Prisma Cloud—First Look

Get a high-level overview of Prisma™ Cloud.
When you Access Prisma Cloud, you first see the Alerts. You can then use the following tabs to interact with the data and visualize the traffic flow and connection details to and from the different resources in your cloud deployment; review the default policy rules and compliance standards; and explore how the web interface is organized to help you and DevSecOps teams to monitor cloud resources.
prisma-cloud-first-look.png
  • Dashboard
    —Get a graphical view of the health cloud (security and compliance posture) of your assets deployed across multiple public cloud environments.
  • Investigate
    —Identify security threats and vulnerabilities, create and save investigative queries, and analyze impacted resources.
  • Policies
    —Configure policies to maintain compliance and security.
  • Compliance
    —Monitor your cloud accounts against compliance standards (such as NIST, SOC 2, HIPAA, PCI, GDPR, ISO 27001:2013), create custom policies, and generate reports for offline viewing.
  • Alerts
    —View the list of discovered violations and anomalies, drill in to the details and look up remediation options, and create alert rules and notification templates.
  • Compute
    —Deploy the Prisma Cloud Defender in hosts, containers, and serverless environments to identify vulnerabilities, detect anomalous behavior, and provide least privilege micro-segmentation and runtime defense across the entire application lifecycle from CICD to runtime. You can deploy Prisma Cloud Defenders on heterogeneous environments, including Windows, Linux, Kubernetes, OpenShift, AWS Lambda, Azure Functions, GCP Cloud Functions,and more. Defenders can create IP table rules on the host to observe network traffic and to enforce both CNNF and CNAF firewall policies. For details see the Prisma Cloud Administrator’s Guide (Compute) ext-link-icon-small.png .
  • Settings
    —Add new cloud accounts and set up Prisma Cloud administrative users. You can also set up account groups, create users, associate roles and permissions, add external integrations including SAML integration (SSO), view audit logs, manage IP whitelisting, and view license and usage reporting, and modify the browser session timeout.
  • Profile
    —Maintain your profile,manage your credentials, and change the UI display language.

Recommended For You