Add Your GCP Project to Prisma Cloud
Add a single GCP project or multiple GCP projects to Prisma Cloud.
Begin here to add a GCP project to Prisma™ Cloud. If you want to add multiple projects, you must either repeat this process for each project you want to onboard or you allow Prisma Cloud to automatically monitor all GCP projects—current and future—that use the Service Account attached to the project you are adding to Prisma Cloud. Prisma Cloud refers to this service account as a Master Service Account.
After you start monitoring your project using Prisma Cloud, if you delete the project on GCP, Prisma Cloud learns about it and automatically deletes the account from the list of monitored accounts on . To track the automatic deletion of the project, an audit log is generated with information on the name of the deleted account and the date that the action was performed.
Settings
Cloud Accounts
- Access Prisma Cloud and select.SettingsCloud AccountsAdd Cloud Account
- SelectGoogle Cloudas theCloud to Secure.
- Enter anAccount Name.An account name is auto-populated for you. You can replace it with an account name that uniquely identifies your GCP project on Prisma Cloud.
- SelectProjectforOnboardand enter yourProject IDand the name of yourFlow Log Storage Bucket.Make sure to enter your Project ID and not your Project Number.The Terraform template does not enable flow logs, and you must complete the workflow in Enable Flow Logs for GCP Projects for Prisma Cloud to retrieve flow logs. Additionally, if you want to enable flow log compression on Prisma cloud and address the lack of native compression support for flow logs sink setup on GCP, you must do it manually too. When you enableUse Dataflow to generate compressed logs, Prisma Cloud sets up the network and compute resources required for flow log compression and this can take up to five minutes.When you enable flow logs, the service ingests flow log data for the last seven days. Then if flow logs become unavailable for any reason such as if you manually disabled flow logs, modified API permissions, or an internal error occurred, when access is restored, logs from the preceding seven days only are ingested.
- (Optional) Allow Prisma Cloud to monitor all current and future GCP projects associated with the service account.If you have multiple GCP projects, enableAutomatically onboard projects that are accessible by this service accountto allow Prisma Cloud to monitor all current and future GCP projects associated with the Service Account. For every project that you want to onboard, you must provide the same set of permissions to the service account.If a project you onboard, or a project that you had onboarded is in the following format<sys-26-digit number>, then it will be deleted.
- Select theSecurity Capabilities and Permissionsthat you want to enable. Based on your selection, Prisma Cloud dynamically generates aTerraform Scriptthat includes the associated permissions for the Prisma Cloud role.By default,Agentless Workload ScanningandServerless Function Scanningare enabled.Workload Discoveryis also automatically enabled to help you find all cloud-native services being used on your Google account to help mitigate exposure.
- Enable and add permissions forAgentless Workload Scanningto scan hosts and containers for vulnerabilities and compliance risks without having to install a defender. Scans start automatically once you onboard your account. You can also update scanning configuration for agentless scans.
- Enable and add permissions forServerless Function Scanningto scan cloud provider functions such as, Google functions for vulnerabilities and compliance. Scans start automatically once you onboard your account. You can also update scanning configuration for serverless scans.
- Add permissions forAgent Based Workload Protection. The permissions allow for automated deployment of defenders to provide protection to secure cloud VMs, containers, and Kubernetes orchestrators. Registry scanning, Kubernetes audits, and other features required by defenders are also enabled.
- EnableRemediationto address policy violations reported for remediable configuration policies on Prisma Cloud. This feature is not enabled by default. After you enable it, the Prisma Cloud role gets read-write access permissions to your Google cloud account to successfully execute remediation commands.After you onboard your Google account on Prisma Cloud, the account is automatically available in Compute and enabled forWorkload DiscoveryandServerless Functionscans. You can also review the permissions required for individual security capabilities.
- Set up the Service Account for Prisma Cloud.
- Download Terraform Script.Prisma Cloud recommends that you create a directory to store the Terraform template you download. This allows you to manage the templates when you add a different Google project to Prisma Cloud. Give the directory a name that uniquely identifies the project for which you’re using it (for example, onboard-<project-name>).
- Open a new tab on your browser and sign in to Google Cloud Shell.
- Upload the script to the Cloud Shell.After the Terraform script is ran, a JSON file will be created that saves the credentials to a file with the following format:projectId-randomString.json
- Download the JSON file.Click on the vertical ellipsis on the header and then selectDownload.
- While authenticated on Prisma Cloud, clickDrag and drop file hereorBrowse Fileto upload the JSON file to Prisma Cloud and clickNext.
- Enable the GCP APIs on all projects in the GCP console.You must enable the Stackdriver Logging API (logging.googleapis.com) to monitor audit logs and any other GCP APIs for which you want Prisma Cloud to monitor resources, on all GCP projects; enabling it only of the project that hosts the service account is not adequate. For example, in the Google Cloud Shell, enter:gcloud services enable serviceusage.googleapis.com appengine.googleapis.com bigquery.googleapis.com cloudfunctions.googleapis.com dataflow.googleapis.com dns.googleapis.com dataproc.googleapis.com cloudresourcemanager.googleapis.com cloudkms.googleapis.com sqladmin.googleapis.com compute.googleapis.com storage-component.googleapis.com recommender.googleapis.com iam.googleapis.com container.googleapis.com monitoring.googleapis.com logging.googleapis.comHere’s a screen shot of how this command looks in Google Cloud Shell:
- Select the Account Groups to associate with your project and clickNext.You must assign each cloud account to an account group, and Create an Alert Rule for Run-Time Checks to associate the account group with it to generate alerts when a policy violation occurs.
- Review the onboardingStatusof your GCP project to Prisma Cloud and clickSave.You can review the status and take necessary actions to resolve any issues encountered during the onboarding process by viewing theCloud Accountspage. It takes between 4-24 hours for the flow log data to be exported and analyzed before you can review it on Prisma Cloud. To verify if the flow log data from your GCP project has been analyzed, you can run a network query on theInvestigatepage.
- Go toCloud Accounts, locate your GCP project and view the status.If Prisma Cloud GCP IAM role does not have adequate permissions to ingest data on the monitored resources within your project, the status icon displays as red or amber and it lists the permissions that are missing.
- Go toInvestigate, replace the name with your GCP Account name and enter the following network query.This query allows you to list all network traffic from the Internet or from Suspicious IP addresses with over 0 bytes of data transferred to a network interface on any resource on any cloud environment.network from vpc.flow_record where cloud.account = ‘{{cloud account name}}’ AND source.publicnetwork IN (‘Internet IPs’, ‘Suspicious IPs’) AND bytes > 0
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.