Learn about the different options for deploying and managing Cloud NGFW for
AWS.
Where Can I Use This?
What Do I Need?
Cloud NGFW for AWS
Cloud NGFW subscription
Palo Alto Networks Customer Support Account (CSP)
AWS Marketplace account
User role (either tenant or administrator)
Cloud NGFW for AWS offers multiple options for deploying NGFW resources and managing
Security policy rules.
NGFW Deployment and Management
Native NGFW Deployment—When you subscribe to Cloud NGFW via AWS
Marketplace, you procure a tenant. You can then deploy Cloud NGFW resources
for your VPCs with a few clicks on the Cloud NGFW
Console or using APIs. These resources come with
built-in resilience, scalability, and lifecycle management. You can also use
infrastructure as code tools such as Cloud
Formation or Terraform for creating these resources. Once created, you can
author Security policy rules for these Cloud NGFW resources using Native
policy management (rulestacks) or using Panorama policy management (device
groups).
AWS Firewall Manager Deployment—If you currently use AWS Firewall
Manager to manage security groups, or other network security features across
your AWS organization, You can use the same AWS Firewall Manager to deploy
NGFWs into multiple accounts and VPCs throughout an AWS organization. You
can use the AWS Console, AWS APIs, or Cloud Formation to author the
Firewall Manager policy configuration that deploys and manages all Cloud
NGFW settings.
AWS Firewall Manager also manages the endpoint subnets, route tables, and
gateway load-balancer endpoints within the VPC where the Cloud NGFW resource
is deployed. When you use AWS Firewall Manager, the Cloud NGFW resource uses
global rulestacks in your Cloud NGFW tenant for the security settings and
rules. If you have not previously configured a global rulestack in your
tenant (using Panorama policy management), AWS Firewall Manager redirects
you to the Cloud NGFW console to create and manage the global rulestack
using native policy management.
Security Policy Management
Native policy Management—You can manage Security policy rules on the
Cloud NGFW resources by authoring Rulestacks natively using the Cloud NGFW Console or APIs. You can also use
infrastructure as code tools such as Cloud Formation or Terraform for creating these
rulestacks. A rulestack defines the advanced access control (App-ID, URL
Filtering) and threat prevention behavior of the NGFW. A rulestack includes
a set of security rules and the associated objects and Security Profiles.
Panorama policy Management—You can link your Cloud NGFW tenant with a
Panorama appliance to author and manage policy rules for your Cloud NGFW
resources. You can use Panorama Console, APIs, or Terraform to author these Security
policy rules on the Cloud device groups. The policy you author in the
Panorama Cloud device group manifests as global rulestacks in your Cloud
NGFW tenant.
Strata Cloud Manager policy Management—You can link your Cloud NGFW
resource with Strata Cloud Manager (SCM) for
policy management. Strata Cloud Manager provides unified management for your
entire network security deployment, which allows you to easily manage your
Palo Alto Networks security infrastructure from a single, streamlined web
interface. With this interface you gain comprehensive visibility into users,
branch sites, applications, and threats across all network security
enforcement points. This functionality provides actionable insights, better
security, and easy troubleshooting and problem resolution.