Features Introduced in July 2023
Table of Contents
Prisma Cloud Enterprise Edition
Expand all | Collapse all
-
-
- Features Introduced in September 2023
- Features Introduced in August 2023
- Features Introduced in July 2023
- Features Introduced in June 2023
- Features Introduced in May 2023
- Features Introduced in April 2023
- Features Introduced in March 2023
- Features Introduced in February 2023
- Features Introduced in January 2023
-
- Features Introduced in December 2022
- Features Introduced in November 2022
- Features Introduced in October 2022
- Features Introduced in September 2022
- Features Introduced in August 2022
- Features Introduced in July 2022
- Features Introduced in June 2022
- Features Introduced in May 2022
- Features Introduced in April 2022
- Features Introduced in March 2022
- Features Introduced in February 2022
- Features Introduced in January 2022
- Limited GA Features on Prisma Cloud
- Look Ahead—Planned Updates on Prisma Cloud
- Prisma Cloud Known Issues
-
-
- Features Introduced in September 2023
- Features Introduced in August 2023
- Features Introduced in July 2023
- Features Introduced in June 2023
- Features Introduced in May 2023
- Features Introduced in April 2023
- Features Introduced in March 2023
- Features Introduced in February 2023
- Features Introduced in January 2023
- Features Introduced in December 2022
- Features Introduced in November 2022
- Features Introduced in September 2022
- Features Introduced in July 2022
- Features Introduced in June 2022
- Features Introduced in March 2022
- Features Introduced in February 2022
- Look Ahead — Planned Updates on Prisma Cloud Compute
- Prisma Cloud Compute Known Issues
-
-
- Features Introduced in September 2023
- Features Introduced in August 2023
- Features Introduced in July 2023
- Features Introduced in June 2023
- Features Introduced in May 2023
- Features Introduced in April 2023
- Features Introduced in March 2023
- Features Introduced in February 2023
- Features Introduced in January 2023
-
- Features Introduced in December 2022
- Features Introduced in September 2022
- Features Introduced in August 2022
- Features Introduced in July 2022
- Features Introduced in June 2022
- Features Introduced in May 2022
- Features Introduced in April 2022
- Features Introduced in March 2022
- Features Introduced in January 2022
- Look Ahead—Planned Updates on Prisma Cloud Application Security
-
Features Introduced in July 2023
Learn what’s new on Prisma™ Cloud in July 2023.
New Features Introduced in 23.7.2
New Features
FEATURE | DESCRIPTION |
Integrated View of Run and Build details for Alerts | To help you as a Cloud Security Engineer investigate issues from code to cloud, the alert details now include information to trace and attribute which build-time resource has caused a policy violation for a runtime resource deployed in your cloud account. The alert details overview includes the IaC resource details and information on the build time resource. The new Traceability information helps you connect an alert from the production environment back to the origin templates in your upstream development environment. To view the build-time details in an alert:
![]() |
Prisma Cloud Data Security - Asset Level Scan | There is usually several TB or PB of data stored in your organization’s S3 buckets. In order to reduce the cost associated with the scanning of a large volume of data and to provide you with more value, Prisma Cloud Data Security now provides you the option of Asset Level Scan . When you select this option (default) while configuring a scan, Prisma Cloud randomly scans 10% of objects or maximum of 1TB (whichever is lower) and sends the data for analysis. It stops the scan as soon as it detects an object with sensitive data and triggers a 'Storage Asset with sensitive data found' policy.Asset Level Scan only applies when you select the Backward Scan mode and does exposure analysis and data classification and not malware scanning. It is only available when you’re configuring a data security scan for your AWS cloud accounts. ![]() |
API Ingestions
SERVICE | API DETAILS |
Amazon Inspector | aws-inspector-v2-coverage Additional permission required:
The Security Audit role includes the permission. |
Amazon Inspector | aws-inspector-v2-finding Additional permission required:
The Security Audit role includes the permission. |
Amazon Inspector | aws-inspector-v2-filter Additional permission required:
The Security Audit role includes the permission. |
Amazon Inspector | aws-inspector-v2-permission Additional permission required:
The Security Audit role includes the permission. |
Azure Virtual Network | azure-bastion-diagnostic-settings Additional permissions required:
The Reader role includes the permissions. |
Google Deployment Manager | gcloud-deployment-manager-deployment Additional permissions required:
The Viewer role only includes the permission . You must manually add the permission or update the Terraform template to enable
|
Google Deployment Manager | gcloud-deployment-manager-deployment-manifest Additional permissions required:
The Viewer role only includes the permissions. |
Google Stackdriver Monitoring | gcloud-monitoring-group Additional permission required:
The Viewer role only includes the permission. |
Google Stackdriver Monitoring | gcloud-monitoring-snooze Additional permission required:
The Viewer role only includes the permission. |
Google Cloud Translation | gcloud-translation-model Additional permissions required:
The Viewer role includes the permissions. |
Google Cloud Translation | gcloud-translation-native-dataset Additional permissions required:
The Viewer role includes the permissions. Legacy Datasets are not ingested as part of this API. |
New Policies
No new policies for 23.7.2.
Policy Updates
POLICY UPDATES | DESCRIPTION |
Policy Updates—RQL | |
AWS Secret Manager Automatic Key Rotation is not enabled | Changes— The policy description and RQL are updated. The policy RQL is updated to exclude the secrets managed by owning services.Updated Description— Identifies AWS Secret Manager that are not enabled with key rotation. As a security best practice, it is important to rotate the keys periodically so that if the keys are compromised, the data in the underlying service is still secure with the new keys.This policy does not include secret manager which are managed by some of the AWS services that store AWS Secrets Manager secrets on your behalf. Policy Severity— LowPolicy Type— ConfigCurrent RQL—
Updated RQL—
Impact— Low. Existing alerts are resolved as Policy_Updated for secrets managed by owning services such as appflow, databrew, datasync, directconnect, events, opsworks-cm, rds, and sqlworkbench. |
AWS Elastic Load Balancer v2 (ELBv2) with listener TLS/SSL is not configured | Changes— The policy RQL is updated to exclude the NLBs which are forwarding to ALB using TCP as a listener as per the AWS limitation.Policy Severity— LowPolicy Type— ConfigCurrent RQL—
Updated RQL—
Impact— Low. Alerts that are generated for NLBs which are using ALB as listener via TCP will be resolved as Policy_Updated . |
OCI Block Storage Block Volume does not have backup enabled | Changes— The policy description and RQL are updated. The RQL is updated to exclude the Block volumes which are attached to volume groups.Updated Description— Identifies the OCI Block Storage Volumes that do not have backup enabled. It is recommended to have block volume backup policies on each block volume so that the block volume can be restored during data loss events.Note: This Policy is not applicable for block volumes that are added to volume groups. Policy Severity— LowPolicy Type— ConfigCurrent RQL—
Updated RQL—
Impact— Low. Alerts that are generated for block volumes added to volume groups will be resolved as Policy_Updated . |
Policy Updates—Metadata | |
AWS Route53 Hosted Zone having dangling DNS record with subdomain takeover risk | Changes— The policy name and description are updated to reflect the association of this risk with S3 Buckets, providing a more accurate representation of the associated service.Current Policy Name— AWS Route53 Hosted Zone having dangling DNS record with subdomain takeover riskUpdated Policy Name— AWS Route53 Hosted Zone having dangling DNS record with subdomain takeover risk associated with AWS S3 BucketUpdated Description— Identifies AWS Route53 Hosted Zones which have dangling DNS records with subdomain takeover risk associated with AWS S3 Bucket. A Route53 Hosted Zone having a CNAME entry pointing to a non-existing S3 bucket will have a risk of these dangling domain entries being taken over by an attacker by creating a similar S3 bucket in any AWS account which the attacker owns / controls. Attackers can use this domain to do phishing attacks, spread malware and other illegal activities. As a best practice, it is recommended to delete dangling DNS records entry from your AWS Route 53 hosted zones.Policy Severity— HighPolicy Type— ConfigImpact— None. |
IAM Policy Updates
Prisma Cloud has updated the following AWS IAM out-of-the-box (OOTB) policies as follows:
POLICY NAME | CURRENT RQL | UPDATED RQL | CURRENT SEVERITY | UPDATED SEVERITY |
AWS IAM policy allows Privilege escalation via PassRole & CloudFormation stack permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & Lambda create Function & Event source mapping permissions |
|
| High | Medium |
Medium AWS IAM policy allows Privilege escalation via PassRole & SageMaker create training job permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & CodeStar project permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & Lambda create Function & add permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & CodeBuild permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & SageMaker create notebook permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & SageMaker create processing job permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via EC2 Instance Connect permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & EC2 permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & Data Pipeline permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & Glue development endpoint permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & Glue create job permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & Glue update job permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via Glue Dev Endpoint permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via Codestar create project and associate team member permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via EC2 describe and SSM list and send command permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via EC2 describe and SSM session permissions |
|
| High | Medium |
AWS IAM policy allows Privilege escalation via PassRole & Lambda create & invoke Function permissions |
|
| High | Medium |
New Compliance Benchmarks and Updates
COMPLIANCE BENCHMARK | DESCRIPTION |
MLPS Level 3 Controls | Prisma Cloud now supports Multi-Level Protection Scheme (MLPS) Level 3 controls. Access control, data encryption, network segmentation, intrusion detection, and incident response are among the security measures outlined in the MLPS framework. Based on the MLPS classifications, you can assess the security risks associated with your information systems and implement the appropriate controls. You can review this compliance standard and its associated policies on the Compliance > Standard page. |
Changes in Existing Behavior
No changes in existing behavior for 23.7.2.
REST API Updates
CHANGE | DESCRIPTION |
New API to Get Resource Snapshot | The following new endpoint is added to get the latest resource snapshot by using the Restricted Resource Name(rrn).
|
New Features Introduced in 23.7.1
New Features
FEATURE | DESCRIPTION |
Support for New Regions on AWS | Prisma Cloud now ingests data for resources deployed in the Zurich and Melbourne regions on AWS. To review a list of supported regions, select Inventory Assets ![]() |
Prisma Cloud Data Security Support for Singapore | Prisma Cloud Data Security is now available on the app.sg stack for all Prisma Cloud customers in Singapore. The data scans and data will remain within Singapore. |
Least Privilege Access Enforcement | Streamline access management and promote secure and efficient permissions configuration with the least privilege access suggestions. Solve for over-privileged access issues that arise when you manage Identity Access through Groups or/and Roles rather than individual identities. You can now remediate over-permissive permissions effectively at the Group/Role level by creating new policies containing only the permissions applicable to all members. Alternatively, you can leverage existing policies by retaining only the permissions applicable to the entire Group/Role and removing any excessive permissions. |
API Ingestions
SERVICE | API DETAILS |
AWS CloudHSM | aws-cloudhsm-cluster Additional permission required:
You must manually add the permission or update the CFT template to enable it. |
Amazon VPC | aws-ec2-vpc-endpoint-service-permission Additional permission required:
The Security Audit role includes the permission. |
Google Cloud Translation | gcloud-translation-glossary Additional permissions required:
The Viewer role includes the permissions. |
OCI Compute | oci-compute-image Additional permissions required:
You must update the Terraform template to enable the permissions. |
Update OCI Compute Instance | oci-compute-instance The resource JSON for this API has been updated to include a new field vnicIds .Additional permission required:
You must update the Terraform template to enable the permission. |
New Policies
NEW POLICIES | DESCRIPTION |
Azure SQL on Virtual Machine (Linux) with basic authentication | Identifies Azure Virtual Machines that are hosted with SQL on them and have basic authentication. Azure Virtual Machines with basic authentication could allow attackers to brute force and gain access to SQL database hosted on it, which might lead to sensitive information leakage. It is recommended to use SSH keys for authentication to avoid brute force attacks on SQL database hosted virtual machines.
Policy Type— ConfigSeverity— Low |
AWS Route53 Hosted Zone having dangling DNS record with subdomain takeover risk | Identifies AWS Route53 Hosted Zones which have dangling DNS records with subdomain takeover risk. A Route53 Hosted Zone having a CNAME entry pointing to a non-existing S3 bucket will have a risk of these dangling domain entries being taken over by an attacker by creating a similar S3 bucket in any AWS account which the attacker owns / controls. Attackers can use this domain to do phishing attacks, spread malware and other illegal activities. As a best practice, it is recommended to delete dangling DNS records entry from your AWS Route 53 hosted zones.
Policy Type— ConfigSeverity— High |
Policy Updates
POLICY UPDATES | DESCRIPTION |
Policy Updates—RQL | |
AWS Application Load Balancer (ALB) is not using the latest predefined security policy | Changes— The policy description and recommendation steps have been updated. The policy RQL has been updated to check for the latest security policy ELBSecurityPolicy-TLS13-1-2-2021-06 Updated Description— Identifies Application Load Balancers (ALBs) are not using the latest predefined security policy. A security policy is a combination of protocols and ciphers. The protocol establishes a secure connection between a client and a server and ensures that all data passed between the client and your load balancer is private. A cipher is an encryption algorithm that uses encryption keys to create a coded message. So it is recommended to use the latest predefined security policy which uses only secured protocol and ciphers.We recommend using ELBSecurityPolicy-TLS13-1-2-2021-06 policy to meet compliance and security standards that require disabling certain TLS protocol versions or to support legacy clients that require deprecated ciphers. Severity— LowPolicy Type— ConfigCurrent RQL—
Updated RQL—
Impact— Medium. New alerts will be generated in case ALB is not configured to use the latest security policy. Existing alerts for resources that are already using the latest security policy are resolved as Policy_updated . |
AWS EC2 instance that is reachable from untrust internet source to ports with high risk | Changes— Policy RQL is updated to check and report EC2 instance which are in active state.Severity— HighPolicy Type— ConfigCurrent RQL—
Updated RQL—
Impact— Low. Alerts will be resolved for EC2 instances which are in inactive state. |
Azure SQL Server ADS Vulnerability Assessment is disabled | Changes— The policy description and recommendation steps have been updated. The policy RQL has been updated according to new express configuration to check if ADS vulnerability assessment is disabled.Updated Decsription— Identifies Azure SQL Server which has ADS Vulnerability Assessment setting disabled. Advanced Data Security - Vulnerability Assessment service scans SQL databases for known security vulnerabilities and highlight deviations from best practices, such as misconfigurations, excessive permissions, and unprotected sensitive data. It is recommended to enable ADS - VA service.Severity— MediumPolicy Type— ConfigCurrent RQL—
Updated RQL—
Impact— Medium. New alerts will be generated if vulnerability assessment is disabled. Existing alerts will be resolved are resolved as Policy_updated when vulnerabilityAssessments[*].properties.storageContainerPath does not exist. |
New Compliance Benchmarks and Updates
COMPLIANCE BENCHMARK | DESCRIPTION |
Otoritas Jasa Keuangan (OJK) 38/POJK.03/2016 | Prisma Cloud now supports Otoritas Jasa Keuangan (OJK) 38/POJK.03/20 regulations. The regulation provides specific guidance on the contents of the outsourcing agreement, due diligence, monitoring performance, contingency planning, audit, and information access rights. You can review this compliance standard and its associated policies on Prisma Cloud’s Compliance > Standard page. |
Changes in Existing Behavior
FEATURE | DESCRIPTION |
Access to Alerts for Deleted Assets This change was first announced in the Look Ahead that was published with the 23.5.2 release | The ability to view resolved alerts for assets that have been deleted in cloud accounts onboarded to Prisma Cloud will be available for up to 90 days after asset deletion. After 90 days, these alerts will be permanently deleted from Prisma Cloud. This change will be in effect starting July 1, 2023.
Before July 1, if you want to export all resolved alerts older than 90 days for assets that have been deleted on the cloud account, use this API endpoint https://pan.dev/prisma-cloud/api/cspm/get-alerts-v-2/ . |
REST API Updates
No REST API updates for 23.7.1.