Customize security posture checks for your deployment to maximize relevant
recommendations.
| Where Can I Use This? | What Do I Need? |
- NGFW, including those funded by Software NGFW
Credits
- Prisma Access (Managed by Panorama or Strata Cloud Manager)
- Prisma SD-WAN
|
One of these licenses that includes access to Strata
Cloud Manager: - A role with
permission to view or manage the Security Checks and
Security Check Exceptions.
→ The features and capabilities available to you in Strata Cloud Manager depend on which license(s) you are
using.
|
Strata Cloud Manager now organizes Security Posture Settings under the Unified
Incident Framework to deliver a unified and contextual incident management
experience. Previously, you could access the security posture check from
Configuration > Posture > Settings. With the
unified incident framework, these
security posture settings have moved to
Incidents > Settings. This update
aligns all posture-related rules and custom checks with incident workflows,
enabling easier correlation between configuration issues and the incidents they
generate.
Strata Cloud Manager leverages a set of predefined
Best Practice Checks that align
with industry-specific standard cybersecurity controls, such as CIS (Center for
Internet Security), and NIST (National Institute of Standards and Technology) and
custom checks you create based on the specific needs of your organization. These
checks evaluate configurations and settings within the cloud infrastructure,
identifying deviations from best practices or compliance requirements.
The security posture checks in Strata Cloud Manager encompass a range of
security domains, including network security, data protection, and identity and
access management. These checks assess firewall rules, encryption, authentication
mechanisms, and the overall integrity of configurations.
When your configuration detects deviations, Strata Cloud Manager provides
actionable insights and remediation recommendations, and can even automate some
parts of the process for correcting misconfigurations and noncompliant settings to
help you maintain a secure and compliant cloud environment with minimal manual
intervention.
Security posture settings bring together the functionality of both the AIOps and
Strata Cloud Manager security check settings pages.
Select to view, manage, and customize security posture checks for your
deployment to maximize relevant recommendations.
Security Checks – List of the best practice checks
that are used to evaluate your configuration.
Your configuration is compared against these checks to assess the security
posture of your devices and to generate security alerts. You can perform the
following actions to manage these checks based on your environment:
Set the severity level for your custom checks to identify the checks
that are the most critical to your deployment.
You can change the severity level for your custom checks, but the
severity levels for Palo Alto Networks Best Practice Checks are
fixed and can't be changed.
- Create and delete your own custom checks, clone and edit existing checks to
create new ones, and make special exceptions for
checks that you don't want applied to portions of your deployment.
As part of the initial rollout of these checks, you can clone
checks that are in the custom check framework.
Set the response when a check fails.
- Alert (default)—Raises an alert for the
failed check.
Block—Stop potential misconfigurations
before they enter your deployment. Block can mean any of the
following depending on how you manage it:
- Inline Checks on Strata Cloud
Manager—Prevents you from committing or pushing
a noncompliant configuration, but won't prevent you
from saving your configuration locally.
- Real-Time* Inline Checks on Strata Cloud
Manager—Prevents you from even saving a
noncompliant configuration.
- Panorama Managed**—Prevents you from
committing a noncompliant configuration to Panorama
but won't prevent you from saving it to the Panorama
candidate configuration.
- PAN-OS Web Interface, API, or CLI management—Block
has no enforcement effect on configurations that are
not either managed by Strata Cloud Manager or
Panorama.
- *Due to their logical complexity, some inline checks
are run asynchronously on a fixed schedule but not
in real time. A failure of a real-time check in your
configuration will prevent you from saving that
configuration, even locally.
- **The Panorama
CloudConnector Plugin is required to
enforce the block commit action on Panorama.
Security Check Exceptions
Zone to Role Mapping
Map the zones in NGFWs to roles to get customized recommendations.
Role-to-Security Service Mapping
Manage the security services needed for traffic between zones and roles in
all NGFWs.