Compute user roles
Table of Contents
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
Compute user roles
You can assign roles to users to control their level of access to Prisma Cloud.
Roles determine what a user can do and see in Console, and the APIs he or she can access. Roles are enforced the same way for both the Prisma Cloud UI and API.
Prisma Cloud provides several pre-defined system roles you can assign to users and groups, as well as allows you to create your own customized roles.
Summary of system roles
The following table summarizes the system roles available in Prisma Cloud.
Role | Access level | Typical use case(s) |
---|---|---|
Administrator | Full read-write access to all Prisma Cloud settings and data. | Security administrators. |
Operator | Read-write access to all rules and data. Read-only access to user and group management, role assignments, and the global settings under Manage > System . | Security operations teams. |
Auditor | Read-only access to all Prisma Cloud rules and data. | Auditors and compliance staff that need to verify settings and monitor compliance. |
DevSecOps User | Read-only access to all results under Radar and Monitor , but no access to change policy or settings.Read-only access to Utilities. | DevSecOps personnel. |
Vulnerability Manager | Define policy and monitor vulnerabilities and compliance. | DevOps users that also need to define policy and monitor vulnerabilities and compliance. |
DevOps User | Read-only access to the Prisma Cloud CI vulnerability, compliance scan reports, and Utilities. | Developer, Operations, and DevOps personnel that need to know about and/or address the vulnerabilities in your environment. |
Defender Manager | Install, manage, and remove Defenders from your environment. | DevOps team members that need to manage Defender deployments without sysadmin privileges. Note : The permission groups you assign here only restrict access to what the user can do and see on the administrative Console. Defenders will collect and share information without differentiating which user deployed them. |
CI User | Run the Continuous Integration plugin only. | CI Users can only run the plugin and have no other access to configure Prisma Cloud. |
Let’s look at how two roles at the opposite end of the spectrum differ: Administrator and User.
Administrators set the security policy.
They decide who can run what Docker commands, and where they can be run.
Users need to run Docker commands to do their job.
Testers, for example, run Docker commands in the staging environment to test containers under development.
Testers, however, have no business starting containers in the production environment.
Administrators set a policy to assign testers the user role that lets testers run Docker commands in staging, but restricts their access to production.
System roles
This section describes the system roles Prisma Cloud supports.
Administrator
The Administrator can manage all aspects of your Prisma Cloud installation.
They have full read-write access to all Prisma Cloud settings and data.
Administrators can:
- Create and update security policies.
- Create and update access control policies.
- Create and update the list of users and groups that can access Prisma Cloud.
- Assign roles to users and groups.
- The Admin role is reserved for security administrators.
When Administrators log into Console, they have access to the full dashboard.
If you click on the profile button on the top right of the dashboard, you get the details of the currently logged in user (admin) and associated role (Administrator).

Operator
Operators can create and update all Prisma Cloud settings.
This role lets you view audit data and manage the rules that define your policies.
Operators cannot:
- Create, update, or delete users or groups.
- Assign or reassign roles to any user or group.
- Change the global settings underManage > System.
The Operator role is designed for members of your Security Operations team.
Auditor
Auditors get read-only access to all Prisma Cloud data, settings, and logs.
Auditors are typically members of your compliance team.
They verify that your Prisma Cloud setup meets your organization’s security requirements.
To verify compliance, they must be able to see your settings, but they do not need to make changes to them.
Auditors have access to the utilities page (
Manage > System > Utilities
).DevSecOps User
DevSecOps Users get access to all views under
Radar
and Monitor
.
Access to the Actions
menu in these views is disabled.
The Actions
menu lets you do things such as relearn models, protect services found by Cloud Discovery, and so on.DevSecOps Users get read only access to vulnerabilities and compliance policies under
Defend
.Under
Manage
, they only get access to Manage > System > Utilities
.
This page lets you download various Prisma Cloud components.
DevSecOps Users can download all files, except Defender images, which are disabled for this role.Vulnerability Manager
Vulnerability Managers define and monitor vulnerabilities and compliance policy.
Vulnerability Managers gain the following permissions:
- Read-write access toDefend > VulnerabilitiesandDefend > Compliance.
- Read-write access toMonitor > Vulnerabilities,Monitor > ComplianceandMonitor > Events > Trust Audits.
- Read-only access toManage > System > Utilities. TheUtilitiespage lets you download various Prisma Cloud components. Vulnerability Managers can download all files, except Defender images, which are disabled for this role.
DevOps User
DevOps Users get read-only access to the
Jenkins Jobs
and Twistcli Scans
tabs under Monitor > Vulnerabilities
and Monitor > Compliance
.
Each tab contains scan reports for images and serverless functions scanned using these tools.
DevOps Users can use Prisma Cloud scan reports and tools, for example, to determine why the CI/CD pipeline is stalled.DevOps Users get read only access to vulnerabilities and compliance policies under
Defend
.Under
Manage
, they only get access to Manage > System > Utilities
.
This page lets you download various Prisma Cloud components.
DevOps Users can download all files, except Defender images, which are disabled for this role.Defender Manager
Defender Managers get read-write access to
Manage > Defenders
and Manage > System > Utilities
.Defender Managers can install, manage, and remove Defenders from your environment.
The Defender Manager role was designed to let members of your DevOps team manage the hosts that Prisma Cloud protects without requiring Administrator-level privileges.
To help debug Defender deployment issues, Defender Managers get read-only access to Prisma Cloud settings and log files.
Defender Managers are typically members of your DevOps team.
They need to manage the hosts that Prisma Cloud protects, but they never need to alter any security policies.
Defender Managers are also used to automate Defender deployment.
If you use twistcli to deploy Defenders in your environment, create a service account with the Defender Manager role for the program that calls twistcli.
This role can see view the secrets that Defenders use to do their job, such as cloud credentials for registry scanning.
CI User
The CI user role can be assigned to users that should only be able to run the plugin but have no other access to configure Prisma Cloud or view the data that we have.
It is designed to only provide the minimal amount of access required to run the plugins.
A CI user cannot log into the Console or even view the UI Dashboard.
Custom roles
Prisma Cloud Compute allows you to create customized user roles to fit the needs of your organization.
When creating a role, you will be able to select which sections of the product the role will have access to and with what permissions - Read-Only or Read-Write.
The permissions you grant for a role will apply to both the Prisma Cloud UI and API.
Read permission will grant the role with access to all GET APIs for fetching data.
Write permission will grant the role with access to all other APIs (POST, PUT, DELETE, etc.) for saving data and performing actions, in addition to all GET APIs.
If a role allows access to policies, users with this role will be able to see all rules and all collections that scope rules under the Defend section, even if the user’s view of the environment is restricted by assigned collections.
Create custom roles
Create a new custom role under
Manage > Authentication > Roles
.- InManage > Authentication > Roles, clickAdd role.You can also use theCloneaction on an existing role, which copies its permissions and saves you the need to set them from scratch.
- Enter a name and a description for your custom role.
- Use theAccess to Console UItoggle to configure whether the role will have access to Prisma Cloud UI. Setting the toggle to off means that the role will only have access to the API (according to the permissions granted to it).
- Select the role’s permissions underRadars,Defend,Monitor, andManage. For each permission you can choose granting Read or Write access.
- ClickSave.Changes to role permissions while users are logged into Prisma Cloud Console only apply after users re-login.
Unique permissions
- Several permissions require other permissions in order to work properly. For example, roles that access policies typically require permissions for collections. These dependencies are highlighted when setting role permissions.If a role is missing permissions, the logged-in user will get a suitable message on the relevant page. Components to which he is missing permissions will be hidden or disabled.
- Some pages do not include write actions (e.g. Containers Radar), however you will still have the option to grant write permission to them. This will have no effect on the UI components and API calls the role has access to.
- Data updates pushed to client browserspermission is required in order to control access to sensitive information used to populate views in the UI. This data flows over the connection from the Console to client browsers and includes new audits, scan progress updates, etc. Granting no access to this permission will cause these updates to not be exposed in the UI until an active refresh of the browser.
Assign roles
To learn how to assign roles to users and groups, see Assign roles.