Enforce compliance checks
Table of Contents
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
Enforce compliance checks
Prisma Cloud can monitor and enforce compliance settings across your environment.
Out of the box, Prisma Cloud supports hundreds of discrete checks that cover images, containers, hosts, clusters, and clouds.
Prisma Cloud provides predefined checks that are based on industry standards, such as the CIS benchmarks, as well as research and recommendations from Prisma Cloud Labs.
Your security teams can review these best practices and enable the ones that align with your organization’s security mandate and consistently enforce them across your environment.
Additionally, you can implement your own compliance checks with scripts.
Enforcement
Compliance rules are defined and applied in the same way as vulnerability rules.
When there is no matching rule for compliance checks on specific resources, Prisma Cloud generates alerts on all violations that are found.
For checks that can be performed on static images, those checks are performed as images are scanned (either in the registry or on local hosts).
Results are then displayed in the compliance reports under
Monitor > Compliance
on the Console.When compliance rules are configured with block actions, they are enforced when a container is created.
If the instantiated container violates your policy, Prisma Cloud prevents the container from being created.
Note that compliance enforcement is only one part of a defense in depth approach.
Because compliance enforcement is applied at creation time, it is possible that a user with appropriate access could later change the configuration of a container, making it non-compliant after deployment.
In these cases, the runtime layers of the defense-in-depth model provide protection by detecting anomalous activity, such as unauthorized processes.
Assume that you want to block any container that runs as root.
The flow for blocking such a container is:
- Prisma Cloud admin creates a new compliance rule that blocks containers from running as root.
- The admin optionally targets the rule to a specific resources, such as a set of hosts, images, or containers.
- Someone with rights to create containers attempts to deploy a container to the environment.
- Prisma Cloud compares the image being deployed to the compliance state that it detected when it scanned the image. For deploy-time parameters, the specific Docker client commands sent are also analyzed.
- If the comparison determines that the image is compliant with the policy, the 'docker run' command is allowed to proceed as normal, and the return message from Docker Engine is sent back to the user.
- If the comparison determines that the image is not compliant, the container_create command is blocked and Prisma Cloud returns an error message back to the user describing the violation.
- In both success and failure cases, all activities are centrally logged in Console and (optionally) syslog.
Supported runtimes
The supported runtimes for compliance are:
- Docker
- CRIO
- Containerd
Surveying Prisma Cloud compliance checks
As you configure your compliance policy, you might want more details for the built-in checks.
Teams that address compliance issues might also need more information about why checks fail, so that they can resolve the underlying issues.
As you explore the built-in checks, consider the following points.
CIS
Most built-in checks are based on the CIS benchmarks.
For full details about what a check does, and why, refer to the CIS benchmark documentation.
Prisma Cloud check IDs map to CIS benchmark IDs.
For example, Prisma Cloud check ID 51 maps to CIS Docker Benchmark 5.1
Check IDs
When creating compliance rules, there’s a drop-down menu that lets you filter checks by type.
Each type has a heading, which indicates the origin of the checks.
Checks from the CIS benchmarks are clearly labeled.

CRI checks
All CRI checks are direct analogs of the Docker CIS checks, but repurposed for CRI environments.
Twistlock Labs checks
For all other checks, including those from Twistlock Labs, we provide documentation.
- Twistlock Labs compliance checks for containers, images, Istio, and Linux hosts.
- Twistlock Labs compliance checks for serverless functions.
- Twistlock Labs compliance checks for Windows.
Creating compliance rules
This procedure shows you how to set up a container compliance rule to block any containers running as root.
- Open Console, then go toDefend > Compliance > Containers and Images.
- ClickAdd rule.
- Enter a rule name, such asmy-rule.
- In the search field underCompliance actions, enterContainer is running as root.As you type, the available checks are filtered to match your search query.
- For check 599 (Container is running as root), set the action toBlock.The "Block" effect for the unsupported compliance policies is disabled in the UI and set to "Ignore" and "Alert" only.
- InScope, accept the default collection,All. The default collection applies the rule to all containers in your environment.
- ClickSave.Your rule is now activated.
- Verify that your rule is being enforced.
- Connect to a host running Defender, then run the following command, which starts an Ubuntu container with a root user (uid 0).$ docker run -u 0 -ti library/ubuntu /bin/shDefender should block the command with the following message:docker: Error response from daemon: oci runtime error: [Prisma Cloud] Container operation blocked by policy: my-rule, has 1 compliance issues.
- Open Console, then go toDefend > Compliance > {Containers and Images | Hosts}.
- ClickAdd rule.
- Enter a rule name.
- UnderReported results, clickPassed and Failed Checks.
- ClickSave.Your rule is now activated.
- Verify that the compliance reports show both passed and failed checks.
- Go toDefend > Compliance, select any tab, then click on a resource in the table to open its scan report. You will see a list of checks that have both passed and failed.
Reporting full results
By default, Prisma Cloud reports only the compliance checks that fail.
Sometimes you need both negative and affirmative results to prove compliance.
You can configure Prisma Cloud to report checks that both pass and fail.
The contents of a full compliance report (both passed and failed checks) is the sum of all applied rules.
If your compliance policy raises an alert for only two checks, your compliance report will show the results of two checks.
To report on all compliance checks, set all compliance checks to either alert or block.