Focus
Focus
Table of Contents

Configure Cloud Discovery

Set up Prisma Cloud to scan your cloud service provider accounts for cloud-native resources and services. Then configure Prisma Cloud to protect them with a single click.
Prerequisite:
You create service accounts for your cloud service providers with the minimum required permissions.
  1. Log in to Prisma Cloud Compute Console.
  2. Select
    Compute > Manage > Cloud Accounts
    .
  3. Select the accounts to scan. If there are no accounts in the table, use the
    + Add account
    button to onboard your cloud accounts.
    • On GCP: If you select organization level GCP credentials, for an organization with hundreds of projects, the performance of the Google Cloud Registry discovery might be affected due to long query time from GCP. The best approach to reduce scan time and avoid potential timeouts is to divide the projects in your organization into multiple GCP folders. Then create a service account and credential for each folder, and use these credentials for cloud discovery.
    • On Azure: If you create a credential in the credentials store under
      Manage > Authentication > Credentials store
      , your service principal authenticates with a password. To authenticate with a certificate, onboard the cloud service provider.
  4. Enable
    Cloud discovery
    .
  5. Click
    Add account
    to save the changes.
  6. Review the scan report.
    1. Go to
      Compute > Manage > Cloud Accounts
      to view the scan report as a table.
      1. Select the
        Show account details
        icon to see the discovery scan results for resources within the cloud account.
    2. Go to
      Radar
      and select
      Cloud
      to view the scan report as a graphic.
    3. Click
      Defend
      for the entities you want Prisma Cloud to scan for vulnerabilities.
      When you click
      Defend
      , a new scan rule is proposed. Select the appropriate credential, tweak the scan rule as desired, then click
      Add
      .
    4. Go to the scan reports under
      Monitor > Vulnerabilities
    5. Select
      Hosts
      ,
      Registry
      , or
      Functions
      to see the pertinent report.

Recommended For You