This website uses Cookies. By clicking Accept, you agree to the storing of cookies on your device to enhance your community experience. Read our Privacy Policy. Click Preferences to customize your cookie settings.
The content you are looking for has been archived. View related content below.
Palo Alto Networks Approved
Community Expert Verified
Welcome to Prisma Cloud in the LIVEcommunity
This resource page provides helpful resources for Prisma Cloud and the compute capabilities available within it. Share your questions or answers in the Prisma Cloud Discussion forum to engage with other cloud security professionals. Meet Prisma Cloud customers, share ideas, and gain knowledge.
03-25-2024
—
“Auto Create Account Groups” is a useful feature for managing a large
number of GCP projects and folders.
If there are various teams creating folders and projects in your
organization, it makes ... —
Read more
Labels:
Auto MapCloud Security Posture Management (CSPM)GCP Organization OnboardingNested Account GroupsPrisma CloudRecursive Hierarchy 284
1
published by
MRehanin Prisma Cloud Articles
03-25-2024
edited by
RPrasadi
03-14-2024
—
Prisma Cloud allows you to create policies to ensure that your Cloud
Security Posture Management is in compliance with best practices and the
needs of your organization. These policies create alert... —
Read more
03-07-2024
—
Prisma Cloud allows you to create policies to ensure that your Cloud
Security Posture Management is in compliance with best practices and the
needs of your organization. These policies create alert... —
Read more
03-04-2024
—
A common customer question is how to view host vulnerabilities in the
Asset Inventory for each Cloud Service Provider. In this article, we
will focus on Azure, following up with articles for GCP an... —
Read more
02-29-2024
—
Identity and Access Management (IAM) refers to the processes and tools
for managing user access to resources and enforcing security policies.
IAM is crucial for securing the modern enterprise as it... —
Read more
Labels:
Access ControlAuthenticationAuthorizationCloud SecurityIAMIdentity federation.Least privilege PrincipleMFA (Multi-Factor Authentication)PAM (Privileged Access Management)Prisma CloudRBAC (Role-Based Access Control)SSO (Single Sign-On) 860
2
published by
bpachauliin Prisma Cloud Articles
02-29-2024
edited by
RPrasadi
Hi All
During our Vulnerability Assessment, the vendor found that our VPN URL has TLS 1, 1.1 and 1.2 Enabled. and recommended to disable up to 1.2 and... —
Read more
If I use twistcli to download an intelligence stream for offline environments, does the downloaded package include vulnerability data for Windows cont... —
Read more
Hi Team,
I recently created access key in order to make data connector connection with MS Sentinel. I could configure connection but not able to see d... —
Read more
Hello dear, has anyone seen something similar to this: In Primsma-cloud enterprise edition when I create the rule in Defend --> Waas for an environ... —
Read more
04-17-2024
—
There are numerous security concerns while using 3rd party Webhooks
Providers like pipedream, webhook.site, etc. However, a lesser known
alternative is rather than relying on third-party webhook providers, you
can implement your own webhook endpoint.
Labels:
Cloud SecuritypipedreamPrisma CloudWebhookWebhook Endpoint 115
published by
VKumar25in Community Blogs
04-17-2024
edited by
RPrasadi
04-17-2024
—
As a Prisma Cloud user, you have access to a specific Prisma Cloud
stack. When a user logs in to a stack, it gets a JWT token to access
that specific stack.
Labels:
Cloud SecuritycnsCNS REST APIPrisma CloudRest Api 122
published by
VKumar25in Community Blogs
04-17-2024
edited by
RPrasadi
03-25-2024
—
Organizations are embracing the cloud to facilitate digital
transformation, from lifting and shifting to building cloud-native
applications. Utilizing both public and private cloud services, they can
swiftly and efficiently deliver applications an...
Labels:
Cloud Native Application Protection PlatformCloud SecurityCloud Workload Protection PlatformCWPPPrisma Cloud 470
1
published by
MBhasinin Community Blogs
03-25-2024
edited by
RPrasadi
02-26-2024
—
Our experts will explain the possible risks across the entire
application lifecycle and discuss how to use code-to-cloud intelligence
to prioritize, remediate, and mitigate these risks efficiently, at
scale, and before they become breaches. After,...
Labels:
Cloud Native Application PlatformCloud SecurityCNAPPPrisma CloudRoadshow 769
1
published by
RPrasadiin Community Blogs
02-26-2024
edited by
RPrasadi