Features Introduced in July 2021
Learn what’s new on Prisma™ Cloud in July 2021.
New Features Introduced in 21.7.2
New Features
FEATURE | DESCRIPTION |
---|---|
Limited GA Support for Cloud
Account Group Hierarchy With Nested Account Groups | Prisma Cloud now supports nested account groups which enables
you to nest, or, place account groups inside of each other. Organizations
now have greater flexibility in how they map out their internal
hierarchy and delegate permissions and alert rules. Create
a nested account group by creating a parent and then add children
to it. Select Settings Account Groups Add Account Group Name and Description ;
select Make this a parent account group ,
and then select the account groups that you want to be its children.The
hierarchy (
![]() Prisma Cloud supports
nested account groups 10-levels deep, and with 300-accounts at each
level. Contact Prisma Cloud customer support to enable this feature
on your tenant. ![]() |
Limited GA Support for Azure
Resource Groups | Support for Azure Resource Groups provides
another level of role-based access or grouping in Prisma Cloud.
Prisma Cloud now enables you to create Azure Resource Groups under Settings Resource Lists On
the Sec Ops dashboard, Azure Resource Groups is not available as
an explicit filter. However, the results shown will be implicitly
filtered based on the Azure Resource Groups that are applied to
the user's role when they log in to Prisma Cloud. ![]() Only System
Admins can create Resource Groups. You can reach out to Prisma Cloud Customer
Success if you want to try it on your Prisma Cloud instance. |
Update Improvement to the UEBA
models and anomaly detection | The UEBA models and anomaly detection capabilities
on Prisma cloud are being improved to include assumerole events by
default. As a result, if you have assumerole events
in your logs, you may see an increase in the number of alerts generated
for the Unusual User Activity and Account Hijacking
Attempts policies. |
Update ServiceNow Notification
Template | You can use the following additional variables
while configuring notifications using the ServiceNow template:
Notifications sent to Google Cloud Security
Command Center (CSCC), Azure Queuing Service (AQS), Splunk, and
Webhook will also contain:
![]() You must
be on the Alerts subsystem 2.0 to be able to use these additional variables. |
Integration with Amazon S3 | You can integrate Amazon S3 with
Prisma Cloud to get notifications for configuration, audit, and anomaly
policy violations. ![]() |
Alerts Visualization | The three new visualizations on the Alerts
Overview page are alert aggregations that help you decide
which alerts to address first:
![]() |
GCP Ancestry Information in the Alert
Payload | The GCP ancestry owner information is now
available directly in the Alert Payload. It is displayed on the
Alerts L2 page and is also included in the notifications. |
Update Ingestion
for azure-event-hub-namespace | The structure of the following Prisma API has
been modified: azure-event-hub-namespace The
JSON attributes firewallRules and virtualNetworkRules ,
which used to be present at the root level are now moved under the networkRuleSet JSON
block; the firewallRules attribute is now
renamed to ipRules . The zoneRedundant attribute
which was previously under the properties section is now removed.Impact —There
are Prisma Cloud System default policies that are impacted by this
change. If you have custom policies, you must review the change
in the JSON metadata structure and update the RQL for your custom
policy. |
API Ingestions | Azure Event Hubs azure-event-hub-namespace-private-endpoint-connections Additional
permissions required—None |
Azure Event Hubs azure-event-hub Additional
permissions required—None | |
Azure Event Hubs azure-event-hub-cluster Additional
permissions required—None | |
Azure DNS azure-dns-recordsets Additional
permissions required—None | |
Azure DNS azure-dns-zones Additional
permissions required—None | |
Amazon EC2 aws-ec2-ebs-encryption Additional
permissions required— ec2:GetEbsEncryptionByDefault | |
Amazon EC2 aws-ec2-classic-instances Additional
permissions required—None | |
OCI Database oci-oracledatabase-bmvm-dbsystem Additional
permissions required— db-system-inspect | |
New JSON Array Operator in RQL | You can use the ?all JSON
array operator to specify conditions to return results when all of
the array elements are satisfied.Example
|
New Policies and Policy Updates
This release includes several important updates to Prisma
Cloud Policies that results in a noticeable reduction in alert volume
and significantly improves accuracy of the cloud misconfiguration
alerts:
- RQL updates of 18 Configuration policies
- Deletion of 4 Configuration policies
- Deletion of 12 Audit policies
You will see many of the related policy violation alerts resolved
immediately after the PCS 21.7.2 upgrade. Review the following list
to note the policy deletions and RQL updates implemented and view
the GitHub changelog.
POLICY UPDATES | DESCRIPTION |
---|---|
New Policy | Network Data Exfiltration Activity This
new network anomaly detection policy uses machine learning to learn
the normal traffic pattern of each virtual machine and alerts when
there is an abnormal amount of egress traffic to known TOR exit
nodes. ![]() |
AWS EBS volume region with encryption
is disabled Identifies AWS regions in which newly created
EBS volumes are not encrypted using an encryption key. It
provides coverage for CIS v1.4.0 (AWS) section 2.2.1 and is a replacement
for the existing AWS EBS volumes are not encrypted policy,
which was earlier mapped to this CIS section. AWS EBS
volume region with encryption is disabled is also mapped
to other relevant compliance standards.AWS EBS
volumes are not encrypted will be deleted in this release.
| |
Policy Updates—RQL | AWS RDS instance with copy tags
to snapshots disabled Current —
Updated
to —
|
AWS RDS instance is not encrypted Current —
Updated
to —
| |
AWS EBS snapshot is not encrypted Current —
Updated
to —
| |
AWS RDS retention policy less
than 7 days Current —
Updated
to —
| |
AWS RDS DB snapshot is encrypted
using default KMS key instead of CMK Current —
Updated
to —
| |
AWS RDS instance with Multi-Availability
Zone disabled Current —
Updated
to —
| |
AWS EBS Snapshot with access
for unmonitored cloud accounts Current —
Updated
to —
| |
AWS Elastic Load Balancer v2
(ELBv2) listener that allow connection requests over HTTP Current —
Updated
to —
| |
AWS Elastic Load Balancer v2
(ELBv2) with access log disabled Current —
Updated
to —
| |
AWS Elastic Load Balancer v2
(ELBv2) with listener TLS/SSL is not configured Current —
Updated
to —
| |
AWS Network ACLs with Inbound
rule to allow All Traffic Current —
Updated
to —
| |
AWS Network ACLs with Outbound
rule to allow All Traffic Current —
Updated
to —
| |
Azure Virtual Machine is not
assigned to an availability set Current —
Updated
to —
| |
Azure Virtual Machine Boot Diagnostics
Disabled The policy RQL has been updated to check
for virtual machine’s power state and fixed false positive where
Azure Spot instance virtual machine’s were created. Current —
Updated
to —
Impact —Previously generated
alerts for virtual machine’s that are stopped or deallocated and
Azure Spot instance virtual machines will get resolved as Policy_Updated. | |
Azure VM OS disk is encrypted
with the default encryption key instead of ADE/CMK Current —
Updated
to —
| |
Azure SQL databases Defender
setting is set to Off Current —
Updated
to —
Impact —Previously generated
alerts for non-active resources will be resolved as Policy_Updated. | |
Alibaba Cloud disk automatic
snapshot policy is disabled Current —
Updated
to —
| |
Alibaba Cloud ECS instance release
protection is disabled Current —
Updated
to —
| |
Policy Deletions | Sensitive network configuration
updates in AWS
|
Root user activities
| |
AWS IAM sensitive configuration
updates
| |
AWS IAM sensitive activities
by User
| |
Sensitive permission exposed
for website configuration updates of S3 buckets
| |
Sensitive configuration updates
| |
GCP Load balancer sensitive configuration updates
| |
Sensitive IAM updates
| |
Sensitive Network configuration
updates in GCP
| |
Sensitive SQL instance updates
| |
Sensitive storage configuration
updates
| |
Sensitive User Actions
| |
AWS EBS volumes are not encrypted
| |
GCP VM Instances without any
Label information
| |
Azure Virtual Machine does not
have endpoint protection installed
| |
AWS EBS volume not encrypted
using Customer Managed Key
|
New Compliance Benchmarks and Updates
COMPLIANCE BENCHMARK | DESCRIPTION |
---|---|
CIS AWS v.1.4.0 | New compliance support for CIS Amazon Web
Services Foundations Benchmark v.1.4.0 that supersedes the legacy version
1.3.0. The AWS services in scope for this benchmark include:
Impact —v.1.4.0 supersedes version
1.3.0, so consider using this new version. CIS AWS v.1.3.0 on Prisma Cloud
will be deprecated and support will be removed in a future release. |
CSA CCM v.4.0.1 | New CSA Cloud Controls Matrix (CCM) compliance
v.4.0.1 support for AWS, Azure, Alibaba, GCP, and OCI. ![]() |
REST API Updates
Change | Description |
---|---|
Limited GA Cloud Account Ancestors
for GCP | The response objects for the endpoints listed
below will include an array of up to ten account ancestors in a
new attribute called cloudAccountAncestors for
GCP cloud accounts.
|
New Features Introduced in 21.7.1
New Features
FEATURE | DESCRIPTION |
---|---|
Account Owner Details For Azure and GCP Accounts | Prisma Cloud now displays the account owners
associated with the Azure and GCP cloud accounts in a new column
in the details from Alerts Overview When you filter
for the GCP and Azure cloud types on Alerts Overview Alerts column, the Violating
Resources table displays.The Account
Owners column displays up to five account owners associated
with a cloud account in alphabetical order; this column will display
by default, but if no values are present then this column will be grayed
out. For offline access, when you download (
![]() Account Owners information is included
in the CSV file. You must be on the Alerts subsystem 2.0
to view the account owner column. To identify the alerts subsystem
version on your Prisma Cloud instance, select Alerts Overview Version:
2 above the filter (
![]() ![]() |
Support for Europe Central 2 region on GCP | Prisma Cloud can now ingest data on your
resources deployed in the GCP Warsaw region 'Europe Central 2'. |
Filters —Change in Behavior | When saving filters on Alerts Overview If you apply a saved filter that has fewer filters
than your current preserved session, the additional filters will
remain but the selections will be cleared out so that they are not
applied, and you will see a combination of your saved filters and
your current session filters. |
API Ingestion | Google Cloud Task gcloud-cloud-task The
permissions are included in the primitive Viewer role. |
New Policies and Policy Updates
POLICY UPDATES | DESCRIPTION |
---|---|
Azure Active Directory Security Defaults
is disabled | Identifies Azure AD that has security defaults
disabled which could impact alerts being generated for all Azure
AD with this setting. This policy is mapped to CIS Azure 1.2.0,
section 1.3.0, compliance standard 1.22.
|
Azure AD Users can consent to apps
accessing company data on their behalf is enabled | Identifies Azure AD which has the following
setting enabled: Users can consent to apps accessing
company data on their behalf . This could impact alerts
being generated for all Azure AD which has this setting enabled.
This policy is mapped to CIS Azure 1.1.0, sections 1.2.0 and 1.3.0, compliance
standard 1.9.
|
GCP Storage Bucket should not log
to itself | Identifies GCP storage buckets that are
sending logs to themselves. When storage buckets use the same bucket
to send their access logs, a loop of logs will be created which
is not recommended. As a best practice, spin up new and different
log buckets for storage bucket logging.
|
GCP Storage Bucket is not configured with
default event-based hold | Identifies GCP storage buckets that are
not configured with default event-based hold. This setting enables
you to protect individual objects which allows an object to persist
in your bucket for a specified length of time after a given event
occurs. |
Policy descriptions update | The following policies descriptions have
been updated:
The
word slave was removed from the policy description.Impact —No
changes on alerts. |
New Compliance Benchmarks and Updates
COMPLIANCE BENCHMARK | DESCRIPTION |
---|---|
NIST CSF 1.1 | The NIST Cybersecurity Framework v.1.1 compliance standard
is being updated with more policy mappings across all clouds—AWS,
Azure, Alibaba, GCP, and OCI. |
REST API Updates
Change | Description |
---|---|
Cloud Account Owners for Azure and GCP | The response object for Alert endpoints
will include an array that lists up to five account owners in a
new attribute called cloudAccountOwners for the Azure
and GCP cloud accounts. In the CloudResourceModel object
the new attribute cloudAccountOwners is included
for the following endpoints:
|
Recommended For You
Recommended Videos
Recommended videos not found.