This website uses cookies essential to its operation, for analytics, and for personalized content. By continuing to browse this site, you acknowledge the use of cookies. For details on cookie usage on our site, read our Privacy Policy
The content you are looking for has been archived. View related content below.
Palo Alto Networks Approved
Community Expert Verified
Welcome to Prisma Cloud in the LIVEcommunity
This resource page provides helpful resources for Prisma Cloud and the compute capabilities available within it. Share your questions or answers in the Prisma Cloud Discussion forum to engage with other cloud security professionals. Meet Prisma Cloud customers, share ideas, and gain knowledge.
09-15-2023
—
Identity and Access Management (IAM) refers to the processes and tools
for managing user access to resources and enforcing security policies.
IAM is crucial for securing the modern enterprise as it... —
Read more
08-30-2023
—
This document provides guidance on how to configure Single Sign On (SSO)
between Prisma Cloud Enterprise and Azure Active Directory (Azure AD)
Groups Assigned to Application.
SSO allows the user... —
Read more
Labels:
Active Directory GroupsAzure Single Sign OnCloud Security Posture ManagementCSPMPrisma CloudSSO 998
1
published by
smakineniin Prisma Cloud Articles
09-19-2023
edited by
RPrasadi
08-16-2023
—
Prisma™ Cloud allows you to create policies to ensure that your Cloud
Security Posture Management is in compliance with best practices and the
needs of your organization. These policies create aler... —
Read more
07-31-2023
—
This guide describes how to configure agentless vulnerability and
compliancescanning of virtual machines in Microsoft Azure
subscriptions.This example uses Prisma Cloud Enterprise Edition (PCEE,
Co... —
Read more
Labels:
Agentless VM ScanningAzure Cloud AccountsCompute SaaSConfigurationPCEEPrisma Cloud Enterprise Edition 690
1
published by
CloudEngineerin Prisma Cloud Articles
09-19-2023
edited by
RPrasadi
06-06-2023
—
Many organizations have to create, read, update, and delete their cloud
infrastructure. Terraform is an easy way to provision and deploy
Infrastructure resources such as servers, databases, network... —
Read more
Labels:
AWS Account OnboardingCloud Security Posture ManagementCSPMPrisma Cloud Terraform ProviderTerraform 1659
2
published by
MRehanin Prisma Cloud Articles
09-19-2023
edited by
RPrasadi
We have a specific S3 bucket that we'd like to watch for events and alert on them. I've used this query:
event from cloud.audit_logs where operatio... —
Read more
Hello everyone,
I have been unable to retrieve using the Prisma Cloud CSPM API the Compliance Posture Trend using the following function.
The PowerS... —
Read more
Dear Team, We currently configured Prisma Container Scan task as a Stage in one of our Pipeline. We are using Twist-cli and Jenkins to perform the ima... —
Read more
Prisma Cloud helps to gain visibility into your cloud services and assets running within your cloud environments. When you add your cloud account to Prisma Cloud, the API integration between your cloud infrastructure provider and Prisma Cloud is established and you can begin monitoring the resources and identify potential security risks in your infrastructure. Watch this demo with RD Singh, Sr. Customer Success Engineer, to learn how to connect your GCP project to Prisma Cloud. To read the step-by-step instructions outlined in this video,
Labels:
GCP projectPrisma CloudPrisma Cloud Featured Video
08-24-2023
—
Data security relates to the process of protecting your data from
unauthorized access. As far as Prisma Cloud is concerned, our Data
Security solution will enable you to discover and classify sensitive
data stored in AWS S3 buckets and Azure Blob ...
Labels:
Cloud SecurityData PatternsData PoliciesData ProfilesData SecurityObject StoresPrisma Cloud 682
published by
IAvilesin Blogs
09-13-2023
edited by
RPrasadi
08-22-2023
—
GitHub Actions, for good reason, is the go-to choice for countless
developers. Despite its convenience, though, potential security risks
accompany third-party actions. In this post, we share how the world’s
most popular repositories fail to manage...
Labels:
Application SecurityAppSeccicdCloud SecurityGithubPrisma CloudResearchVCSVCS Security 629
published by
RPrasadiin Blogs
09-11-2023
edited by
RPrasadi
07-28-2023
—
With the rise in attacks on continuous integration and continuous
delivery (CI/CD) environments, it’s no surprise that the U.S. Government
recently released guidance to help organizations understand their risks
and defend their pipelines. CI/CD pi...
Labels:
Application Security AppSec CICD SecurityPrisma Cloud 1115
1
published by
RPrasadiin Blogs
09-11-2023
edited by
RPrasadi
07-24-2023
—
We understand the importance of providing users with a global view and
actionable workflow for reducing security issues in their code. This can
be achieved by giving users summary insights and a way to prioritize
security concerns effectively. Int...
Labels:
Code Security DashboardPrisma Cloud 851
published by
GMarkin Blogs
09-11-2023
edited by
RPrasadi
07-24-2023
—
CLI-based customers can now see and filter the content of CLI
repositories in - Dashboard content (excluding Pull Request over time
(irrelevant for such repositories) and Top CVSS Score Code
Vulnerabilities) - Users can have insight summary of lat...
Labels:
DashboardPrisma CloudProjectsResource Explorer 816
published by
GMarkin Blogs
09-11-2023
edited by
RPrasadi