Use the Prisma Cloud Plugin for IntelliJ IDEA

With the Prisma Cloud Enterprise edition license, you can install the IntelliJ IDEA plugin that enables you to check Infrastructure-as-Code (IaC) templates and deployment files against Prisma Cloud IaC policies, within your integrated development environment (IDE). The following steps show how simple it is to install and check your IaC templates and files for potential security misconfigurations.
If you were using version 1.2 or earlier of the Prisma Cloud plugin for IntelliJ IDEA, you must update the plugin to version 3.0.0 or later. Use the instructions in this section to set up the plugin with the updated Prisma Cloud API URL and enter the credentials that are required to authenticate to Prisma Cloud.

Install the Prisma Cloud Plugin for IntelliJ

The Prisma Cloud plugin supports IntelliJ IDEA version 2016.2 and above.
  1. In IntelliJ IDEA, select
    (on macOS, select
  2. On the
    page, select
    and search for
    Prisma Cloud
  3. Install
    the plugin.
    Restart the IDE and verify that the Prisma Cloud plugin displays in the list of

Configure the Prisma Cloud Plugin for IntelliJ

After you install the plugin, you must provide the Prisma Cloud API URL and Prisma Cloud access key information to authenticate and start scanning you IaC templates. If your access key changes, you’ll need to update the access key information in this configuration.
  1. In IntelliJ IDEA, select
    Prisma Cloud Plugin
    (on macOS, select
    Prisma Cloud Plugin
  2. Enter the following information to set up the plugin.
    • Prisma Cloud API URL
      The URL for Prisma Cloud varies depending on the region and cluster on which your tenant is deployed. The tenant provisioned for you is, for example, or Replace
      in the URL with
      and enter it here. Refer to the Prisma Cloud REST API Reference, which is accessible from the Help Center within the Prisma Cloud web interface for more details.
    • Access Key
      The access key enables programmatic access to Prisma Cloud. If you do not have a key, you must Create and Manage Access Keys.
    • Secret Key
      You should have saved this secret key when you generated it. You cannot view it on the Prisma Cloud web interface.
    • Asset Name
      Enter an asset name to identify the repository you want to scan.
    • Tags
      Define tags to organize the templates that are scanned with this service connection, for visibility on Prisma Cloud.
  3. Add the Prisma Cloud configuration file.
    The Prisma Cloud configuration file supports IaC scanning of complex module structures and variable formats. To add this file, create a subdirectory and file .prismaCloud/config.yml in the root folder of your project or repository branch. See Set Up Your Prisma Cloud Configuration File for IaC Scan for details.

Scan Using the Prisma Cloud Plugin for IntelliJ

Now, you are ready to scan your templates and view the results before you check it in to the repository or pipeline.
You must have a Prisma Cloud Enterprise edition license and valid credentials to scan IaC templates.
  1. Scan the files for insecure configurations.
    Right-click to scan your template file or folder in the IDEA
    window and select
    Prisma Scan
    If you are using Helm Charts then you must right-click on the directory containing Chart.yml; do not click on Chart.yml itself.
  2. View the results of the scan in the
    Scan Result
    tool window.
    The title of the Scan Result window includes the date and time of the scan. For each scan, a new scan result window is added. The tab situated farthest to the right displays the results of the latest scan.
    If the scan detects no potential issues, the message displays as follows:
    If the scan detects any policy violations, the scan result displays the following details for each violation.
    • Severity: Low, Medium or High.
    • Name of the violation.
    • File names in which violations are found.
    • Policy URL for details.
    The end of the table shows the files which were not scanned with the corresponding error message. By default, the results are sorted by severity. You can also sort the Scan Result using the policy name.
  3. The following examples show scan results for templates in which vulnerabilities were found.

Recommended For You