Deploy App-Embedded Defender in Azure Container Instance (ACI)
Table of Contents
Self.Hosted 30.xx
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan images in Alibaba Cloud Container Registry
- Scan images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan images in Google Container Registry (GCR)
- Scan images in Harbor Registry
- Scan images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger registry scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
Deploy App-Embedded Defender in Azure Container Instance (ACI)
Deploy an App-Embedded Defender in ACI to provide runtime protection to App-Embedded applications installed in ACI.
The App-Embedded Defender enforces runtime policy on the application entrypoint and any child processes created by this entrypoint.
To learn when to use App-Embedded Defenders, see Defender types.
To learn more about App-Embedded Defender’s capabilities, see:
System Requirements
- ACI supports Linux containers
- App-Embedded Defender image is supported on Linux (x86) architecture
- Any Docker image with Prisma Cloud App-Embedded Defender binary.
- Azure Container Registry (ACR) (recommended)
Configure App-Embedded Defender in Prisma Console UI
Prisma Console provides you with an App-Embedded Defender bundle that contains the Dockerfile with App-Embedded configurations and the Defender installation binary file.
You can select one of the
Deployment types
: Dockerfile or Manual.- Dockerfile: Creates a new Dockerfile based on your Dockerfile and embeds the App-Embedded parameters.
- Manual: Select the manual method to customize the required Dockerfile parameters in the Console UI and directly download the App-Embedded Defender binary file.
Prerequisites
- You can connect to Azure Container Registry(ACR) or any other registry used to pull your images.
- The container where you are embedding App-Embedded Defender can reach Console’s port 8084 over the network.
- You have the Dockerfile for your image if you choose theDeployment typeas Dockerfile.
Embed App-Embedded Defender with Dockerfile
Upload your Dockerfile and Prisma Cloud creates a new Dockerfile with App-Embedded Defender parameters and the Defender binary file.
- Log in to Prisma Cloud Console.
- Go toManage > Defenders > Deployed Defenders > Manual deploy.
- In Deployment method, selectSingle Defender.
- Select the Defender type asContainer Defender - App-Embedded.
- Select the DNS name (configured inManage > Defenders > Names (SAN)or public IP address that Defender will use to connect to Prisma Console.
- Enable file system runtime protectionto allow the sensors to monitor file system events regardless of how your runtime policy is configured, and could impact the underlying workload’s performance.
- Select Deployment type asDockerfile.
- InApp ID, enter a unique identifier for the App-Embedded Defender. All vulnerability, compliance, and runtime findings for the container will be aggregated under this App ID. In Console, the App ID is presented as the image name. Be sure to specify an App ID that lets you easily trace findings back to the image.
- InData folder, enter the path that the Defender will use to write files and store information.
- Dockerfile: Upload the Dockerfile for your container image. Set up the task’s entrypoint in the Dockerfile. The embed process modifies the container’s entrypoint to run the App-Embedded Defender first, which in turn starts the original entrypoint process. The Defender starts defending the app from the entrypoint and the thread/child process created by this entrypoint.
- Downloadthe App-embedded bundle that contains the Dockerfile with Defender deployment configurations appended to your Dockerfile and the App-Embedded Defender binary file.
- Rebuild the image and embed the Defender in ACI.
Embed App-Embedded Defender Manually
Embed App-Embedded Defender into a container image manually. Modify your Dockerfile with the given configurations, download the App-Embedded Defender binaries into the image’s build context, then rebuild the image.
Prerequisites
- At runtime, the container where you’re embedding App-Embedded Defender can reach Console over the network. For Enterprise Edition, Defender talks to Console on port 443. For Compute Edition, Defender talks to Console on port 8084.
- The host where you are rebuilding your container image with App-Embedded Defender can reach Console over the network on port 8083.
- You have the Dockerfile for your image.
- Log in to Prisma Cloud Console.
- Go toManage > Defenders > Deployed Defenders > Manual deploy.
- In Deployment method, selectSingle Defender.
- Select the Defender type asContainer Defender - App-Embedded.
- Select the DNS name (configured inManage > Defenders > Names (SAN)or public IP address that Defender will use to connect to Prisma Console.
- Enable file system runtime protectionto allow the sensors to monitor file system events regardless of how your runtime policy is configured, and could impact the underlying workload’s performance.
- SelectDeployment typeasManualFollow the instructions for embedding App-Embedded Defender into your image.
- Download the App-Embedded bundle using the command or download the file directly.
- Configure your Dockerfile and set the following environment variables:DEFENDER_TYPE="appEmbedded" ENV DEFENDER_APP_ID="Unique identifier for the App-Embedded Defender in Prisma Cloud Console" FILESYSTEM_MONITORING="true/false" WS_ADDRESS="Websocket address the Defender is communicating to" DATA_FOLDER="The path that Defender uses to store its metadata" INSTALL_BUNDLE="The access key for the Prisma Console, copy this from the Console" FIPS_ENABLED="true/false" ENTRYPOINT="Modify the entrypoint for the app to start the app under the control of App-Embedded Defender"Add the App-Embedded Defender to Dockerfile.ADD twistlock_defender_app_embedded.tar.gz <DATA_FOLDER>Modify the entrypoint so that your app starts under the control of App-Embedded Defender.Rebuild your image and embed the Defender in ACI.
Embed App-Embedded Defender in Azure ACI
Prisma Cloud uses the updated Dockerfile to deploy the Defender in your containers running in ACI.
Use the updated Dockerfile to build the image for App-Embedded Defender, push it to Azure Container Registry, and then run the container instance.
Prerequisite
:- Log in to Azure
- Create an Azure resource group
- Create an Azure ACI context
- You have an image of the Defender binary from the download App-Embedded zipped bundle from Prisma Cloud Console.
- You have the modified Dockerfile with App-Embedded Defender deployment configurations.
- Log in to your Azure instancesaz loginCopy the App-Embedded zipped bundle and unzip it to get the Dockerfile and App-Embedded Defender binary.Build the Dockerfile:docker build -t <Azure_Container_Registry>:<docker_image_name> <local_path_host_dockerfile>If your Dockerfile is in the current directory, use.for <local_path_host-Dockerfile>Start an Azure container instance from this image:
- Go toAzure Portal > Azure Container Registry > Repositories. Right-click on the App-Embedded image and selectRun Instance.
- Create a container instance and edit the following:
- Enter theContainer nameto be the same as the container image name in Azure.
- Select theOS typeas Linux (as Prisma Cloud only supports Linux x86 App-Embedded Defenders).
- SelectPublic IP addressif you need routable IPs to establish communication between Prisma Console and Defender installed in Azure.
- Enter thePortdefined for the APP in Dockerfile.
- SelectCreate.
In Azure Container instances, verify that your application shows arunningstatus. - Running tasks can connect to Prisma Cloud Console over the network.
- Prisma Cloud Defender connects to Console to retrieve runtime policies and send audits.
- Defender uses port 8084 to connect to the Prisma Cloud Console by default. You can configure the port number when you install the Prisma Cloud Console.
- The container where you’re embedding App-Embedded Defender can reach Console’s port 8084 over the network.
- You have Dockerfile for you image.
- Azure CLI.
- Log into Prisma Cloud Console.
- Run twistcli to embed Defender in Azure.A file named app_embedded_embed<app_id>.zip_ is created, that has the Dockerfile for App-Embedded Defender and App-Embedded Defender binary file.$ ./twistcli app-embedded embed \ --user <USER> \ --password <PASSWORD> \ --address "<CONSOLE_URL>" \ --app-id <APP-ID name> \ --data-folder /tmp \ <Docker-file-path-location>
- <user> — Name of a Prisma Cloud user with a minimum role of Defender Manager.
- <password> — For Prisma Cloud Enterprise Edition, you can also specify the secret key that you configured underPrisma > Settings > Access Control > Access Keys.
- <token> — API Token for authenticating with Prisma Cloud Console. (For Enterprise Edition only)
- <CONSOLE> — DNS name or IP address for Console.
- <APP-ID> — Unique identifier.When setting <APP-ID>, specify a value that lets you easily trace findings back to the image. All vulnerability, compliance, and runtime findings for the container will be aggregated under this App ID.In Console, the App ID is presented as the image name.
- <DATA-FOLDER> — Readable and writable directory in the container’s filesystem.
- To enable file system protection, add the --filesystem-monitoring flag to the twistcli command.
Unpack app_embedded_embed_help.zip.Create and push the docker image to ACR.- az login
- docker login <Azure-ID> -u <Azure_username> -p <Access_key_password>
- docker build -t <Azure-ID>/REPO:TAG <DockerfileTwistlock_Destination_file>
- Verify the image built docker images
- docker push <Registry>/REPO:TAG
- Check the image exists in Azure repo$ az acr repository show-tags \ --name <registry> \ --repository <repository> \ --top 10 \ --orderby time_desc \ --detailCreate a container instance (ACI)$ az container create -g <MyResourceGroup> \ --name <APP-EMBEDDED_NAME> \ --image <myAcrRegistry.azurecr.io/myimage:latest> \ --registry-username <username> \ --registry-password <password> \ --location "East US" \ --ip-address Public \ --os-type Linux \ --ports 8080 \ --cpu 1 \ --memory 1.5
Delete a container instance$ az container delete -g <MyContainerGroup> --name <Container-name> -yView Deployed DefendersYou can review the list of all Defenders connected to Console underManage > Defenders > Deployed Defenders.To narrow the list to just App-Embedded Defenders, filter the table by type Type: Container Defender - App-Embedded.By default, Prisma Cloud removes disconnected App-Embedded Defenders from the list after an hour. As part of the cleanup process, data collected by the disconnected Defender is also removed fromMonitor > Runtime > App-Embedded observations.There is an advanced settings dialog underManage > Defenders > Deployed Defenders, which lets you configure how long Prisma Cloud should wait before cleaning up disconnected Defenders. This setting doesn’t apply to App-Embedded Defenders. Disconnected App-Embedded Defenders are always removed after one hour.Trigger Events for App-embeddedRefer to Runtime defense for App-Embedded.Monitor App-Embedded EventsYou can view the App-Embedded runtime events by app ID underMonitor > Events > App-Embedded audits, and view the App-Embedded incidents underMonitor > Runtime > Incident Explorer.You can also deploy WAAS for Containers Protected By App-Embedded Defender, create a WAAS rule policy, add an app, enable protections, run WAAS sanity tests, and monitor the events underMonitor > Events > WAAS for App-Embedded.
Embed App-Embedded Defender with twistcli
Use the twistcli command line tool to embed an App-Embedded Defender in ACI.
Prerequisites
: