Code Repositories and Policy Management
Table of Contents
Prisma Cloud Enterprise Edition
Expand all | Collapse all
-
- Quick Start for Beginners
- Enable Application Security on Prisma Cloud
- Application Security Licenses
- Manage Roles and Permissions
- Generate Access Key
-
-
- Add Azure Repos to Prisma Cloud Application Security
- Add Bitbucket to Prisma Cloud Application Security
- Add Bitbucket Server to Prisma Cloud Application Security
- Add GitHub to Prisma Cloud Application Security
- Add GitHub Server to Prisma Cloud Application Security
- Add GitLab Self-Managed to Prisma Cloud Application Security
- Add GitLab to Prisma Cloud Application Security
-
- Add AWS Code Build to Prisma Cloud Application Security
- Add CircleCI to Prisma Cloud Application Security
- Add Checkov to Prisma Cloud Application Security
- Add GitHub Actions to Prisma Cloud Application Security
- Add Jenkins to Prisma Cloud Application Security
- Add Terraform Cloud (Sentinel)
- Add Terraform Cloud (Run Tasks)
- Add Terraform Enterprise (Sentinel)
- Add Terraform Enterprise (Run Tasks)
-
- Pre-receive Hooks
- Set up IaC Tag and Trace
- Setup Drift Detection
- Secrets Scanning
- Manage Workspaces
- Create and Manage Code Category views
Code Repositories and Policy Management
Prisma Cloud includes out-of-the-box policies that enable you to detect misconfigurations and provide automated fixes for security issues seen across your integrated code repositories and pipelines. On
Policies
you can review the list of configuration policies including custom policies using the subtype filter of Build
.You can create custom build policies for the following formats:
- Terraform- Policies written using Terraform attributes will apply for Terraform (.tf and plan files).
- CloudFormation- Policies written using CloudFormation attributes will apply for CloudFormation, AWS Serverless Application Model (SAM), and Cloud Development Kit (CDK).
In addition, Prisma Cloud also supports identification of custom secrets that you can define using regular expression patterns.
While defining the regular expression patterns consider the following parameters:
Add a New Custom Policy for Build-Time Checks
If you have custom requirements or want to define guardrails for your specific security or compliance needs, you have the flexibility to add new custom policies for your already existing repositories. As soon as you add Code & Build Providers both the out-of-the-box policies and custom policies are used to scan for potential issues.
- Create a custom configuration policy for build-time checks.
- SelectPolicies > Add Policy > Config.
- AddPolicy Name.Optionally, you can add aDescription. The description can include an overview of the error, prevention information and fix information in case of a policy error.
- SelectBuild.You can choose to only selectBuildor continue with the bothRunandBuildsubtypes. However, the following steps are only for Build subtype.To create a customize Run policies see Create a Custom Policy on Prisma Cloud
- SelectSeverityfor the policy.Prisma Cloud supports five levels of policy severity-Critical, High, Medium, Low and Informational.A policy severity helps define the impact of policy configuration on your environment, while helping you filter the misconfigurations after a scan onApplication Security > Projects.Optionally, you can addLabelsto the policy.In this example, you see a custom build policy for S3 Bucket ACL where log delivery is not recommended with the relevant policy details.
- SelectNext.
- Create a rule for custom configuration policy.In a custom configuration policy rule, you can define criteria to check the configuration for both run-time and build-time, that is for Run and Build policy subtypes; in the following steps you will create a policy rule for only build rule. To create a custom build policy rule you can choose between Code Editor and Visual Editor.
- Code Editor is the default view for Build policy rule and as an example YAML policy template is always available with guidelines on the console. You can choose this editor to create a custom policy rule using YAML policy templates.
- You can choose this editor to create a quick custom policy rule that supports creation of attribute checks without a Connection State and a support of AND/OR logic. You will use the existing fields on the console that are mostly auto-populated based on your selection.
- Add Compliance Standards for the Build policy.
- SelectStandard, RequirementandSections.
- Standardis the default compliance standard that is listed on the Prisma Cloud console.
- Requirementis influenced by the selection of the compliance standard.
- Sectionof may or may not be influenced by the compliance standard.
- SelectNext.
- Remediation for Build policy.Currently remediation recommendation for custom build policies is not available.
- Submit your custom policy.After you save the custom build policy, on the next scan, the onboarded resources are scanned against the new policy. The scan results display on theApplication Security > Projectswhere you can identify the resources that failed the check and triggered a policy violation.For custom secrets, policies are automatically disabled if there are more than 150 findings per repository. You can edit the policy onApplication Security > Projects.