This website uses Cookies. By clicking Accept, you agree to the storing of cookies on your device to enhance your community experience. Read our Privacy Policy. Click Preferences to customize your cookie settings.
The content you are looking for has been archived. View related content below.
Palo Alto Networks Approved
Community Expert Verified
Welcome to Prisma Cloud in the LIVEcommunity
This resource page provides helpful resources for Prisma Cloud and the compute capabilities available within it. Share your questions or answers in the Prisma Cloud Discussion forum to engage with other cloud security professionals. Meet Prisma Cloud customers, share ideas, and gain knowledge.
08-20-2024
—
The Kubernetes auditing system tracks the activities of users,
administrators, and other components impacting the cluster. Once you
configure the Prisma Cloud CWP Kubernetes auditing feature, Prism... —
Read more
Labels:
Auditaudit streamAWS Cloud WatchCloud Workload Protection Platform (CWPP)Control PlaneCustom rulesEKS logsEventsKubernetes auditingsecurity-relevant events 413
1
published by
kkaukuntlain Prisma Cloud Articles
08-20-2024
edited by
RPrasadi
08-20-2024
—
Prisma Cloud Console is backwards compatible with up to two (n-2) major
releases back (including all minor versions) for the following:
All types of Defenders.Twistcli/Jenkins plugin. —
Read more
Labels:
Amazon ECSconsoleDaemonsetsdefenderDefender UpgradeHelm ChartsKubernetesOneboxPrisma Cloud Compute Edition 561
published by
RPrasadiin Prisma Cloud Articles
08-20-2024
edited by
SSingh39
08-09-2024
—
Vulnerabilities or CVEs are publicly disclosed security vulnerabilities
that threat actors can exploit to gain unauthorized access to systems or
networks. CVEs are widely present in programs and op... —
Read more
Labels:
Cloud Workload Protection Platform (CWPP)CVEFNFPNVDPrisma Cloud Compute EditionPrisma Cloud Intelligence Stream(IS)vulnerability detectionVulnerability management 607
1
published by
SSingh39in Prisma Cloud Articles
08-09-2024
edited by
SSingh39
07-30-2024
—
An "Attack Path" refers to a sequence of steps or a series of
vulnerabilities and misconfigurations that an attacker exploits to
achieve their malicious objectives within a cloud environment. —
Read more
Labels:
Attack path vectorsIAM misconfigurationslateral movementNetwork ExposurePrisma Cloudprivilege escalationvulnerabilities 648
1
published by
bpachauliin Prisma Cloud Articles
07-30-2024
edited by
RPrasadi
07-19-2024
—
By Omoniyi Jabaru, Senior Customer Success Engineer
Overview
Prisma Cloud can scan container images in public and private
repositories on public and private registries. The registry is a system
for storing and distributing container images. The most well-known
public registry is Docker Hub. On... —
Read more
Labels:
Container DefenderDefender DeploymentJfrog ArtifactoryPrisma Cloud ComputeWindows 552
published by
JOmoniyiin Prisma Cloud Articles
07-19-2024
edited by
RPrasadi
Hi,We have application which runs twistcli command line commands to scans images. If we delete an image after scan, and keep podman registry empty, th... —
Read more
Hi,
I would like to inform you about an issue I encountered while creating and provisioning a project. I enabled the "Projects" feature, and durin... —
Read more
Hi,
Is there anyone familiar with any configuration option that could be used with the Prisma cloud Jenkins plugin for scanning container images th... —
Read more
Hi everyone,
I have received email for renewing our prisma cloud subscription. However the renewal link in the mail doesn not seems to work - https:... —
Read more
08-20-2024
—
On December 5th, 2023, Palo Alto Networks completed the acquisition of
Dig Security. Dig Security is a market leader in Data Security Posture
Management (DSPM) and Data Detection & Response (DDR). In integration
with our recent acquisition of Dig ...
Labels:
Cloud SecurityData SecurityData Security Posture ManagementDSPMPrisma CloudPrisma Cloud Data Security. PCDS 506
published by
AJain85in Community Blogs
09-03-2024
edited by
RPrasadi
07-23-2024
—
Prisma Cloud by Palo Alto Networks—a Red Hat Advanced Business
Partner—is excited to announce that our Red Hat-certified vulnerability
scanner is available in the Red Hat Ecosystem Catalog. With this Red Hat
certification, Prisma Cloud users can b...
Labels:
Cloud SecurityPrisma CloudRed HatRed Hat OpenShift 1012
2
published by
RPrasadiin Community Blogs
07-23-2024
edited by
RPrasadi
07-23-2024
—
It is important to have more than one option, especially when it comes
to securing your workloads. That is why Prisma Cloud became the first
security platform to offer both agent-based and agentless security for
workload protection. We introduced ...
Labels:
AgentlessCloudCloud SecurityConfigurationCWPPPrisma Cloudscanning 1226 1
published by
IAvilesin Community Blogs
07-23-2024
edited by
IAviles
04-17-2024
—
There are numerous security concerns while using 3rd party Webhooks
Providers like pipedream, webhook.site, etc. However, a lesser known
alternative is rather than relying on third-party webhook providers, you
can implement your own webhook endpoint.
Labels:
Cloud SecuritypipedreamPrisma CloudWebhookWebhook Endpoint 1641
published by
VKumar25in Community Blogs
04-17-2024
edited by
RPrasadi
04-17-2024
—
As a Prisma Cloud user, you have access to a specific Prisma Cloud
stack. When a user logs in to a stack, it gets a JWT token to access
that specific stack.
Labels:
Cloud SecuritycnsCNS REST APIPrisma CloudRest Api 1224
published by
VKumar25in Community Blogs
04-17-2024
edited by
RPrasadi