Power of Tags in Prisma Cloud. How to implement them? How to use them? 

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
L4 Transporter
No ratings

By Mathieu Dalbès, Customer Success Engineer



Introductory Paragraph

 

Managing your resource tags can be a challenge, but it's important to define scopes (chargeback, owner, application scope) and prioritize sensitive workloads. To make monitoring easier, it's recommended to take advantage of this technology.

 

However, sometimes there's a problem because it wasn't implemented when the resource code was created, and it becomes complicated to manage tag conventions once everything is in production or simply because it takes a lot of time.

 

In this article, I will first review how Prisma Cloud allows you to deploy tags. In the second part, I will show you the benefits you'll gain through Prisma Cloud with tags.

 

How to deploy tags

 

Requirements : 

  • Your Infrastructure As Code must be hosted on a Version Control System (VCS - GitHub for example).
  • Module Code Security must be enabled in your PrismaCloud tenant.
  • Your VCS repository/Organization is onboarded (Settings → Providers → Code repositories) Documentation.
  • If you don't have any code, here is a GitHub repository of a 3tiers application to do your tag tests.

 
Figure 01 3tiers-design_PaloAltoNetworks.jpg

Figure 01: 3 tiers-design_PaloAltoNetworks


Under the module Application Security → Home → Projects → 

 
Figure 02 UI-Manage-IAC-Tags_PaloAltoNetworks.jpg

Figure 02: UI-Manage-IAC-Tags_PaloAltoNetworks

 

You will be able to create a rule (your repository can only be part of one rule, make sure it is not attached to different rules):  

 
Figure 03 Edit-Tag-Rule_PaloAltoNetworks.jpg

Figure 03: Edit-Tag-Rule_PaloAltoNetworks


You would like to define that this code is dedicated to your 3-tier application that is named “Key : ApplicationTags” and “Value : AppDNA”.

If you want to apply this rule only to a scope of this repository, it is possible to apply this rule only to resources that already have a certain tag. In this case, in this repository you have 3 folders (3tiersapp, appdna & attackpaths) . The goal is to have the ApplicationTags tag with a value corresponding to the environment of these applications.

Once the rule is configured, during the next automatic scan of your repository (there are 2 per day), Prisma Cloud will create a Pull Request in your VCS. 

 
Figure 04 GitHub-PR_PaloAltoNetworks.jpg

Figure 04: GitHub-PR_PaloAltoNetworks.jpg

 

Tags will be applied to all resources that can be tagged.

 

 
Figure 05 PR-Modification_PaloAltoNetworks.jpg

Figure 05: PR-Modification_PaloAltoNetworks

 

 
Figure 06 git-pull-CLI_PaloAltoNetworks.jpg

Figure 06: git-pull-CLI_PaloAltoNetworks

 

Figure 07 Terraform-Code_PaloAltoNetworks.jpg

Figure 07: Terraform-Code_PaloAltoNetworks

Now you can apply your modification to your CSP with: 

 
Figure 08 Terraform-CLI_PaloAltoNetworks.jpg

Figure 08: Terraform-CLI_PaloAltoNetworks

 
Figure 09 AWS-Console-modification_PaloAltoNetworks.jpg

Figure 09: AWS-Console-modification_PaloAltoNetworks

To summarize what you did: 

 

 
Figure 10 TagsFlow_PaloAltoNetworks.jpg
Figure 10:  TagsFlow_PaloAltoNetworks

 

1) Onboard your repository with AWS IAC TF Code.

2) Create an application security tag rule.

3) Prisma Cloud creates Pull Request.

4) You can pull our new code locally.

5) You can deploy it to AWS with Terraform. 

6) Prisma will now ingest new tags.

 

How to take advantage of tags in Prisma Cloud

  • Dashboard (Example - Asset inventory): 
 

Figure 11 Dashboard-TagsUsage_PaloAltoNetworks.jpg

Figure 11: Dashboard-TagsUsage_PaloAltoNetworks

 

 Inventory

 

  • Application: You have the possibility to create your application based on Tag and define criticality, owner, environment, and business unit.

These applications will allow you to have a better view of your critical assets and prioritize efforts:

  • Assets: You can filter your assets by tags, or filter by resource list (based on tags).
  • IaC Resource Inventory: You can filter by tag.

 

Figure 12  Inventory-TagsUsage_PaloAltoNetworks.jpg

Figure 12  Inventory-TagsUsage_PaloAltoNetworks

 

 Compliance

 

It is possible to filter the evaluation of your resources against standards on a scope defined by your tags / ResourceList

Alerts: 

  • Filter on Tag/ Or Tag ResourceList for each subcategory of alerts (Overview, Incident, Attack Paths, CIEM, Exposure, Vulnerabilities.

 

Figure 13  Compliance-TagsUsage_PaloAltoNetworks.jpg

Figure 13:  Compliance-Tags Usage_PaloAltoNetworks

 

Conclusion Paragraph

 

This approach will greatly increase your visibility into your environment and also in Prisma Cloud.

 

On the Cloud side, you will be able to create scopes by tag and application according to your repositories.

 

You will also be able to benefit from this in Prisma Cloud, to help you consistently and effectively manage your most critical alerts. These tags will also free up your bandwidth to dedicate towards more sensitive resources. 

 

References

 

 

About the Author

 

Mathieu Dalbès is a Prisma Cloud Customer Success Engineer who is an expert in all things related to Cloud architecture and automation. When not assisting customers with their Cloud infrastructure setup, one can find Mathieu participating in various sports or on a wakeboard.

Rate this article:
  • 352 Views
  • 0 comments
  • 0 Likes
Register or Sign-in
Contributors
Labels
Article Dashboard
Version history
Last Updated:
‎04-24-2025 09:18 AM
Updated by: