Prisma Cloud—First Look

Get a high-level overview of Prisma™ Cloud.
When you Access Prisma Cloud, you first see the Alerts. You can then use the following tabs to interact with the data and visualize the traffic flow and connection details to and from the different resources in your cloud deployment; review the default policy rules and compliance standards; and explore how the web interface is organized to help you and DevSecOps teams to monitor cloud resources.
  • Dashboard
    —Review the overall state of the top assets and alerts across the assets monitored by Prisma Cloud.
  • Inventory
    —Get a graphical view of the health cloud (security and compliance posture) of your assets deployed across multiple public cloud environments.
  • Investigate
    —Identify security threats and vulnerabilities, create and save investigative queries, and analyze impacted resources.
  • Policies
    —Configure policies to maintain compliance and security.
  • Compliance
    —Monitor your cloud accounts against compliance standards (such as NIST, SOC 2, HIPAA, PCI, GDPR, ISO 27001:2013), create custom policies, and generate reports for offline viewing.
  • Alerts
    —View the list of discovered violations and anomalies, drill in to the details and look up remediation options, and create alert rules and notification templates.
  • Compute
    —Deploy the Prisma Cloud Defender in hosts, containers, and serverless environments to identify vulnerabilities, detect anomalous behavior, and provide least privilege micro-segmentation and runtime defense across the entire application lifecycle from CICD to runtime. You can deploy Prisma Cloud Defenders on heterogeneous environments, including Windows, Linux, Kubernetes, OpenShift, AWS Lambda, Azure Functions, GCP Cloud Functions, and more. Defenders can create IP table rules on the host to observe network traffic and to enforce both CNNF and CNAF firewall policies. For details see the Prisma Cloud Administrator’s Guide (Compute) .
  • Code
    —Continuously assess the security posture of code repositories and review the policy violations across the monitored environments. If you have enabled the Cloud Code Security module, use the Code page to find and fix or suppress security issues in code. For details see the Prisma Cloud Code Security Administrator’s Guide .
  • Network Security
    —Enforce identity-based network defense across hosts, containers, and Kubernetes, and gain visibility of network flows to identify application dependencies in a map. If you have enabled the Identity-Based Microsegmentation module, protected workloads are assigned cryptographic identities, which the workloads then use to mutually authenticate and authorize application communication requests. For details, see the Prisma Cloud Microsegmentation Administrator’s Guide
  • Settings
    —Add new cloud accounts and set up Prisma Cloud administrative users. You can also set up account groups, create users, associate roles and permissions, add external integrations including SAML integration (SSO), view audit logs, add trusted IP addresses, view license and usage reporting, and modify the browser session timeout.
  • Alarms
    —Alarms notify you about system-level issues and errors related to external integrations and onboarded Cloud Accounts. When enabled, alarms are notifications about the system failures on Prisma Cloud and are not related to alerts.
  • Subscription
    —Review the license status of your subscription and enable any add-on features that are available to you.
  • Adoption Advisor
    —Get visibility into your adoption journey, and use the guided walkthroughs to unlock additional security features on Prisma Cloud.
  • Profile
    —Maintain your profile, view the Prisma Cloud roles that you are allocated and switch across the roles, and change the UI display language.

Recommended For You