Features Introduced in September 2022
Table of Contents
Prisma Cloud Enterprise Edition
Expand all | Collapse all
-
-
- Features Introduced in September 2023
- Features Introduced in August 2023
- Features Introduced in July 2023
- Features Introduced in June 2023
- Features Introduced in May 2023
- Features Introduced in April 2023
- Features Introduced in March 2023
- Features Introduced in February 2023
- Features Introduced in January 2023
-
- Features Introduced in December 2022
- Features Introduced in November 2022
- Features Introduced in October 2022
- Features Introduced in September 2022
- Features Introduced in August 2022
- Features Introduced in July 2022
- Features Introduced in June 2022
- Features Introduced in May 2022
- Features Introduced in April 2022
- Features Introduced in March 2022
- Features Introduced in February 2022
- Features Introduced in January 2022
- Limited GA Features on Prisma Cloud
- Look Ahead—Planned Updates on Prisma Cloud
- Prisma Cloud Known Issues
-
-
- Features Introduced in September 2023
- Features Introduced in August 2023
- Features Introduced in July 2023
- Features Introduced in June 2023
- Features Introduced in May 2023
- Features Introduced in April 2023
- Features Introduced in March 2023
- Features Introduced in February 2023
- Features Introduced in January 2023
- Features Introduced in December 2022
- Features Introduced in November 2022
- Features Introduced in September 2022
- Features Introduced in July 2022
- Features Introduced in June 2022
- Features Introduced in March 2022
- Features Introduced in February 2022
- Look Ahead — Planned Updates on Prisma Cloud Compute
- Prisma Cloud Compute Known Issues
-
-
- Features Introduced in September 2023
- Features Introduced in August 2023
- Features Introduced in July 2023
- Features Introduced in June 2023
- Features Introduced in May 2023
- Features Introduced in April 2023
- Features Introduced in March 2023
- Features Introduced in February 2023
- Features Introduced in January 2023
-
- Features Introduced in December 2022
- Features Introduced in September 2022
- Features Introduced in August 2022
- Features Introduced in July 2022
- Features Introduced in June 2022
- Features Introduced in May 2022
- Features Introduced in April 2022
- Features Introduced in March 2022
- Features Introduced in January 2022
- Look Ahead—Planned Updates on Prisma Cloud Application Security
-
Features Introduced in September 2022
Learn about the new Code Security capabilities on Prisma™ Cloud Enterprise Edition (SaaS) in September 2022.
The following new features or enhancements are available for Prisma Cloud Code Security. These capabilities help agile teams add security checks to their existing IaC (Infrastructure-as-Code) model and enforce security throughout the build lifecycle.
New Features
Feature | Description |
Software Composition Analysis (SCA) | Software Composition Analysis (SCA) enables you to continuously scan any open source packages defined in your source code. The scan enables you to find and fix vulnerabilities in code and identify license violations earlier in the development lifecycle so that you can address risks in a timely manner. The scan runs across all integrations of repositories, IDE and CI/CD pipelines to give you:
![]() |
New Policies and Policy Updates
Policy Updates | Description |
New Configuration Build Policies | New build policies are available on Prisma Cloud Code Security module for the following categories:
|
Addition of Build Checks to Existing Configuration Run Policies | The following configuration policies now include build time checks. With this change, these policies perform checks for Run, Build configuration issues:
|
Build Policy Updates-Metadata | The --anonymous-auth argument is not set to False Changes— The policy name has been updated to support Prisma Cloud’s naming guidelines.
Impact— No impact on alerts. |
The --authorization-mode argument is set to AlwaysAllow Changes— The policy name has been updated to support Prisma Cloud’s naming guidelines.
Impact— No impact on alerts. | |
The --profiling argument is not set to False Changes— The policy name has been updated to support Prisma Cloud’s naming guidelines.
Impact— No impact on alerts. | |
The --tls-cert-file and --tls-private-key-file arguments are not set appropriately Changes— The policy name has been updated to support Prisma Cloud’s naming guidelines.
Impact— No impact on alerts. | |
securityContext is not applied to pods and contianers Changes— The policy name has been updated to fix the typo error.
Impact— No impact on alerts. | |
Repository is not Private Changes— The policy name and description has been updated as follows:Current Name— Repository is not PrivateUpdated Name— GitHub repository is not PrivateCurrent Description— Ensure Repository is PrivateUpdated Description— Ensure GitHub repository is private |
Changes in Existing Behavior
Change | Description |
Code Editor for Build Policies | With this release, you can Test your YAML policy template when creating a rule for a custom policy in build-time checks (Policies Add Policy Config Additionally, information such as Name and Severity will not be displayed in the existing example of the YAML policy template on the console. However, this information will still be visible in your YAML code file. For example, in your VCS .![]() |
REST API Updates
CHANGE | DESCRIPTION |
Prisma Cloud Code Security | The following new APIs are available for Code Security that allow you to retrieve the code review and integrated VCS repositories metadata, list of affected resources for suppression, BOM report and Checkov version details, single repository and tag rule details, and enforcement rules. |