- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Administrators can now create user identity-based and cloud dynamic user group based policies (Role, Department, Region, Manager, AD Group) from SaaS Inline to be enforced in various control points. The User Section on SaaS Inline policies will not only include discovered users but also all users in the organization, enabled by the CIE integration. Admins can now distinguish between named and guest users. This solution, launched on April 29, 2024, is designed to empower our customers to fully utilize the platformization strategy from Palo Alto Networks.
In today's dynamic digital landscape, the transition to cloud-based services presents both opportunities and security challenges. Palo Alto Networks' Zero Trust-based cloud application and data access control solution offer a vital response to these challenges through SaaS Security Inline Adaptive and Attribute-based Access Control Policies. This solution empowers administrators to create finely tuned access policies based on user identities and dynamic user groups, leveraging attributes such as role, department, and AD group memberships. By tailoring access permissions to specific user profiles and contextual factors, organizations can ensure robust data protection while maintaining operational efficiency. Seamless integration with the Cloud Identity Engine facilitates a smooth transition to a cloud-centric identity management approach, ensuring security infrastructures remain agile and adaptable to evolving threats and business requirements. Furthermore, user attribute-based policies and detailed user attribute pages provide administrators with comprehensive visibility into user identities and group memberships, enabling informed access control decisions. In essence, Palo Alto Networks' solution equips organizations to confidently embrace cloud technologies, knowing that their data assets are safeguarded and compliance standards are met in today's ever-evolving digital landscape.
SaaS policy rule recommendations enable you to recommend Security policy rules to your Palo Alto Networks firewall administrator or Prisma Access administrator. SaaS Security Inline pushes SaaS policy rule recommendations to your firewall or Prisma Access. Your firewall administrator or Prisma Access administrator will see your policy rule recommendations in the firewall web interface or Prisma Access web interface, then can accept and commit the SaaS Security policy rule. After your firewall administrator or Prisma Access administrator commits the policy rule, the policy rule becomes active. You can update your SaaS rule recommendations at any time.
Before you begin: Ask your firewall administrator to verify that SSL decryption is enabled on the firewall. SSL decryption is required for PAN-OS to detect specific user activities, such as upload or download activities, in the network traffic. SSL decryption is also required for PAN-OS to identify individual application tenants in the network traffic. NGFW Only - Ask your firewall administrator to verify that all firewalls have log forwarding enabled as instructed in the ACE deployment. The SaaS Security web interface cannot display SaaS application visibility data and might not be able to enforce policy rule recommendations without logs for all firewalls.
Here are the clear steps for guidance:
Step 1: Navigate to SaaS Security Inline.
Step 2: To navigate to the Policy Recommendations view, select Discovered AppsPolicy Recommendations.
Step 3: Add Policy.
Step 4: Select the application granularity for your policy recommendation.
Step 5: Specify a Rule Name and Description. For example, Block Unsanctioned, File Sharing Apps from HR.
Step 6: Specify the network traffic to detect and the action to take.
Step 6a: Specify the applications that you want to control.
Use the filters (such as the Category and Risk filters) to help you locate the SaaS applications so that you capture all the application SaaS Applications. For example, if your intent is to only include high risk SaaS applications, filter by risk.
Step 6b: Select the User Activity you want the firewall to detect.
Step 6c: Specify a Response to instruct the firewall or Prisma Access administrator take action on the network traffic that matches the policy rule.
Step 7: Specify User & Groups.
The user and group information that is displayed depends on whether the Cloud Identity Engine is available on your tenant:
Select whether you want to create the policy recommendation from the Discovered Users & Groups view or from CIE Users & Groups view. If these options do not appear, then the Cloud Identity Engine is not available on your tenant or does not have directory sync configured for Azure AD. In this case, you can select only discovered users and groups.
Step 8: (Optional) Specify Device Posture to enforce what devices can and cannot access specific SaaS apps, including device ownership and device compliance.
Your device posture selection automatically creates a Host Information Profile (HIP) object for mobile devices after the policy recommendation is imported as a policy.
Step 9: (Optional to include DLP) Specify a Data Profile.
Step 10: Save the new rule. Enable the recommendation when you’re ready to submit the recommendation for enforcement.
Once the policy recommendation is enabled it’ll be automatically synced to controls points. And network admin can now import the policy enforcing access controls!
Stay Secure, Stay Empowered!
Best Regards,
Priyanka Neelakrishnan | Product Line Manager, Cloud Security
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Subject | Likes |
---|---|
3 Likes | |
3 Likes | |
2 Likes | |
2 Likes | |
2 Likes |
User | Likes Count |
---|---|
6 | |
4 | |
3 | |
2 | |
2 |