Focus
Focus
Table of Contents

Permissions by feature

When you set up Prisma Cloud Compute to secure your cloud workloads, you’ll need to ensure you’ve granted Prisma Cloud the right permissions. The following tables list the permissions required for each of Compute’s protection capabilities.
You can review the permissions needed for agentless scanning in each cloud service provider:

AWS

The following table shows the required permissions needed if you are using AWS. You can also review the permissions needed for agentless scanning in AWS.
Capability
Feature
Permissions
Role/Policy
Condition
Workload Discovery
Workload Discovery
Serverless Radar
cloudwatch:DescribeAlarms
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
iam:GetPolicyVersion
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
iam:GetRole
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
iam:GetPolicy
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
iam:GetRolePolicy
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
iam:ListRolePolicies
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
iam:ListAttachedRolePolicies
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
lambda:ListFunctions
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
lambda:GetFunction
PrismaCloud-ReadOnly-Policy-Compute
Workload Discovery
Serverless Radar
lambda:ListAliases
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
lambda:ListEventSourceMappings
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
lambda:GetPolicy
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
kms:Decrypt
PrismaCloud-ReadOnly-Policy-Compute
Workload Discovery
Serverless Radar
logs:DescribeSubscriptionFilters
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
s3:GetBucketNotification
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
elasticloadbalancing:DescribeListeners
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
elasticloadbalancing:DescribeTargetGroups
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
elasticloadbalancing:DescribeListenerCertificates
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
elasticloadbalancing:DescribeRules
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
cloudfront:ListDistributions
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
events:ListRules
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
Serverless Radar
apigateway:GET
arn:aws:iam::aws:policy/SecurityAudit
Workload Discovery
VM Tags Discovery
ec2:DescribeTags
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Agent-Based Workload Scan
Registry Scanning
ecr:GetAuthorizationToken
PrismaCloud-ReadOnly-Policy-Compute
Agent-Based Workload Scan
Registry Scanning
ecr:BatchCheckLayerAvailability
PrismaCloud-ReadOnly-Policy-Compute
Agent-Based Workload Scan
Registry Scanning
ecr:GetDownloadUrlForLayer
PrismaCloud-ReadOnly-Policy-Compute
Agent-Based Workload Scan
Registry Scanning
ecr:GetRepositoryPolicy
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Registry Scanning
ecr:DescribeRepositories
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Registry Scanning
ecr:ListImages
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Registry Scanning
ecr:DescribeImages
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Registry Scanning
ecr:BatchGetImage
PrismaCloud-ReadOnly-Policy-Compute
Agent-Based Workload Scan
Registry Scanning
ecr:GetLifecyclePolicy
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Registry Scanning
ecr:GetLifecyclePolicyPreview
PrismaCloud-ReadOnly-Policy-Compute
Agent-Based Workload Scan
Registry Scanning
ecr:ListTagsForResource
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Registry Scanning
ecr:DescribeImageScanFindings
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
lambda:PublishLayerVersion
PrismaCloud-Remediation-Compute-Policy-ServerlessAutoDefend
Agent-Based Workload Scan
Serverless Auto Defend
lambda:UpdateFunctionConfiguration
PrismaCloud-IAM-Remediation-Policy
Agent-Based Workload Scan
Serverless Auto Defend
lambda:GetLayerVersion
PrismaCloud-ReadOnly-Policy-Compute
Agent-Based Workload Scan
Serverless Auto Defend
lambda:GetFunctionConfiguration
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
iam:SimulatePrincipalPolicy
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
lambda:GetFunction
PrismaCloud-ReadOnly-Policy-Compute
Agent-Based Workload Scan
Serverless Auto Defend
lambda:ListFunctions
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
iam:GetPolicyVersion
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
iam:GetRole
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
iam:ListRolePolicies
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
iam:ListAttachedRolePolicies
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
iam:GetRolePolicy
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
iam:GetPolicy
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
lambda:ListLayerVersions
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
lambda:ListLayers
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Serverless Auto Defend
lambda:DeleteLayerVersion
PrismaCloud-Remediation-Compute-Policy-ServerlessAutoDefend
Agent-Based Workload Scan
Serverless Auto Defend
kms:Decrypt
PrismaCloud-ReadOnly-Policy-Compute
Agent-Based Workload Scan
Serverless Auto Defend
kms:Encrypt
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
Agent-Based Workload Scan
Serverless Auto Defend
kms:CreateGrant
PrismaCloud-Remediation-Compute-Policy-AgentlessScanning
Agent-Based Workload Scan
VM Images Scan
ec2:CreateSecurityGroup
PrismaCloud-Remediation-Compute-Policy-AMIScan
Agent-Based Workload Scan
VM Images Scan
ec2:DescribeSecurityGroups
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
VM Images Scan
ec2:RevokeSecurityGroupEgress
PrismaCloud-Remediation-Compute-Policy-AMIScan
Agent-Based Workload Scan
VM Images Scan
ec2:AuthorizeSecurityGroupIngress
PrismaCloud-Remediation-Compute-Policy-AMIScan
Agent-Based Workload Scan
VM Images Scan
ec2:DeleteSecurityGroup
PrismaCloud-Remediation-Compute-Policy-AMIScan
Agent-Based Workload Scan
VM Images Scan
ec2:RunInstances
PrismaCloud-Remediation-Compute-Policy-AMIScan
Agent-Based Workload Scan
VM Images Scan
ec2:DescribeInstances
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
VM Images Scan
ec2:TerminateInstances
PrismaCloud-Remediation-Compute-Policy-AMIScan
Agent-Based Workload Scan
VM Images Scan
ec2:DescribeImages
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
VM Images Scan
ec2:CreateTags
PrismaCloud-Remediation-Compute-Policy-AMIScan
Agent-Based Workload Scan
VM Images Scan
ec2:AuthorizeSecurityGroupEgress
PrismaCloud-Remediation-Compute-Policy-AMIScan
Agent-Based Workload Scan
VM Images Scan
ec2:DescribeSubnets
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
VM Images Scan
ec2:DescribeVpcs
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
VM Images Scan
ec2:DescribeInstanceTypeOfferings
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Host Auto-Defend
ec2:DescribeImages
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Host Auto-Defend
ec2:DescribeInstances
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Host Auto-Defend
ssm:SendCommand
PrismaCloud-Remediation-Compute-Policy-HostAutoDefend
Agent-Based Workload Scan
Host Auto-Defend
ssm:DescribeInstanceInformation
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Host Auto-Defend
ssm:ListCommandInvocations
PrismaCloud-Remediation-Compute-Policy-HostAutoDefend
Agent-Based Workload Scan
Host Auto-Defend
ssm:CancelCommand
PrismaCloud-Remediation-Compute-Policy-HostAutoDefend
Agent-Based Workload Scan
Host Auto-Defend
ssm:CreateAssociation
PrismaCloud-Remediation-Compute-Policy-HostAutoDefend
Agent-Based Workload Scan
Host Auto-Defend
ec2:DescribeRegions
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Host Auto-Defend
ec2:DescribeTags
arn:aws:iam::aws:policy/SecurityAudit
Agent-Based Workload Scan
Secrets Manager
Agent-Based Workload Scan
Alert Provider
securityhub:BatchImportFindings
PrismaCloud-ReadOnly-Policy-Compute
Serverless Function Scanning
Serverless Function Scanning
lambda:ListFunctions
arn:aws:iam::aws:policy/SecurityAudit
Serverless Function Scanning
lambda:GetFunction
PrismaCloud-ReadOnly-Policy-Compute
Serverless Function Scanning
iam:GetPolicy
arn:aws:iam::aws:policy/SecurityAudit
Serverless Function Scanning
iam:GetPolicyVersion
arn:aws:iam::aws:policy/SecurityAudit
Serverless Function Scanning
iam:GetRole
arn:aws:iam::aws:policy/SecurityAudit
Serverless Function Scanning
iam:GetRolePolicy
arn:aws:iam::aws:policy/SecurityAudit
Serverless Function Scanning
iam:ListAttachedRolePolicies
arn:aws:iam::aws:policy/SecurityAudit
Serverless Function Scanning
iam:ListRolePolicies
arn:aws:iam::aws:policy/SecurityAudit
Serverless Function Scanning
lambda:GetLayerVersion
PrismaCloud-ReadOnly-Policy-Compute
Serverless Function Scanning
kms:Decrypt
PrismaCloud-ReadOnly-Policy-Compute
Serverless Function Scanning
ec2:DescribeTags
arn:aws:iam::aws:policy/SecurityAudit
Serverless Function Scanning

Agentless Permissions

The following table shows the required permissions, conditions, and resources for agentless scanning.
Permission
Same Account
Hub Account
Target Account
Condition
Resource
Purpose
Mandatory
Removal Effect
ec2:CreateSnapshots
Yes
No
Yes
-
*
Create snapshots of hosts to be scanned by the scanner instance
Yes
ec2:CreateSnapshot
Yes
No
Yes
-
*
Create snapshot of hosts to be scanned by the scanner instance
Yes
ec2:DeleteSnapshot
Yes
No
Yes
"ec2:ResourceTag/created-by": "prismacloud-agentless-scan"
*
Delete snapshot of hosts that were created during the scan process
Yes
ec2:TerminateInstances
Yes
Yes
No
"ec2:ResourceTag/created-by": "prismacloud-agentless-scan"
*
Terminate scanner instance
Yes
ec2:DescribeVolumes
Yes
No
Yes
-
*
Discovering volumes to scan
Yes
ec2:DescribeInstances
Yes
Yes
Yes
-
*
Discovering instances to scan
Yes
ec2:DescribeSnapshots
Yes
No
Yes
-
*
Acquire snapshot status to allow deploying the scanner only when all snapshots up and running
Yes
ec2:RunInstances
Yes
Yes
No
-
*
Run the scanner instance
Yes
ec2:DescribeInstanceStatus
Yes
Yes
No
-
*
Track scanner instance status
Yes
ec2:DescribeSubnets
Yes
Yes
No
-
*
Validate subnet status - ensure subnet exists
Yes
ec2:DescribeSecurityGroups
Yes
Yes
No
-
*
Validate security group status - ensure security group exists
Yes
ec2:CreateTags
Yes
Yes
No
"aws:RequestTag/created-by": "prismacloud-agentless-scan"
"arn:aws:ec2:*:*:instance/
" "arn:aws:ec2:
:*:volume/*"
Tag PCC resources created during the scan process
Yes
ec2:CreateTags
Yes
No
Yes
"aws:RequestTag/created-by": "prismacloud-agentless-scan"
"arn:aws:ec2:*::snapshot/*"
Tag PCC resources created during the scan process
Yes
ec2:DescribeInstanceTypes
Yes
No
Yes
-
*
Get available VM types on the region for grouping
Yes
sts:DecodeAuthorizationMessage
Yes
Yes
Yes
-
*
Decode UnauthorizedOperation response from the AWS API
Yes
ssm:GetParameters
Yes
Yes
No
-
*
Discover the scanner AMI
Yes
ec2:DescribeImages
Yes
No
Yes
-
*
Disocver specifc AMIs metadata
Yes
sts:GetCallerIdentity
Yes
Yes
Yes
-
*
Get metadata about the account (e.g., check for disabled regions, ec2 instances metadata)
Yes
iam:SimulatePrincipalPolicy
Yes
Yes
Yes
-
*
Validate the effective permissions granted to the Prisma Cloud role
Yes
iam:CreateServiceLinkedRole
Yes
Yes
No
"arn:aws:iam::*:role/aws-service-role/spot.amazonaws.com/*"
"iam:AWSServiceName": "spot.amazonaws.com"
Create a linked service role for spot instance request
Yes
ec2:DescribeVPCs
Yes
Yes
No
-
*
Discover the VPC to be used by the scanner instance
Yes