Features Introduced in February 2020
Learn what’s new on Prisma™ Cloud in February 2020.
Features Introduced on February 26, 2020
Prisma Cloud has an update to the Service Names that are displayed for each cloud provider. For details, see Service Name Changes.
Asset Inventory and Compliance Overview—Usability Enhancements
The inline links on the
take you to the
Asset Explorer, and the
View Alertslinks enable you to view all open alerts on
filtered by severity.
API Ingestion Update
RQL Config queries with joins support
json.rulespecification within the alias clause
For faster search results in a join operation, you can now use
json.ruleas part of the alias clause within a Configuration RQL,
For example, to get a list of all EC2 instances that use a specified snapshot ID and AMI, you can use the query:
instead of using
Search within the JSON Resource configuration
Prisma Cloud administrative console provides a new search window directly within the JSON Resource configuration on the
Investigatepage. Use this search to easily find something that is part of the metadata ingested on Prisma Cloud, and speed up your investigation.
Policy Name and Description
A set of AWS policies that identify the AWS regions where you have not enabled AWS Log metric filter and alarms to monitor configuration changes, and detect unauthorized, or malicious activities. The following policies are now available:
Azure Monitor log profile does not capture all activities—Identifies the Monitor log profiles which are not configured to capture all activities for the categories ''Write'', ''Delete'' and ''Action'' for the control/management plane activities performed on the subscription.
Identifies Azure log profiles which are not capturing activity logs for all regions.
Azure log profile not capturing activity logs for all regions—
Azure MySQL Database Server SSL connection is disabled—Identifies Azure MYSQL database server for which SSL connections between database server and client applications are not encrypted and can be at risk of ‘man in the middle’ attacks.
Azure Storage Account Container with Activity log has BYOK encryption disabled—Identifies Azure storage account where the activity logs are exported with BYOK (Bring Your Own Key) without encryption, and hence lacks confidentiality controls for log data.
Google Cloud Platform
A set of GCP policies that identify GCP projects where you have not enabled Log metric filter and alarms to monitor configuration changes, and detect unauthorized, or malicious activities.
Features Introduced on February 12, 2020
Streamlined Cloud Account Onboarding
Onboard your cloud accounts on AWS, Azure, and GCP and simplify the first step for cloud monitoring and governance. The guided experience automates some of the configuration options for quicker onboarding with Terraform templates and CloudFormation template, and reduces user error.
Upgrade Notification for Prisma Cloud Compute
License Usage Details for Prisma Cloud Compute Workloads
Each Prisma Cloud Compute Defender deployed on an AWS EC2, Azure VM, or GCP GCE instance is counted as one Prisma Cloud Enterprise Edition workload license, and you can view the number of licenses on the
API Ingestion Update
To ingest the resources associated with this API, you must update the CFT and enable permission for ec2:DescribeKeyPairs
Policy Updates and New Policies
AWS RDS snapshot is encrypted using default KMS key instead of CMK
Identifies RDS snapshots that are encrypted with a default KMS key. As a best practice, you should use a Customer Managed Key (CMK) for better key management including the ability to rotate and delete keys, and control access using IAM policies.
AWS RDS DB snapshot is not encrypted
Identifies RDS snapshots that are not encrypted. This is a risk because your data at rest is not encrypted and at risk of unauthorized access.
AWS RDS cluster is encrypted using default KMS key instead of CMK
Identifies RDS clusters that are encrypted with a default KMS key. As a best practice, you should use a Customer Managed Key (CMK) for better key management including the ability to rotate and delete keys, and control access using IAM policies.
Recommended For You
Recommended videos not found.