WildFire: U.S. Government Cloud
    
    
  
    
  
| Where Can I Use
This? | What Do I Need? | 
|---|
    
| Prisma Access (Managed by Strata Cloud Manager)Prisma Access (Managed by Panorama)NGFW (Managed by Strata Cloud Manager)NGFW (Managed by PAN-OS or Panorama)VM-SeriesCN-Series
 | Advanced WildFire License For Prisma Access, this is usually included with your
                                                Prisma Access license.WildFire U.S. Government Onboarding
 | 
 
  
 
  
    
    As of July 15, 2024, the Palo Alto Networks WildFire U.S. Government Cloud has been
                superseded by the 
Advanced WildFire Government Cloud and 
Advanced WildFire Public Sector Cloud, which provides access to high-security Advanced WildFire Cloud
                environments operating a newer codebase with an enhanced feature set. As a result,
                Palo Alto Networks no longer onboards new customers to the WildFire U.S. Government
                Cloud. Existing customers can continue to access the WildFire U.S. Government Cloud
                until the decommission date of November 30, 2024, at which point, the existing URI
                will be redirected to the Advanced WildFire Public Sector Cloud.
For details about the new cloud offerings, contact your Palo Alto Networks sales
                representative point of contact to discuss any additional operational details.
 The Palo Alto Networks WildFire U.S. Government cloud is a high-security malware analysis
            platform that is 
FedRAMP (Federal Risk and Authorization Management Program) authorized. This
            WildFire cloud environment is intended for use only by U.S. Federal agencies requiring a
            standardized approach to security assessment, authorization, and continuous monitoring
            for cloud products and services. The WildFire: U.S. Government cloud operates as a
            separate and distinct entity — Any privacy information that might be present in samples
            sent for analysis, such as email addresses, IP addresses, and passive DNS, will not be
            shared with any other WildFire cloud instance. However, it is still able to leverage
            threat data generated by the WildFire public cloud to maximize coverage capability as
            well as protections and antivirus signatures produced through file analysis.
The WildFire public cloud (the global and regional clouds) and
the WildFire U.S. Government cloud has several functional differences
from the public cloud. The following functionality is not available
for customers connecting to the WildFire: U.S. Government cloud: 
- Bare Metal Analysis is not supported by the U.S. Government
cloud. 
- Script file (Bat, JS, BVS, PS1, Shell script, and HTA) analysis
is currently not supported. 
- The WildFire: U.S. Government cloud cannot be accessed through the WildFire portal. 
- The WildFire: U.S Government cloud cannot be integrated with
other cloud-based services. 
- Right to delete functionality is not available. 
- The WildFire: U.S Government cloud does not currently support
Advanced WildFire analysis. 
Get Started with the WildFire: U.S. Government Cloud
In
order to connect to the WildFire: U.S. Government cloud, you must
apply for access. Follow any internal procedural measures to determine the
suitability of using the WildFire: U.S Government cloud within your
network, such as, but not limited to conducting a risk analysis,
evaluation of the CSP submission package, and authorization approvals.
Please contact your Palo Alto Networks sales representative / WildFire:
U.S. Government Cloud point of contact to discuss any additional
operational details.
Requests to access the WildFire U.S. Government cloud begins when you have met the proper
                organization requirements for operating a FedRAMP authorized service. There are two
                entity categories who can access the WildFire U.S. Government cloud: U.S. Government
                contractors and U.S. Federal agencies (and other approved governmental departments).
                Both entities have specific requirements for accessing the WildFire U.S. Government
                cloud:
- U.S. Federal Agencies U.S. Federal agencies, departments, and bureaus must receive
                    an Authority to Operate (ATO) by the Designated Approving Authority (DAA), which
                    authorizes operation of the WildFire U.S. Government cloud within an agencies
                    operations, before access is granted.- Inform the Palo Alto Networks Point of Contact
                                (fedramp@paloaltonetworks.com) of the intention to use the WildFire
                                U.S. Government cloud. 
- Send a request to info@fedramp.gov. 
- Complete the FedRAMP Package Access Request Form and submit it to
                                info@fedramp.gov. - 
    
    - The FedRAMP Program Management Office (PMO) reviews the form and
                                    typically issues a temporary 30 day access to the WildFire
                                    FedRAMP package. 
 
- Review the FedRAMP security package for the WildFire U.S. Government
                                cloud. Complete any internal processes required to deploy the
                                WildFire U.S. Government cloud into your organization. 
- Issue the ATO. 
- Send a request to the FedRAMP PMO for permanent access to the
                                WildFire U.S. Government cloud. 
 
- U.S. Government Contractors U.S. Government contractors who use or access the
                    WildFire U.S. Government cloud must meet the following requirements.- Must be a citizen of the United States. 
- Hold an active contract (or subcontract) with a U.S. Federal
                                government agency with an occupational requirement for information
                                exchange using the Internet, such as email correspondence, sharing
                                of documents, and other forms of Internet communication. 
- Upon termination of a contractor’s employment, the user must cease
                                using or accessing the WildFire U.S. Government cloud. 
- Abide by the confidentiality provisions contained within the Palo
                                Alto Networks EULA. 
 
After your organization issues an Authorization to Operate (ATO) or when applicable U.S.
                Government contractors meet all usage requirements, only then can a request be made
                to access the WildFire U.S. Government cloud by contacting your Palo Alto Networks
                Account team.
- Contact
your FedRAMP Program Management Office (PMO) to determine the viability
of the U.S. Government cloud for your security needs. 
- Contact the Palo Alto Networks point of contact specified
in the  FedRAMP Marketplace- . The
point of contact provides additional information about the service,
as well as any other operational details pertinent to your particular
WildFire deployment. 
- Contact the Palo Alto Networks Account Team to begin the
on-boarding process. The Account Team will request the following
information regarding customer details and deployment specifics.  - Contact information. 
- A brief description for migrating to the WildFire U.S. Government
cloud. 
- A statement of organizational compliance with the confidentiality
provisions outlined within the Palo Alto Networks EULA. 
- Egress IP addresses of all firewall gateways (including management
planes), as well as all instances of Panorama. 
 
- After WildFire Program Management grants approval to use
the WildFire U.S. Government cloud (typically in one to three business days),
Palo Alto Networks Development Operations applies the appropriate
controls. 
- After access to the WildFire U.S. Government cloud is granted, reconfigure the firewall to
                        forward unknown files and email links for analysis using the following URL:
                        wildfire.gov.paloaltonetworks.com. For more information, see Forward Files
                        for Wildfire Analysis. If you require any additional assistance, contact
                        Palo Alto Networks Customer Support.