This website uses Cookies. By clicking Accept, you agree to the storing of cookies on your device to enhance your community experience. Read our Privacy Policy. Click Preferences to customize your cookie settings.
The content you are looking for has been archived. View related content below.
Palo Alto Networks Approved
Community Expert Verified
Welcome to Prisma Cloud in the LIVEcommunity
This resource page provides helpful resources for Prisma Cloud and the compute capabilities available within it. Share your questions or answers in the Prisma Cloud Discussion forum to engage with other cloud security professionals. Meet Prisma Cloud customers, share ideas, and gain knowledge.
03-25-2024
—
“Auto Create Account Groups” is a useful feature for managing a large
number of GCP projects and folders.
If there are various teams creating folders and projects in your
organization, it makes ... —
Read more
Labels:
Auto MapCloud Security Posture Management (CSPM)GCP Organization OnboardingNested Account GroupsPrisma CloudRecursive Hierarchy 92
1
published by
MRehanin Prisma Cloud Articles
03-25-2024
edited by
RPrasadi
03-14-2024
—
Prisma Cloud allows you to create policies to ensure that your Cloud
Security Posture Management is in compliance with best practices and the
needs of your organization. These policies create alert... —
Read more
03-07-2024
—
Prisma Cloud allows you to create policies to ensure that your Cloud
Security Posture Management is in compliance with best practices and the
needs of your organization. These policies create alert... —
Read more
03-04-2024
—
A common customer question is how to view host vulnerabilities in the
Asset Inventory for each Cloud Service Provider. In this article, we
will focus on Azure, following up with articles for GCP an... —
Read more
02-29-2024
—
Identity and Access Management (IAM) refers to the processes and tools
for managing user access to resources and enforcing security policies.
IAM is crucial for securing the modern enterprise as it... —
Read more
Labels:
Access ControlAuthenticationAuthorizationCloud SecurityIAMIdentity federation.Least privilege PrincipleMFA (Multi-Factor Authentication)PAM (Privileged Access Management)Prisma CloudRBAC (Role-Based Access Control)SSO (Single Sign-On) 629
2
published by
bpachauliin Prisma Cloud Articles
02-29-2024
edited by
RPrasadi
Hi Team,
I recently created access key in order to make data connector connection with MS Sentinel. I could configure connection but not able to see d... —
Read more
Hello dear, has anyone seen something similar to this: In Primsma-cloud enterprise edition when I create the rule in Defend --> Waas for an environ... —
Read more
Is there a way to get a list of all Policies configured on AWS RDS Service? Our DB teams are asking for the list of Policies that they should consider... —
Read more
Reference: https://docs.aws.amazon.com/cli/latest/reference/ec2/describe-security-groups.html
RQL that is not working: config from cloud.resource wh... —
Read more
Based on CIS Benchmark, there is an gcloud cli command to check if the Enable logging is enabled.
From Google Cloud CLI
Run the following command
... —
Read more
03-25-2024
—
Organizations are embracing the cloud to facilitate digital
transformation, from lifting and shifting to building cloud-native
applications. Utilizing both public and private cloud services, they can
swiftly and efficiently deliver applications an...
Labels:
Cloud Native Application Protection PlatformCloud SecurityCloud Workload Protection PlatformCWPPPrisma Cloud 186
1
published by
MBhasinin Community Blogs
03-25-2024
edited by
RPrasadi
02-26-2024
—
Our experts will explain the possible risks across the entire
application lifecycle and discuss how to use code-to-cloud intelligence
to prioritize, remediate, and mitigate these risks efficiently, at
scale, and before they become breaches. After,...
Labels:
Cloud Native Application PlatformCloud SecurityCNAPPPrisma CloudRoadshow 651
1
published by
RPrasadiin Community Blogs
02-26-2024
edited by
RPrasadi
01-10-2024
—
To stay relevant, organizations must be nimble, offering new services,
and capabilities that transform their customers' experiences while
managing the volatile world of cyber attackers.
In this dynamic environment, application development has a...
Labels:
application lifecycleCloud SecurityContainersPaaSPrisma CloudRisk ManagementServerlessshift left 911
1
published by
RPrasadiin Community Blogs
01-11-2024
edited by
RPrasadi