This website uses Cookies. By clicking Accept, you agree to the storing of cookies on your device to enhance your community experience. Read our Privacy Policy. Click Preferences to customize your cookie settings.
This resource page provides helpful resources for Prisma Cloud and the compute capabilities available within it. Share your questions or answers in the Prisma Cloud Discussion forum to engage with other cloud security professionals. Meet Prisma Cloud customers, share ideas, and gain knowledge.
08-09-2024
—
Vulnerabilities or CVEs are publicly disclosed security vulnerabilities
that threat actors can exploit to gain unauthorized access to systems or
networks. CVEs are widely present in programs and op... —
Read more
Labels:
Cloud Workload Protection Platform (CWPP)CVEFNFPNVDPrisma Cloud Compute EditionPrisma Cloud Intelligence Stream(IS)vulnerability detectionVulnerability management 197
1
published by
SSingh39in Prisma Cloud Articles
08-09-2024
edited by
SSingh39
07-30-2024
—
An "Attack Path" refers to a sequence of steps or a series of
vulnerabilities and misconfigurations that an attacker exploits to
achieve their malicious objectives within a cloud environment. —
Read more
Labels:
Attack path vectorsIAM misconfigurationslateral movementNetwork ExposurePrisma Cloudprivilege escalationvulnerabilities 339
1
published by
bpachauliin Prisma Cloud Articles
07-30-2024
edited by
RPrasadi
07-19-2024
—
By Omoniyi Jabaru, Senior Customer Success Engineer
Overview
Prisma Cloud can scan container images in public and private
repositories on public and private registries. The registry is a system
for storing and distributing container images. The most well-known
public registry is Docker Hub. On... —
Read more
Labels:
Container DefenderDefender DeploymentJfrog ArtifactoryPrisma Cloud ComputeWindows 334
published by
JOmoniyiin Prisma Cloud Articles
07-19-2024
edited by
RPrasadi
06-26-2024
—
A common customer question is how to view host vulnerabilities in the
Asset Inventory for each Cloud Service Provider. Host vulnerabilities
are easily identified in the Runtime Security Module, by ... —
Read more
06-26-2024
—
The Palo Alto Networks Prisma Cloud (CSPM and CWPP) not only can help
the organizations to discover the impacted resources, but can also
protect the exploit from happening.
Vulnerabilities or CV... —
Read more
Labels:
Cloud Security Posture Management (CSPM)Cloud Workload Protection Platform (CWPP)CVEIntermediate Skill LevelPrisma Cloud Intelligence Stream(IS)RQLvulnerability detectionVulnerability managementWAAS 554
published by
rsinghin Prisma Cloud Articles
06-26-2024
edited by
rsingh
Hi team,
The team is given a high privilege set of permissions only when a change request is filed or if the team will have to implement such activ... —
Read more
When i was installed prisma cloud console on k8s, the console pod status being to "CrashLoopBackOff".I see the logs "utils.go:359 command "/usr/bin/mo... —
Read more
I am attempting to build custom RQL queries and wanted to use the JSON preview function newly introduced. I have admin rights, but I don't see the JSO... —
Read more
Prisma Cloud Compute Edition
30 & 32
Error:
route_handler.go:11205 Failed to get latest intelligence version Get "https://intelligence.twistlock.c... —
Read more
07-23-2024
—
Prisma Cloud by Palo Alto Networks—a Red Hat Advanced Business
Partner—is excited to announce that our Red Hat-certified vulnerability
scanner is available in the Red Hat Ecosystem Catalog. With this Red Hat
certification, Prisma Cloud users can b...
Labels:
Cloud SecurityPrisma CloudRed HatRed Hat OpenShift 746
2
published by
RPrasadiin Community Blogs
07-23-2024
edited by
RPrasadi
07-23-2024
—
It is important to have more than one option, especially when it comes
to securing your workloads. That is why Prisma Cloud became the first
security platform to offer both agent-based and agentless security for
workload protection. We introduced ...
Labels:
AgentlessCloudCloud SecurityConfigurationCWPPPrisma Cloudscanning 778 1
published by
IAvilesin Community Blogs
07-23-2024
edited by
IAviles
04-17-2024
—
There are numerous security concerns while using 3rd party Webhooks
Providers like pipedream, webhook.site, etc. However, a lesser known
alternative is rather than relying on third-party webhook providers, you
can implement your own webhook endpoint.
Labels:
Cloud SecuritypipedreamPrisma CloudWebhookWebhook Endpoint 1397
published by
VKumar25in Community Blogs
04-17-2024
edited by
RPrasadi
04-17-2024
—
As a Prisma Cloud user, you have access to a specific Prisma Cloud
stack. When a user logs in to a stack, it gets a JWT token to access
that specific stack.
Labels:
Cloud SecuritycnsCNS REST APIPrisma CloudRest Api 1064
published by
VKumar25in Community Blogs
04-17-2024
edited by
RPrasadi
Labels:
Cloud SecurityNetwork AnalyzerPerforming Config Search with Network RQL'sPrisma CloudRest ApiRQL 1086
published by
VKumar25in Community Blogs
04-23-2024
edited by
RPrasadi