020-09-25T08:45:51Z</dc:date>
    <item>
      <title>Network Isolation via Auto Remediation Alert Rule</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/network-isolation-via-auto-remediation-alert-rule/m-p/345878#M296</link>
      <description>&lt;P&gt;Is it possible to build an RQL query to look at a certain host and determine if it is talking to a suspicious IP address and create an auto-remediation rule that restricts the host traffic and isolates it so it is no longer talking to the suspicious IP or the internet at all?&amp;nbsp; Looking at the video for creation of a custom remediation policy this looks to be possible but I need some ideas to build the query.&amp;nbsp; If that is not an option are there any integrations or ways that we can create an isolation policy for hosts in the cloud or on prem to not talk to those suspicious IPs?&amp;nbsp; Either with the CSPM side of Prisma Cloud Enterprise Edition or Prisma Cloud Compute tab?&amp;nbsp; Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Sep 2020 17:42:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/network-isolation-via-auto-remediation-alert-rule/m-p/345878#M296</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-09-02T17:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: Network Isolation via Auto Remediation Alert Rule</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/network-isolation-via-auto-remediation-alert-rule/m-p/352073#M321</link>
      <description>&lt;P&gt;Hi&amp;nbsp;@Retired Member&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can run the RQL to find all "Internet exposed instances" where talking with&amp;nbsp;&lt;SPAN&gt;Suspicious IPs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;NETWORK WHERE src.publicnetwork IN ('Suspicious IPs','Internet IPs') AND dest.resource IN ( resource where role not in ( 'AWS NAT Gateway' , 'AWS ELB' ) ) and protocol not in ( 'ICMP' , 'ICMP6' )&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The problem is that Auto-remediation is not supported for Network and audit policies only for config policies.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But maybe you can do something like this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;RQL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;config where cloud.type = 'aws' AND api.name='aws-ec2-describe-images' AND json.rule='image.public is true'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remediation:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aws ec2 --region ${region} modify-image-attribute --image-id ${resourceId} --launch-permission "{\"Remove\": [{\"Group\":\"all\"}]}"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I hope i could help you a bit with that&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Torsten&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2020 08:45:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-cloud-discussions/network-isolation-via-auto-remediation-alert-rule/m-p/352073#M321</guid>
      <dc:creator>tostern</dc:creator>
      <dc:date>2020-09-25T08:45:51Z</dc:date>
    </item>
  </channel>
</rss>

