Add an Azure Subscription on Prisma Cloud
Connect your Azure Commercial, Government, or Azure China subscription on Prisma Cloud to analyze traffic logs and monitor resources for potential security and compliance issues.
Connecting Prisma™ Cloud to your Azure cloud account enables you to analyze and monitor traffic logs, and detect potential malicious network activity or compliance issues. To enable API access between Prisma Cloud and your Microsoft Azure Subscription, you need to gather account information about your subscription and Azure Active Directory so that Prisma Cloud can monitor the resources in your cloud account.
If you are adding an Azure Commercial account, this workflow uses Terraform templates to streamline the set up process. The template automates the process of creating and registering Prisma Cloud as an application on your Active Directory and creating the Service Principal and associating the roles required to enable authentication.
If you do not want to use Terraform, or are adding an Azure Government or Azure China subscription, you must complete some tasks manually on the Azure portal.
Add Azure Commercial Subscription on Prisma Cloud
- Access Prisma Cloud and select.SettingsCloud AccountsAdd New
- SelectAzureas theCloud to Secure.
- Provide the basic details of the Azure account. On theGet Startedpage:
- Enter a descriptiveCloud Account Name. Replace the auto-populated Cloud Account Name with one that will uniquely identify your Azure subscription on Prisma Cloud.
- Onboardan AzureSubscriptionorTenant.
- SelectCommercialfor theAzure Cloud Type.
- On theSecurity Capabilities and Permissionspage, you have the option to enable permissions for the following additional capabilities. Based on your selection, Prisma Cloud dynamically generates a Terraform template that includes the associated permissions for the Prisma Cloud role. Prisma Cloud Role provides permissions for security capabilities required. By default, the role provides permissions for cloud discovery for resources and workloads, misconfiguration detection, and threat detection.Agentless Workload Scanning and Serverless Function Scanning are enabled by default. Workload Discovery is also automatically enabled to help you identify all the cloud-native services used on your cloud account. By default, the Prisma Cloud role is granted the appropriate permissions to monitor your cloud account.
- Enable and add permissions forAgentless Workload Scanningto scan hosts and containers for vulnerabilities and compliance risks without having to install a Defender. Scans start automatically once an account is onboarded. You can also update the scanning configuration for Agentless scans.
- Enable and add permissions forServerless Function Scanningto scan cloud provider functions like AWS Lambda, Azure and Google functions for vulnerabilities and compliance. Scans are automatically initiated once an account is onboarded. You can also update the scanning configuration for Serverless scans.
- Add permissions needed forAgent-Based Workload Protection. The permissions allow for automated deployment of Defenders to provide protection to secure cloud VMs, containers and Kubernetes orchestrators. Registry scanning, Kubernetes audits and other features required by defenders are also enabled.
- Enable Data Security to scan your resources to prevent data leaks. This is not enabled by default. After you onboard your account, further configuration is required to enable data scans.
- EnableRemediationto address policy violations reported for remediable Configuration policies on Prisma Cloud. This is not enabled by default. When enabled, the Prisma Cloud role gets read-write access permissions to your Azure cloud account to successfully execute remediation commands.Once your Azure account is onboarded on Prisma Cloud, the account is automatically available in Compute and enabled for Workload Discovery and Serverless function scans. You can also review the permissions required for individual security capabilities.
- Enter your Directory (Tenant) ID and Subscription ID.Prisma Cloud requires your AzureSubscription IDso that it can identify your Azure cloud account and retrieve the storage account and key vault information. YourDirectory (Tenant) IDidentifying your tenant is also required.
- Get the directory tenant id—In your Azure portal, clickPropertiesand copy theTenant ID.
- Get the subscription id—In your Azure portal, select, and then copyAll resources(Your Azure subscription)Subscription ID.
- Download the Terraform script to a system that has terraform installed and authenticated to Azure via the Azure CLI.Prisma Cloud recommends that you create a directory to store the Terraform template you download. This allows you to manage the templates when you add a different Azure subscription to Prisma Cloud. Give the directory a name that uniquely identifies the subscription for which you’re using it (for example, onboard-<subscription-name>).
- Run the commandterraform init.
- Next, run the commandterraform applyand clickConfirm.
- Populate the accounts fieldsApplication Client Secret,Application (Client) ID, and theEnterprise Application Object IDwith details from the Terraform template output.
- SelectIngest & Monitor Network Security Group flow logsto enable network incident investigations and clickNext.Network security group (NSG) flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through an NSG. You must first configure Network Security Groups on Azure and assign a storage account to enable Flow log ingestion on Prisma Cloud. Make sure that Azure Flow logs are stored within a storage account in the same region as the NSG. If you want to enable flow log ingestion, you must complete the tasks outlined in Step 9 in Register an App on Azure Active Directory. If you enable this option without setting it up on the Azure portal, Prisma Cloud will not be able to retrieve any Flow logs.
- Select theAccount Groupsyou want to add and clickNext.You must assign each cloud account to an account group, and Create an Alert Rule for Run-Time Checks to associate the account group with it to generate alerts when a policy violation occurs.
- ClickSave.If Prisma Cloud is able to successfully connect to your Azure subscription and retrieve information, the status is displayed with a green check mark. If Prisma Cloud is unable to retrieve the logs, the error message indicates what failed. See Troubleshoot Azure Account Onboarding for help.
- Verify that you can view the information on your Azure resources on Prisma Cloud.Depending on the number of resources in the accounts onboarded the data that was collected about your Azure resources can take up until a hour to display. After Prisma Cloud ingests data, the information is available for compliance checks, configuration review, audit history, and network visualization.It takes about four to six hours before you can view flow logs in Prisma Cloud. Prisma Cloud ingests flow logs from the previous seven days from when you onboard the account.
- Log in to Prisma Cloud.
- SelectInvestigateand enter the following RQL query.This query allows you to list all network traffic from the Internet or from Suspicious IP addresses with over 0 bytes of data transferred to a network interface on any resource on any cloud environment. Replace‘<cloud account name>’with the name of your actual cloud account.network from vpc.flow_record where cloud.account = '<cloud account name>' AND source.publicnetwork IN ( 'Internet IPs', 'Suspicious IPs' ) AND bytes > 0
Add Azure Commercial Subscription on Prisma Cloud—Manual
This workflow uses Azure portal to manually create your Azure resources to onboard to Prisma Cloud. After you register an app on Azure Active Directory, you will get the details to enter into Prisma Cloud so that you can continuous monitor your Azure resources for security vulnerabilities and to enforce compliance.
- Register an App on Azure Active Directory to get the app details.Save the information to a secure location on your computer.
- Access Prisma Cloud and select.SettingsCloud AccountsAdd New
- SelectAzureas theCloud to Secure.
- On theGet Startedpage Enter a descriptiveCloud Account Name. Replace the auto-populated Cloud Account Name with one that will uniquely identify your Azure subscription on Prisma Cloud.
- Select anAzure Subscription or Tenantthat you would like to Onboard.
- Next, choose anAzure Cloud Type.
- On theSecurity Capabilities and Permissionspage, you have the option to enable permissions for the following additional capabilities. Based on your selection, Prisma Cloud dynamically generates a Terraform template that includes the associated permissions for the Prisma Cloud role. Prisma Cloud Role provides permissions for security capabilities required. By default, the role provides permissions for cloud discovery for resources and workloads, misconfiguration detection, and threat detection.Agentless Workload Scanning and Serverless Function Scanning are enabled by default. Workload Discovery is also automatically enabled to help you identify all the cloud-native services used on your cloud account. By default, the Prisma Cloud role is granted the appropriate permissions to monitor your cloud account.
- Enable and add permissions forAgentless Workload Scanningto scan hosts and containers for vulnerabilities and compliance risks without having to install a Defender. Scans start automatically once an account is onboarded. You can also update the scanning configuration for Agentless scans.
- Enable and add permissions forServerless Function Scanningto scan cloud provider functions like AWS Lambda, Azure and Google functions for vulnerabilities and compliance. Scans are automatically initiated once an account is onboarded. You can also update the scanning configuration for Serverless scans.
- Add permissions needed forAgent-Based Workload Protection. The permissions allow for automated deployment of Defenders to provide protection to secure cloud VMs, containers and Kubernetes orchestrators. Registry scanning, Kubernetes audits and other features required by defenders are also enabled.
- Enable Data Security to scan your resources to prevent data leaks. This is not enabled by default. After you onboard your account, further configuration is required to enable data scans.
- EnableRemediationto address policy violations reported for remediable Configuration policies on Prisma Cloud. This is not enabled by default. When enabled, the Prisma Cloud role gets read-write access permissions to your Azure cloud account to successfully execute remediation commands.Once your Azure account is onboarded on Prisma Cloud, the account is automatically available in Compute and enabled for Workload Discovery and Serverless function scans. You can also review the permissions required for individual security capabilities.
- Enter your Directory (Tenant) ID and Subscription ID.Prisma Cloud requires your AzureSubscription IDso that it can identify your Azure cloud account and retrieve the storage account and key vault information. YourDirectory (Tenant) IDidentifying your tenant is also required.
- Get the directory tenant id—In your Azure portal, clickPropertiesand copy theTenant ID.
- Get the subscription id—In your Azure portal, select, and then copyAll resources(Your Azure subscription)Subscription ID.
- Enter your app details into Prisma Cloud.Enter theApplication (Client) ID,Application Client Secret, andEnterprise Application Object IDinto the Prisma Cloud UI and clickNext. These details are the output after you complete Step 1.KeepIngest and Monitor Network Security Group Flow Logsenabled to view your NSG flow logs.
Add Azure Government Subscription on Prisma Cloud
Connect your Azure Government subscription on Prisma Cloud to monitor resources for potential security and compliance issues.
- Add your Azure subscription on Prisma Cloud.
- Access Prisma Cloud and select.SettingsCloud AccountsAdd New
- SelectAzureas theCloud to Secure.
- Provide the basic details of the Azure account. On theGet Startedpage:
- Enter a descriptiveCloud Account Name. Replace the auto-populated Cloud Account Name with one that will uniquely identify your Azure subscription on Prisma Cloud.
- Onboardan AzureSubscriptionorTenant.
- SelectGovernmentfor theAzure Cloud Type.
- On theSecurity Capabilities and Permissionspage, you have the option to enable permissions for the following additional capabilities. Based on your selection, Prisma Cloud dynamically generates a Terraform template that includes the associated permissions for the Prisma Cloud role. Prisma Cloud Role provides permissions for security capabilities required. By default, the role provides permissions for cloud discovery for resources and workloads, misconfiguration detection, and threat detection.Agentless Workload Scanning and Serverless Function Scanning are enabled by default. Workload Discovery is also automatically enabled to help you identify all the cloud-native services used on your cloud account. By default, the Prisma Cloud role is granted the appropriate permissions to monitor your cloud account.
- Enable and add permissions forAgentless Workload Scanningto scan hosts and containers for vulnerabilities and compliance risks without having to install a Defender. Scans start automatically once an account is onboarded. You can also update the scanning configuration for Agentless scans.
- Enable and add permissions forServerless Function Scanningto scan cloud provider functions like AWS Lambda, Azure and Google functions for vulnerabilities and compliance. Scans are automatically initiated once an account is onboarded. You can also update the scanning configuration for Serverless scans.
- Add permissions needed forAgent-Based Workload Protection. The permissions allow for automated deployment of defenders to provide protection to secure cloud VMs, containers and Kubernetes orchestrators. Registry scanning, Kubernetes audits and other features required by defenders are also enabled.Once your Azure account is onboarded on Prisma Cloud, the account is automatically available in Compute and enabled for Workload Discovery and Serverless function scans. You can also review the permissions required for individual security capabilities.
- Enter yourSubscritption IDandTenant ID. Click theDownload Terraform Scriptbutton. From the Terraform script, enter yourApplication Client Secret,Application (Client) ID, and theEnterprise Application Object ID.SelectIngest & Monitor Network Security Group flow logsto enable network incident investigations and clickNext.Network security group (NSG) flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through an NSG. You must first configure Network Security Groups on Azure and assign a storage account to enable Flow log ingestion on Prisma Cloud. Make sure that Azure Flow logs are stored within a storage account in the same region as the NSG. If you want to enable flow log ingestion, you must complete the tasks outlined in Step 9 in Register an App on Azure Active Directory. If you enable this option without setting it up on the Azure portal, Prisma Cloud will not be able to retrieve any Flow logs.
- Select theAccount Groupsyou want to add and clickNext.You must assign each cloud account to an account group, and Create an Alert Rule for Run-Time Checks to associate the account group with it to generate alerts when a policy violation occurs.
- ClickSave.If Prisma Cloud was able to successfully make an API request to retrieve the Azure flow logs, the status is displayed with a green check mark. If Prisma Cloud is unable to retrieve the logs, the error message indicates what failed. See Troubleshoot Azure Account Onboarding for help.
- Verify that you can view the information on your Azure resources on Prisma Cloud.Wait for approximately 10-24 hours after you onboard the Azure subscription to Prisma Cloud, to review the data that was collected about your Azure resources. After Prisma Cloud ingests data, the information is available for compliance checks, configuration review, audit history, and network visualization.It takes about four to six hours before you can view flow logs in Prisma Cloud. Prisma Cloud ingests flow logs from the previous seven days from when you onboard the account.
- Log in to Prisma Cloud.
- SelectInvestigateand enter the following RQL query.This query allows you to list all network traffic from the Internet or from Suspicious IP addresses with over 0 bytes of data transferred to a network interface on any resource on any cloud environment. Replace'<Your Cloud Account Name>'with the name of your actual cloud account.network from vpc.flow_record where cloud.account = '<Your Cloud Account Name>' AND source.publicnetwork IN ( 'Internet IPs', 'Suspicious IPs') AND bytes > 0
Add an Azure China Subscription on Prisma Cloud
Connect your Azure China subscription on Prisma Cloud to monitor resources for potential security and compliance issues.
You require a Prisma Cloud instance in China to monitor or monitor and protect your deployments in the Microsoft Azure China regions. To get started with monitoring your subscriptions in Azure China, gather the details listed in Register an App on Azure Active Directory from the Azure China portal. When you add the subscription, Prisma Cloud monitors the configuration metadata for your IaaS and PaaS services and identifies potential resource misconfiguration and improper exposure. It also enables you to use data ingested from event logs and network flow logs for better visibility and governance.
When you onboard your Azure China subscription on Prisma Cloud, review the following differences as compared to Azure Commercial:
- Support for Terraform templates to onboard a cloud account for Azure China is not available.
- On app.prismacloud.cn, you cannot onboard any accounts that are not deployed on Azure China regions.
- Add your Azure subscription on Prisma Cloud.
- Log in to Prisma Cloud.
- SelectSettingsCloud AccountsAdd New
- SelectCloud TypeAzure and clickNext.
- Enter aCloud Account Name.
- Enter your AzureSubscription ID,Directory (Tenant) ID,Application (Client) ID,Application Client SecretandEnterprise Application Object ID.These are the details you collected from the Azure portal.
- SelectIngest & Monitor Network Security Group flow logsand clickNext.Network security group (NSG) flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through an NSG. Make sure that Azure Flow logs are stored within a storage account in the same region as the NSG. See Register an App on Azure Active Directory for the set up details to ensure that Prisma Cloud can successfully ingest NSG flow logs.
- Select theAccount Groupsyou want to add and clickNext.You must assign each cloud account to an account group, and Create an Alert Rule for Run-Time Checks to associate the account group with it to generate alerts when a policy violation occurs.
- Verify theStatusandSaveyour changes.If Prisma Cloud was able to successfully make an API request to retrieve the configuration metadata, the status is displayed with a green check mark. If Prisma Cloud is unable to retrieve the logs, the error message indicates what failed.Review the details for the account you added on.SettingsCloud Accounts
- Verify that you can view the information on your Azure resources on Prisma Cloud.Wait for approximately 1 hour after you onboard the Azure subscription to Prisma Cloud, to review the data that was collected about your Azure resources. After Prisma Cloud ingests data, the information is available for asset inventory, compliance checks and configuration review.
- Log in to Prisma Cloud.
- Select.InventoryAssetsView a snapshot of the current state of all cloud resources or assets that you are monitoring and securing using Prisma Cloud.
Update an Onboarded Azure Account
After onboarding your Azure account you may periodically want to review or update your existing security capabilities and permissions. Follow the steps below to enable or disable additional functionality:
- Navigate toSettings > Cloud Accounts. Use theCloud Typefilter in the upper-left to select only your Azure onboarded accounts.
- Click the edit icon in theActionscolumn to edit your Azure account.
- In theCompute Workload Protectionsection, you have the option to edit individual Compute capabilities.Workload Discoveryis included by default in your plan. This allows you to discover all the Compute workloads in your cloud account.
- To edit individual security capabilities follow the steps below:
- To enable a function such asAgentless Workload Scanning, click theEnable Agentless Workload Scanningbutton.
- On theSecurity Capabilities & Permissionspage toggle on theAgentless Workload Scanningfunction.
- On the Configure Account page, review your account settings and clickNext.
- Edit the Monitored Subscriptions to include or exclude subsets of accounts within a subscription.
- Select or deselect the appropriate account groups to enable security capabilities on theAssign Account Groupspage.
- Confirm your selections are checked in green underReview Statusand clickSave.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.