Strata Cloud Manager
Insights: Zero Trust Posture Center
Table of Contents
Expand All
|
Collapse All
Strata Cloud Manager Docs
Insights: Zero Trust Posture Center
Provides a conceptual overview of the Zero Trust Posture Center, detailing its
capabilities and integration points.
| Where Can I Use This? | What Do I Need? |
|---|---|
|
|
The Zero Trust Posture Center quantifies your security posture risk and
assesses your alignment with Zero Trust principles within Strata Cloud Manager. It
analyzes configuration data from your ecosystem to derive insights and provide an
actionable roadmap for achieving a Zero Trust architecture.
This feature is available in both the Essentials and Pro licensing tiers of
Strata Cloud Manager. In the Essentials tier, you get all of Palo Alto Networks best
practices, aligned to the zero trust framework. In the Pro tier, you get additional
insights from all Strata Cloud Manager posture features, including Policy Analyzer,
Policy Optimizer, Config Cleanup, and Custom Posture Checks.
Zero Trust Posture Center derives insights from NGFW and Prisma Access
configurations by analyzing configurations collected via telemetry, through the Panorama
CloudConnector Plugin, or directly from Strata Cloud Manager’s configuration manager.
Configurations are sent via device telemetry once a day, the CloudConnector plugin for
Panorama sends the configuration during each local commit, and Strata Cloud Manager
processes the configuration every 3 minutes.
The Zero Trust Posture Center integrates insights from several existing Strata
Cloud Manager capabilities to provide a unified posture assessment:
- Best Practice Checks - Assesses configurations against Palo Alto Networks\' predefined security best practices, aligning your environment with recommended standards.
- Policy Analyzer - Identifies and analyzes policy anomalies, such as shadowed, redundant, consolidated, correlated, and generalized rules, ensuring policies function as intended.
- Policy Optimizer - Identifies overly permissive security rules and recommends granular policy adjustments to enforce least privilege.
- Config Cleanup - Detects and highlights unused objects, zero-hit rules, zero-hit objects, and duplicate objects within your configuration, reducing complexity and attack surface.
Dashboard Architecture and Components
The Zero Trust Posture Center dashboard assesses your alignment with the Zero Trust
framework using Palo Alto Networks configuration best practices. For users with
Strata Cloud Manager Pro license tier, Zero Trust Posture Center dashboard displays
insights at the top of the dashboard to help identify high-risk areas and prioritize
immediate security tasks.
The BEST PRACTICES section provides a prescriptive guide to security,
assessing your alignment with the Zero Trust framework. It displays your overall
percentage of passed assessments and compares it against your industry's average
passing rate. Your overall posture breaks down into five Zero Trust pillars, each
with a percentage passing rate. Consider these factors when implementing in your
network:
- Optimize Configuration for Resiliency - Focuses on foundational infrastructure and network settings to ensure maximum availability and stability of your security platform.
- Identify All Users, Devices, and Applications - Assesses the deployment and effectiveness of User-ID™, Device-ID, and App-ID™ to ensure comprehensive visibility and accurate identification of all entities accessing your network.
- Enforce Least Privilege - Analyzes security policies to ensure they are not overly permissive and leverage Next-Generation Firewall features to restrict access to only what is strictly necessary.
- Apply Holistic Security Inspection - Verifies that security services are configured for comprehensive, real-time inspection of allowed traffic, operating in prevention mode to stop threats.
- Control Data Access and Movement - Focuses on mechanisms like Data Loss Prevention (DLP) and file blocking to protect sensitive data from unauthorized exfiltration or movement.
Impact and Recommendations
The Zero Trust Posture Center prioritizes security tasks by stack-ranking
impacts and providing detailed recommendations. The Current Impacts and
Recommendations section presents a prioritized list of recommendations for
addressing top active threats or impacts to your network security deployment. Each
impact card identifies a potential security impact, explains the associated risk,
lists detected active threats from logs, and provides specific recommendations. A
green percentage indicates the potential increase in your total passed percentage
upon resolving associated incidents.
The Zero Trust Posture Center integrates with the Unified Incident
Framework to guide your remediation process. Recommendations within impact cards
link directly to a filtered view of the Incidents list page, showing specific
incidents requiring resolution. Posture incidents are created on the configuration
object where checks fail. The Incident Detail page provides comprehensive
information for understanding and remediation, divided into four key areas:
- Standard incident info along with description.
- Remediation playbook for corrective steps.
- Evidence to identify the incorrect configuration and its path in the web interface.
- Activity log that consolidates all pertinent information required to understand, diagnose, and resolve the posture incident effectively.
Exception Management
You can create and manage exceptions for posture checks, and exempting those not
applicable to your environment. Once an exception is active, related incidents
automatically close if it was the only failing check. Zero Trust Posture Center
removes exempted checks from all calculations, ensuring your posture score
accurately reflects your specific security policy. Exceptions are tracked and
displayed as an independent dashboard metric. See Custom Posture Check.
Onboard to the Zero Trust Posture Center
This procedure guides you through accessing the Zero Trust Posture Center,
understanding its dashboard, identifying security risks, and initiating remediation
actions within your Strata Cloud Manager environment.
- Select Insights > Posture > Zero Trust Posture Center dashboard. This page provides an initial overview of your organization's zero trust posture.
- Filter the dashboard view to focus on specific products or devices.
- Select All, Prisma Access, or NGFW, in the top center of the Best Practice section to filter by product. This allows you to view posture assessments relevant to specific product deployments.
- If you manage multiple NGFWs, use the dropdown menu to select a specific NGFW device. This enables a granular view of the posture for individual NGFW instances.
- Review the dashboard insights and overall posture assessment.
- Observe the insights displayed across the top of the dashboard. These insights highlight high-risk areas and immediate security priorities for users with Strata Cloud Manager Pro license tier.
- Examine the Best Practice section to view your current alignment to the zero trust framework. This section provides a prescriptive guide for improving your security posture based on Palo Alto Networks' best practices.
- Check your organization's overall percentage of passed assessments and compare it to your industry’s average passing rate on the far left of the dashboard. This benchmark provides context on your security posture relative to your peers.
- Review the breakdown of the five critical zero trust pillars and their individual percentage passing rates. This breakdown helps you identify specific areas of strength and weakness within the zero trust framework, guiding where to focus your improvement efforts.
- Review Current Impact and Recommendations to understand potential risks and proposed solutions. This section prioritizes your remediation efforts by highlighting the most critical active threats and impacts to your network security deployment.
- For an impact card of interest, review the following details to get a comprehensive understanding of the security issue:
- Potential impact.
- Explanation of the risk.
- Any detected active threats from logs.
- Click the Recommendations link in the bottom right corner of the impact card to expand the list of suggested actions. Expanding the card reveals specific, actionable steps to address the identified impact and threats.
- Note the green percentage displayed at the top right of the card and next to each recommendation. This percentage indicates the potential increase in your total passing score if the associated incidents are resolved, aiding in your prioritization.
- Remediate incidents using the Unified Incident Framework.
- Select a Recommendations link within an expanded impact card. This action redirects you to a filtered view of the Incidents page within the Unified Incident Framework, showing only incidents relevant to the chosen recommendation.
- Select an individual incident from the list to load the incident detail page. This provides a comprehensive view of a specific posture incident, including all necessary information for resolution.
- Review the four key sections of the incident detail page to get all necessary context, guidance, and technical details to understand and resolve the incident:
- Standard incident info along with description.
- Remediation playbook for corrective steps.
- Evidence to identify the incorrect configuration and its path in the web interface.
- Activity log that consolidates all pertinent information required to understand, diagnose, and resolve the compliance incident effectively.
- Select Go to Configuration in the REMEDIATION PLAYBOOK to apply the necessary changes. This provides a direct link to the relevant configuration interface in Strata Cloud Manager, greatly simplifying the remediation process. For configurations managed by Panorama or NGFW, the link opens the manager web UI in a new tab; you must then follow the instructions in the incident details to find and modify the object configuration.
- Select View Incident Setting from the Action menu to create scope-based or global exceptions that prevent recommendations or Posture Checks from continuously flagging as non-compliant—for instance, if a check is not applicable or the configuration is intentionally non-standard. Zero Trust Posture Center respects these exceptions, and the assessed recommendation or Posture Check will be removed from all calculations. For more information, see Custom Posture Check.