Cloud Native Network Segmentation (CNNS)
Table of Contents
Self.Hosted 31.xx
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
Cloud Native Network Segmentation (CNNS)
Cloud Native Network Segmentation (CNNS) is a Layer 4 container and host-aware virtual firewall and network monitoring tool that enables you to segment your network and compartmentalize communication between the segments as a part of a comprehensive defense strategy.
CNNS works as an east-west firewall for containers and hosts.
When enabled, CNNS automatically displays communications in your environment on Radar.
Radar has a container and a host view, where you can view the network topology for your containerized apps and hosts respectively.
You can then define rules to enforce what traffic to allow or block across the network entities.
For all connections that are monitored using policies, you can set up an alert profile to send it to an external integration such as email.
Get Started with CNNS
CNNS leverages the Defenders that are deployed on your hosts and containers to monitor how your containers and hosts connect and communicate with each other in real-time.
The Defender inspects the connection before it is set up.
Defender adds iptables rules to observe the TCP three-way handshake and watch for SYN messages required to set up new connections.
When SYN messages arrive, Defender evaluates them to track all connections.
After a connection is established, traffic flows directly between the source and destination without any further oversight from Defender.
From the Radar view, you can identify how you want to segment your network, create network objects to represent each entity that is a source or a destination for traffic, and define policies to enforce what is allowed, alerted on, or blocked between these network objects.
You can then audit the connection events to analyze how the policy is enforced, both for CNNS for Containers and CNNS for Hosts.
- Confirm that you have deployed Defenders on your hosts and containers.You will need Container Defenders-Windows, for the Windows Hosts.And for Linux, Container Defenders-Linux or Defenders-Linux, running on the supported x86_64 and ARM64 Linux OS. See the system requirements.
Create CNNS Rules
Prerequisite
:- Enable CNNS for hosts and containers underCompute > Radars > Settings.NOTE: When CNNS is disabled, it displays limited traffic flow data on Radar, including outbound connections to the Internet and connections local to the node itself. You can create CNNS rules for enforcing access on specific ports or protocols for outbound traffic from hosts and containers on which Defenders are deployed.
- Create Network objects underCompute > Radars > Settings.CNNS policies use Network Objects for defining the source and destination in a rule.
- Add CNNS policy fromCompute > Defend > CNNS.You can add a maximum of 255 rules.
- To add a rule for containers:
- SelectContainer > Add rule.
- Select aSource.The source for a container rule must be a network object of type "Image".
- Select aDestination.The destination can be another container, subnet or DNS.
- Select a port or range of ports.For example * for any ports, a specific port number such as 80 or 443, or a range of ports such as 10-100.
- Select theEffect. The actions you can enforce are alert to allow the connection and generate an event, allow the connection, or prevent to deny connection and generate an event from the source to the destination on the specified port or domain name.
- Savethe rule.
- To add a rule for hosts:
- SelectHost > Add rule.
- Select aSource.The source for a host rule must be a network object of type host.
- Select aDestination.The destination can be another host or subnet.
- SelectPorts.For example * for any ports, a specific port number such as 80 or 443, or a range of ports such as 10-100.
- Select theEffect. The actions you can enforce are alert, allow, or prevent to deny traffic from the source to the destination on the specified port or domain name.
- Save the rule.CNNS rules are indicated by dotted lines in the Radar view.
Monitor CNNS Audit Events
You can view all connections to the CNNS hosts and containers.
- SelectCompute > Monitor > Events.
- Filter forCNNS for containersorCNNS for hoststo view the relevant connection attempts.
- Explore more details on the audit event.You can view the runtime model for a container.
Notifications for CNNS Alerts
On
Compute > Manage > Alerts
, you can add an alert profile to enable alert notifications for CNNS alerts.
The first event is sent immediately; all subsequent runtime events are aggregated hourly.