Enforce Security Policy with Cloud Identity Engine
Focus
Focus
Identity

Enforce Security Policy with Cloud Identity Engine

Table of Contents

Enforce Security Policy with Cloud Identity Engine

Learn about enforcing security policy usign CIE.
Where Can I Use This?What Do I Need?
  • NGFW
  • Prisma Access
The Cloud Identity Engine service is free; however, the enforcement points utilizing directory data may require specific licenses. Click here for more information.
nforcing security policy with the Cloud Identity Engine transforms network defense from a static, IP-based model into a dynamic, identity-centric framework essential for Zero Trust. By serving as a centralized source of identity truth, the engine enables your enforcement points—whether Next-Generation Firewalls, Panorama, or Prisma Access—to validate users and devices consistently before granting access to network resources.
To implement this, you must associate your Cloud Identity Engine tenant with your Palo Alto Networks applications. This association grants your security infrastructure read-only access to synchronized directory data, allowing you to populate security policy rules with user and group names retrieved directly from the cloud. This integration supports both on-premises directories and cloud-based identity providers, ensuring comprehensive coverage across hybrid environments.
Once configured, policy enforcement becomes adaptive. The engine continually synchronizes attributes from your source directories; therefore, if a user changes roles or departments, their access privileges automatically update to reflect their new context without requiring manual firewall configuration changes. This capability allows you to maintain a strict principle of least privilege, ensuring that users can only access the applications and data necessary for their specific roles, regardless of their physical location.