Onboard AWS Accounts for Agentless Scanning
Table of Contents
Self.Hosted 31.xx
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
Onboard AWS Accounts for Agentless Scanning
Prisma Cloud gives you the flexibility to choose between agentless security and agent-based security using Defenders. Agentless scanning lets you inspect the risks and vulnerabilities of a cloud workload or container image without installing an agent or affecting the execution of your workload. Prisma Cloud supports agentless scanning for vulnerabilities and compliance on AWS hosts, containers, and clusters. To learn more, see How Agentless Scanning Works?
To onboard your AWS account for agentless scanning, you need to complete the following tasks.
- Apply the agentless scanning permission templates to the account for scanning.
- Create a security group to connect your AWS account and the Prisma Cloud Console.
Add an AWS Credential to the Prisma Cloud Compute Console
Authenticate your AWS account using its IAM users for agentless scanning. Agentless scanning in AWS only supports IAM users that are using an access key for authentication. An access key consists of an access key ID and a secret key. Create an IAM user in AWS to serve as an identity that represents a person or service interacting with AWS. You must use both the access key ID and secret access key of an access key together to authenticate requests with AWS. For more detailed information on how to create and maintain IAM users, go to the AWS documentation.
- Go to the IAM page for your AWS account at: https://console.aws.amazon.com/iam/
- Click Add user.
- Enter a user name and enableAccess key - Programmatic access. Agentless scanning uses this access to call the APIs and scan your AWS account.
- ClickNextto go to theSet permissionspage.
- Skip theSet permissionspage. You can get the needed permission templates after validating your credentials in the Prisma Cloud Console. ClickNext.
- Add tags as needed but no tags are needed for agentless scanning.
- ClickReview.
- Ignore the “This user has no permissions” warning and clickCreate user.
- Copy theAccess Key IDandSecret Keyfrom the AWS Console for this newly created user. You need to add this information when adding the credential to Prisma Cloud Compute Console.
- Go to the Prisma Cloud Compute Console.
- Go toManage > Cloud Accounts > Add Account.
- Select AWS as the cloud provider and Access Key as the authentication type.
- Paste the Access key and Secret key for the newly created user that you copied from the AWS Console.Following AWS best practices, you should rotate your keys every 90 days. Prisma Cloud raises an Alert when the age of the added credentials is greater than 90 days. If you follow this practice, rotate your keys at least every 90 days and update the credential in the Prisma Cloud Console.
Apply the Agentless Scanning Permission Templates
After adding credentials for your AWS cloud account to the Prisma Cloud Compute Console, you need to configure agentless scanning.
- After adding the AWS IAM credential, clickNextin the cloud account set up of the Prisma Cloud Compute Console.
- In theAgentless scanningtab, click theDownloadbutton to download agentless permission templates.When you click Download the Prisma Cloud Console performs the following actions:
- Validates the specified credentials and the download raises an error if the credentials are incorrect.
- Multiple permission templates are downloaded as JSON files.The permission templates provide the permissions required by each cloud account for each of the scanning modes. Learn more about the permission included in the downloaded template files and how they are used in the permissions by feature. You can scan AWS accounts using the same account or the hub account scanning modes. If you want to use an existing AWS account, you can use the awsAgentlessPermissions.json permissions template to grant it the needed permissions.
Same Account Mode
Using the same account scanning mode, you scan all hosts of a cloud account belonging to the same AWS cloud account. This scanning mode keeps the snapshots within the same AWS account where the hosts run and spins up the scanners using that same account.
- To scan accounts using this mode, you apply the permission template ending in _target_user_permissions.json to the AWS cloud account. For detailed instructions on how to apply cloud formation templates, refer to the AWS documentation.
- Create the needed AWS stack.
- Go to the AWS CloudFormation console for your account.
- Click theCreate stackdropdown in the top right corner and select theWith new resourcesoption.
- Click theCreate stackbutton.
- Select theTemplate is readyandUpload template fileoptions.
- UnderUpload a template file, click theChose filebutton. Select the template that you downloaded from the Prisma Cloud Compute Console for agentless scanning ending with _target_user_permissions.json.
- ClickNext.
- Enter aStack namefor the agentless scanning IAM user you created.
- ClickNextand use the default values in the following screens until you reach the finalCreate Stackpage.
- Verify that the IAM user has the permissions applied. The permissions appear as PCCAgentlessScanPolicy in thePermissionstab for the IAM user.
Hub Account Mode
Using the hub account scanning mode, you scan all hosts in one or more cloud accounts, which are called target accounts, from another dedicated cloud account. This dedicated cloud account is called a hub account and it spins up the agentless scanners. To use the hub account mode, you must complete the following steps.
- Add an AWS account to use as the hub account for agentless scanning to your Prisma Cloud Compute Console.
- Add the AWS account or accounts that you want to scan using Prisma Cloud agentless scanning.
Add the Hub Account
- To add a hub account, apply the permission template ending in _hub_user_permissions.json to the AWS cloud account. For detailed instructions on how to apply cloud formation templates, refer to the AWS documentation.
- Create the needed AWS stack.
- Go to the AWS CloudFormation console for your account.
- Click theCreate stackdropdown in the top right corner and select theWith new resourcesoption.
- Click theCreate stackbutton.
- Select theTemplate is readyandUpload template fileoptions.
- UnderUpload a template file, click theChose filebutton. Select the template that you downloaded from the Prisma Cloud Compute Console for agentless scanning ending with _hub_user_permissions.json.
- ClickNext.
- Enter aStack namefor the agentless scanning IAM user you created.
- ClickNextand use the default values in the following screens until you reach the finalCreate Stackpage.
- Verify that the IAM user has the permissions applied. The permissions appear as PCCAgentlessScanPolicy in thePermissionstab for the IAM user.When you add hub account credentials to the Prisma Cloud Console, you can turn off agentless scanning in the hub account unless you want to scan all hosts in that account as well. If that is the case, you must add the target user permissions to the hub account in addition to the hub account permissions.
- Go to the Prisma Cloud Compute Console.
- Go toManage > Cloud Accounts > Add Account.
- Select AWS as the cloud provider and Access Key as the authentication type.
- Paste the Access key and Secret key for the newly created user that you copied from the AWS Console.Following AWS best practices, you should rotate your keys every 90 days. Prisma Cloud raises an Alert when the age of the added credentials is greater than 90 days. If you follow this practice, rotate your keys at least every 90 days and update the credential in the Prisma Cloud Console.
- Once you add the hub account to Prisma Cloud, you can then add the target accounts.
Add your Target Accounts
- To add a target account, you apply the permission template ending in _target_user_permissions.json to the AWS cloud account. For detailed instructions on how to apply cloud formation templates, refer to the AWS documentation.
- Create the needed AWS stack.
- Go to the AWS CloudFormation console for your account.
- Click theCreate stackdropdown in the top right corner and select theWith new resourcesoption.
- Click theCreate stackbutton.
- Select theTemplate is readyandUpload template fileoptions.
- UnderUpload a template file, click theChose filebutton. Select the template that you downloaded from the Prisma Cloud Compute Console for agentless scanning ending with _target_user_permissions.json.
- ClickNext.
- Enter aStack namefor the agentless scanning IAM user you created.
- ClickNextand use the default values in the following screens until you reach the finalCreate Stackpage.
- Verify that the IAM user has the permissions applied. The permissions appear as PCCAgentlessScanPolicy in thePermissionstab for the IAM user.
- Go to the Prisma Cloud Compute Console.
- Go toManage > Cloud Accounts > Add Account.
- SelectAWSas the cloud provider andAccess Keyas the authentication type.
- Paste theAccess keyandSecret keyfor the newly created user that you copied from the AWS Console.Following AWS best practices, you should rotate your keys every 90 days. Prisma Cloud raises an Alert when the age of the added credentials is greater than 90 days. If you follow this practice, rotate your keys at least every 90 days and update the credential in the Prisma Cloud Console.
- In the Agentless scanning tab, select theHub Accountoption as theScanning type.
- Select the hub account you want to use from the dropdown menu.
- ClickNextto connect your AWS account with the Prisma Cloud Console.
Connect your AWS account with the Prisma Cloud Console
Prisma Cloud looks for the default VPC that AWS creates to connect your AWS account to the Prisma Cloud Console for scanning. If the default VPC is not available, you must create and specify a custom security group. Otherwise, the connection from your AWS account to the Prisma Cloud Console fails and no scan results are shown.
If you use the hub account scanning mode, you only need to create a security group in the hub account and not on each target account because the hub account is the only one that spins up the scanners.
Complete the following steps to create the needed security group if the default is unavailable.
- Follow AWS instructions for creating a custom security group in the Amazon VPC Console.
- Allow outbound connections to the Prisma Cloud Compute Console IP address and port. Complete these steps to find these values.
- Go to the Prisma Cloud Console.
- Go toManage > Cloud accounts.
- In the* Agentless scanning* tab, you can find theConsole URLandPort.
- In theAgentless scanningtab, go to theAdvanced settings.
- Enter the name of theSecurity groupyou created underNetwork resources.
- Set the advanced settings: The agentless scanning advanced settings allow you to make the following changes to the configuration to better suit your needs.
- Console URL and Port: Specify the Prisma Cloud Console URL and port that you use to connect your cloud account to the Prisma Cloud Console.
- Scanning type:
- Same Account: Scan hosts of a cloud account using that same cloud account.
- Hub Account: Scan hosts of a cloud account, known as the target account, using another cloud account, known as the hub account.
- HTTP Proxy: To connect to the Prisma Cloud Console through a proxy, specify the proxy’s URL.
- Regions: Specify the regions you want to scan.
- Exclude VMs by tags: Specify the tags used to ignore specific hosts. For example: example:tag
- Scan non-running hosts: Enable to scan stopped hosts that are not currently running.
- Auto-scale scanning: When turnedON, Prisma Cloud automatically scales multiple scanners up or down for faster scans without any user-defined limits. Use this feature for large scale deployments.
- Number of scanners: Define an upper limit to control the number of scanners Prisma Cloud can automatically spin up in your environment. Depending on the size of your environment, Prisma cloud scales scanners up or down within the given limit for faster scans.
- Security groups: In AWS, you can enter a security group name
- Cloud Discovery: Use the toggle to enable or disable the cloud discovery features.
- Click theAdd account buttonfor new cloud accounts or theSave buttonfor existing cloud accounts to complete the configuration.
Start an Agentless Scan
Agentless scans start immediately after onboarding the cloud account.
By default, agentless scans are performed every 24 hours, but you can change the interval on the
Manage > System > Scan
page under Scheduling > Agentless
.
To manually start a scan, complete the following steps.
- Go toManage > Cloud accounts.
- Click the scan icon on the top right corner of the accounts table.
- ClickStart Agentless scan.
- Click the scan icon in the top right corner of the console to view the scan status.
- View the results.
- Go toMonitor > Vulnerabilities > HostsorMonitor > Vulnerabilities > Images.
- Click on theFilter hoststext bar.
- Select theScanned byfilter.
- Select theAgentlessfilter.