Focus
Focus
Table of Contents
End-of-Life (EoL)

Permissions by feature

When you set up Prisma Cloud Compute to secure your cloud workloads, you’ll need to ensure you’ve granted Prisma Cloud the right permissions. The following tables list the permissions required for each of Compute’s protection capabilities.

AWS

Feature
Protection Mode
Permissions
Condition
Prisma Cloud Templates Status
Role/Policy
Registry Scan
Monitor AND Monitor & Protect
Update both read-only & read-write templates
ecr:GetAuthorizationToken
Verified
PrismaCloud-ReadOnly-Policy-Compute
ecr:BatchCheckLayerAvailability
Verified
PrismaCloud-ReadOnly-Policy-Compute
ecr:GetDownloadUrlForLayer
Verified
PrismaCloud-ReadOnly-Policy-Compute
ecr:GetRepositoryPolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
ecr:DescribeRepositories
Verified
arn:aws:iam::aws:policy/SecurityAudit
ecr:ListImages
Verified
arn:aws:iam::aws:policy/SecurityAudit
ecr:DescribeImages
Verified
arn:aws:iam::aws:policy/SecurityAudit
ecr:BatchGetImage
Verified
PrismaCloud-ReadOnly-Policy-Compute
ecr:GetLifecyclePolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
ecr:GetLifecyclePolicyPreview
Verified
PrismaCloud-ReadOnly-Policy-Compute
ecr:ListTagsForResource
Verified
arn:aws:iam::aws:policy/SecurityAudit
ecr:DescribeImageScanFindings
Verified
arn:aws:iam::aws:policy/SecurityAudit
Serverless Scan
Monitor AND Monitor & Protect
Update both read-only & read-write templates
lambda:ListFunctions
Verified
arn:aws:iam::aws:policy/SecurityAudit
lambda:GetFunction
Verified
PrismaCloud-ReadOnly-Policy-Compute
iam:GetPolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetPolicyVersion
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetRole
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetRolePolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:ListAttachedRolePolicies
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:ListRolePolicies
Verified
arn:aws:iam::aws:policy/SecurityAudit
lambda:GetLayerVersion
Verified
PrismaCloud-ReadOnly-Policy-Compute
kms:Decrypt
Verified
PrismaCloud-ReadOnly-Policy-Compute
Serverless Auto Defend
Monitor & Protect ONLY
Update read-write templates ONLY
lambda:PublishLayerVersion
Verified
PrismaCloud-Remediation-Compute-Policy-ServerlessAutoDefend
lambda:UpdateFunctionConfiguration
Verified
PrismaCloud-IAM-Remediation-Policy
lambda:GetLayerVersion
Verified
PrismaCloud-ReadOnly-Policy-Compute
lambda:GetFunctionConfiguration
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:SimulatePrincipalPolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
lambda:GetFunction
Verified
PrismaCloud-ReadOnly-Policy-Compute
lambda:ListFunctions
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetPolicyVersion
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetRole
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:ListRolePolicies
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:ListAttachedRolePolicies
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetRolePolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetPolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
lambda:ListLayerVersions
Verified
arn:aws:iam::aws:policy/SecurityAudit
lambda:ListLayers
Verified
arn:aws:iam::aws:policy/SecurityAudit
lambda:DeleteLayerVersion
Verified
PrismaCloud-Remediation-Compute-Policy-ServerlessAutoDefend
kms:Decrypt
Verified
PrismaCloud-ReadOnly-Policy-Compute
kms:Encrypt
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:CreateGrant
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
Serverless Radar
Monitor & Protect ONLY
Update read-write templates ONLY
cloudwatch:DescribeAlarms
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetPolicyVersion
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetRole
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetPolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:GetRolePolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:ListRolePolicies
Verified
arn:aws:iam::aws:policy/SecurityAudit
iam:ListAttachedRolePolicies
Verified
arn:aws:iam::aws:policy/SecurityAudit
lambda:ListFunctions
Verified
arn:aws:iam::aws:policy/SecurityAudit
lambda:GetFunction
Verified
PrismaCloud-ReadOnly-Policy-Compute
lambda:ListAliases
Verified
arn:aws:iam::aws:policy/SecurityAudit
lambda:ListEventSourceMappings
Verified
arn:aws:iam::aws:policy/SecurityAudit
lambda:GetPolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
kms:Decrypt
Verified
PrismaCloud-ReadOnly-Policy-Compute
logs:DescribeSubscriptionFilters
Verified
arn:aws:iam::aws:policy/SecurityAudit
s3:GetBucketNotification
Verified
arn:aws:iam::aws:policy/SecurityAudit
elasticloadbalancing:DescribeListeners
Verified
arn:aws:iam::aws:policy/SecurityAudit
elasticloadbalancing:DescribeTargetGroups
Verified
arn:aws:iam::aws:policy/SecurityAudit
elasticloadbalancing:DescribeListenerCertificates
Verified
arn:aws:iam::aws:policy/SecurityAudit
elasticloadbalancing:DescribeRules
Verified
arn:aws:iam::aws:policy/SecurityAudit
cloudfront:ListDistributions
Verified
arn:aws:iam::aws:policy/SecurityAudit
events:ListRules
Verified
arn:aws:iam::aws:policy/SecurityAudit
apigateway:GET
Verified
arn:aws:iam::aws:policy/SecurityAudit
VM Tags Discovery
Monitor AND Monitor & Protect
Update both read-only & read-write templates
ec2:DescribeTags
Verified
arn:aws:iam::aws:policy/SecurityAudit
VM Images Scan
Monitor & Protect ONLY
Update read-write templates ONLY
ec2:CreateSecurityGroup
Verified
PrismaCloud-Remediation-Compute-Policy-AMIScan
ec2:DescribeSecurityGroups
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:RevokeSecurityGroupEgress
Verified
PrismaCloud-Remediation-Compute-Policy-AMIScan
ec2:AuthorizeSecurityGroupIngress
Verified
PrismaCloud-Remediation-Compute-Policy-AMIScan
ec2:DeleteSecurityGroup
Verified
PrismaCloud-Remediation-Compute-Policy-AMIScan
ec2:RunInstances
Verified
PrismaCloud-Remediation-Compute-Policy-AMIScan
ec2:DescribeInstances
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:TerminateInstances
Verified
PrismaCloud-Remediation-Compute-Policy-AMIScan
ec2:DescribeImages
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:CreateTags
Verified
PrismaCloud-Remediation-Compute-Policy-AMIScan
ec2:AuthorizeSecurityGroupEgress
Verified
PrismaCloud-Remediation-Compute-Policy-AMIScan
ec2:DescribeSubnets
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeVpcs
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeInstanceTypeOfferings
Verified
arn:aws:iam::aws:policy/SecurityAudit
Host Auto-Defend
Monitor & Protect ONLY
Update read-write templates ONLY
ec2:DescribeImages
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeInstances
Verified
arn:aws:iam::aws:policy/SecurityAudit
ssm:SendCommand
Verified
PrismaCloud-Remediation-Compute-Policy-HostAutoDefend
ssm:DescribeInstanceInformation
Verified
arn:aws:iam::aws:policy/SecurityAudit
ssm:ListCommandInvocations
Verified
PrismaCloud-Remediation-Compute-Policy-HostAutoDefend
ssm:CancelCommand
Verified
PrismaCloud-Remediation-Compute-Policy-HostAutoDefend
ssm:CreateAssociation
Verified
PrismaCloud-Remediation-Compute-Policy-HostAutoDefend
ec2:DescribeRegions
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeTags
Verified
arn:aws:iam::aws:policy/SecurityAudit
Alert Provider
Monitor AND Monitor & Protect
Update both read-only & read-write templates
securityhub:BatchImportFindings
Verified
PrismaCloud-ReadOnly-Policy-Compute
Secrets Manager
Agentless Scanning
Monitor & Protect
Update read-write templates ONLY
Scanning within the same Account (Individual Account Permissions)
ec2:CreateSnapshots
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:DescribeSnapshots
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DeleteSnapshot
{"StringEquals": {"ec2:ResourceTag/created-by": "prismacloud-agentless-scan"}
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:TerminateInstances
{"StringEquals": {"ec2:ResourceTag/created-by": "prismacloud-agentless-scan"}
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:CreateTags
{"StringEquals": {"ec2:ResourceTag/created-by": "prismacloud-agentless-scan"}
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:DescribeSubnets
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeSecurityGroups
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeVolumes
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeInstances
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:RunInstances
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:DescribeInstanceStatus
Verified
arn:aws:iam::aws:policy/SecurityAudit
ssm:GetParameters
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
sts:DecodeAuthorizationMessage
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
sts:GetCallerIdentity
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:Decrypt
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:GenerateDataKeyWithoutPlaintext
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:ReEncryptFrom
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:Encrypt
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:ReEncryptTo
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:DescribeKey
Verified
arn:aws:iam::aws:policy/SecurityAudit
kms:CreateGrant
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
iam:SimulatePrincipalPolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
Scanning within a dedicated account (Hub setup)
Permissions for Account being scanned by the Hub Account
ec2:CreateSnapshots
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:DeleteSnapshot
{"StringEquals": {"ec2:ResourceTag/created-by": "prismacloud-agentless-scan"}
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:ModifySnapshotAttribute
{"StringEquals": {"ec2:ResourceTag/created-by": "prismacloud-agentless-scan"}
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:CreateTags
{"StringEquals": {"ec2:ResourceTag/created-by": "prismacloud-agentless-scan"}
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:DescribeVolumes
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeInstances
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeSnapshots
Verified
arn:aws:iam::aws:policy/SecurityAudit
kms:Decrypt
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:GenerateDataKeyWithoutPlaintext
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:ReEncryptFrom
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:Encrypt
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:ReEncryptTo
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:DescribeKey
Verified
arn:aws:iam::aws:policy/SecurityAudit
kms:CreateGrant
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
iam:SimulatePrincipalPolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit
sts:GetCallerIdentity
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
sts:DecodeAuthorizationMessage
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
Scan Hub Account Permissions
ec2:TerminateInstances
{"StringEquals": {"ec2:ResourceTag/created-by": "prismacloud-agentless-scan"}
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:CreateTags
{"StringEquals": {"ec2:ResourceTag/created-by": "prismacloud-agentless-scan"}
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ssm:GetParameters
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:DescribeSubnets
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeSecurityGroups
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:DescribeInstances
Verified
arn:aws:iam::aws:policy/SecurityAudit
ec2:RunInstances
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ec2:DescribeInstanceStatus
Verified
arn:aws:iam::aws:policy/SecurityAudit
kms:Decrypt
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:GenerateDataKeyWithoutPlaintext
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:ReEncryptFrom
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:Encrypt
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:ReEncryptTo
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
kms:DescribeKey
Verified
arn:aws:iam::aws:policy/SecurityAudit
kms:CreateGrant
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
ssm:GetParameters
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
sts:DecodeAuthorizationMessage
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
sts:GetCallerIdentity
Verified
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
iam:SimulatePrincipalPolicy
Verified
arn:aws:iam::aws:policy/SecurityAudit

GCP

Feature
Protection Mode
Permissions
Prisma Cloud Templates Status
Role/Policy
Host Auto Defend
Monitor & Protect ONLY
Update read-write templates ONLY
osconfig.patchJobs.exec
Verified
Prisma Cloud Viewer
osconfig.patchJobs.list
Verified
Prisma Cloud Viewer
osconfig.patchJobs.get
Verified
Prisma Cloud Viewer
storage.buckets.create
Verified
Prisma Cloud Viewer
storage.buckets.delete
Verified
Prisma Cloud Viewer
storage.objects.create
Verified
Prisma Cloud Viewer
storage.objects.delete
Verified
Prisma Cloud Viewer
storage.objects.get
Verified
Prisma Cloud Viewer
storage.objects.list
Verified
Prisma Cloud Viewer
compute.disks.get
Verified
Prisma Cloud Viewer
compute.instances.list
Verified
Prisma Cloud Viewer
compute.zones.list
Verified
Prisma Cloud Viewer
compute.projects.get
Verified
Prisma Cloud Viewer
GCR Scan
Monitor AND Monitor & Protect
Update both read-only & read-write templates
artifactregistry.repositories.list
Verified
roles/viewer
artifactregistry.repositories.get
Verified
roles/viewer
artifactregistry.repositories.downloadArtifacts
Verified
roles/viewer
artifactregistry.files.list
Verified
roles/viewer
artifactregistry.files.get
Verified
roles/viewer
artifactregistry.packages.list
Verified
roles/viewer
artifactregistry.packages.listTagBindings
Verified
roles/viewer
artifactregistry.repositories.listEffectiveTags
Verified
roles/viewer
artifactregistry.packages.list
Verified
roles/viewer
artifactregistry.tags.list
Verified
roles/viewer
artifactregistry.tags.get
Verified
roles/viewer
artifactregistry.versions.list
Verified
roles/viewer
artifactregistry.versions.get
Verified
roles/viewer
Cloud Discovery
Monitor AND Monitor & Protect
Update both read-only & read-write templates
roles/storage.objectViewer
Verified
roles/viewer
roles/container.clusterViewer
Verified
roles/viewer
roles/cloudfunctions.viewer
Verified
roles/viewer
compute.instances.list
Verified
Prisma Cloud Viewer
compute.zones.list
Verified
Prisma Cloud Viewer
compute.projects.get
Verified
Prisma Cloud Viewer
VM Images Scan
Monitor & Protect ONLY
Update read-write templates ONLY
compute.disks.create
Verified
Prisma Cloud Viewer
compute.images.get
Verified
Prisma Cloud Viewer
compute.images.list
Verified
Prisma Cloud Viewer
compute.images.useReadOnly
Verified
Prisma Cloud Viewer
compute.instances.create
Verified
Prisma Cloud Viewer
compute.instances.delete
Verified
Prisma Cloud Viewer
compute.instances.get
Verified
Prisma Cloud Viewer
compute.instances.list
Verified
Prisma Cloud Viewer
compute.instances.setMetadata
Verified
Prisma Cloud Viewer
compute.instances.setTags
Verified
Prisma Cloud Viewer
compute.networks.get
Verified
Prisma Cloud Viewer
compute.networks.updatePolicy
Verified
Prisma Cloud Viewer
compute.networks.use
Verified
Prisma Cloud Viewer
compute.networks.useExternalIp
Verified
Prisma Cloud Viewer
compute.subnetworks.use
Verified
Prisma Cloud Viewer
compute.subnetworks.useExternalIp
Verified
Prisma Cloud Viewer
Serverless Scanning
Monitor AND Monitor & Protect
Update both read-only & read-write templates
cloudfunctions.functions.sourceCodeGet
Pending - to be added to Prisma templates