Features Introduced in September 2023
Table of Contents
Expand all | Collapse all
-
-
- Features Introduced in September 2023
- Features Introduced in August 2023
- Features Introduced in July 2023
- Features Introduced in June 2023
- Features Introduced in May 2023
- Features Introduced in April 2023
- Features Introduced in March 2023
- Features Introduced in February 2023
- Features Introduced in January 2023
-
- Features Introduced in December 2022
- Features Introduced in November 2022
- Features Introduced in October 2022
- Features Introduced in September 2022
- Features Introduced in August 2022
- Features Introduced in July 2022
- Features Introduced in June 2022
- Features Introduced in May 2022
- Features Introduced in April 2022
- Features Introduced in March 2022
- Features Introduced in February 2022
- Features Introduced in January 2022
- Limited GA Features on Prisma Cloud
- Look Ahead—Planned Updates on Prisma Cloud
- Prisma Cloud Known Issues
-
-
- Features Introduced in September 2023
- Features Introduced in August 2023
- Features Introduced in July 2023
- Features Introduced in June 2023
- Features Introduced in May 2023
- Features Introduced in April 2023
- Features Introduced in March 2023
- Features Introduced in February 2023
- Features Introduced in January 2023
- Features Introduced in December 2022
- Features Introduced in November 2022
- Features Introduced in September 2022
- Features Introduced in July 2022
- Features Introduced in June 2022
- Features Introduced in March 2022
- Features Introduced in February 2022
- Look Ahead — Planned Updates on Prisma Cloud Compute
- Prisma Cloud Compute Known Issues
-
-
- Features Introduced in September 2023
- Features Introduced in August 2023
- Features Introduced in July 2023
- Features Introduced in June 2023
- Features Introduced in May 2023
- Features Introduced in April 2023
- Features Introduced in March 2023
- Features Introduced in February 2023
- Features Introduced in January 2023
-
- Features Introduced in December 2022
- Features Introduced in September 2022
- Features Introduced in August 2022
- Features Introduced in July 2022
- Features Introduced in June 2022
- Features Introduced in May 2022
- Features Introduced in April 2022
- Features Introduced in March 2022
- Features Introduced in January 2022
- Look Ahead—Planned Updates on Prisma Cloud Application Security
-
Features Introduced in September 2023
Learn what’s new on Prisma™ Cloud in September 2023.
New Features Introduced in 23.9.1
New Features
No new features in 23.9.1.
API Ingestions
SERVICE | API DETAILS |
AWS Application Auto Scaling | aws-application-autoscaling-scaling-policy Additional permission required:
The Security Audit role includes the permission. |
AWS DataSync | aws-datasync-task Additional permissions required:
The Security Audit role includes the permissions. |
Amazon EFS | aws-efs-access-point Additional permission required:
You must manually add or update the CFT template to enable the above permission. |
Amazon Inspector | aws-inspector-v2-account-status Additional permission required:
The Security Audit role includes the permission. |
Amazon Route53 | aws-route53-health-check Additional permissions required:
The Security Audit role includes the permissions. |
AWS Systems Manager | aws-ssm-custom-inventory-entry Additional permissions required:
The Security Audit role only includes . You must manually add or update the CFT template to enable the following permissions:
|
Google Binary Authorization | gcloud-binary-authorization-attestor Additional permissions required:
The Viewer role includes the permissions. |
Google Cloud Build | gcloud-cloud-build-github-enterprise-config-v1 Additional permission required:
The Viewer role includes the permission. |
Google Cloud Build | gcloud-cloud-build-private-worker-pool Additional permission required:
The Viewer role includes the permission. |
Google Stackdriver Monitoring | gcloud-monitoring-uptime-check-config Additional permission required:
The Viewer role includes the permission. |
OCI IAM | oci-iam-compartment Additional permission required:
You must download and execute the Terraform template from the console to enable the permission. |
OCI Integration | oci-integration-instance Additional permissions required:
You must download and execute the Terraform template from the console to enable the permissions. |
New Policies
NEW POLICIES | DESCRIPTION |
AWS Transit Gateway auto accept vpc attachment is enabled | Identifies if Transit Gateways are automatically accepting shared VPC attachments. When this feature is enabled, the Transit Gateway automatically accepts any VPC attachment requests from other AWS accounts without requiring explicit authorization or verification. This can be a security risk, as it may allow unauthorized VPC attachments to connect to the Transit Gateway. As per the best practices for authorization and authentication, it is recommended to turn off the AutoAcceptSharedAttachments feature. Policy Severity— LowPolicy Type— Config
|
AWS CodeBuild project environment privileged mode is enabled | Identifies the CodeBuild projects where the privileged mode is enabled. Privileged mode grants unrestricted access to all devices and runs the Docker daemon inside the container. It is recommended to enable this mode only for building Docker images. It recommended disabling the privileged mode to prevent unintended access to Docker APIs and container hardware, reducing the risk of potential tampering or critical resource deletion. Policy Severity— MediumPolicy Type— Config
|
AWS ECS services have automatic public IP address assignment enabled | Identifies whether Amazon ECS services are configured to assign public IP addresses automatically. Assigning public IP addresses to ECS services may expose them to the internet. If the services are not adequately secured or have vulnerabilities, they could be susceptible to unauthorized access, DDoS attacks, or other malicious activities. It is recommended that the Amazon ECS environment not have an associated public IP address except for limited edge cases. Policy Severity— LowPolicy Type— Config
|
Azure Log analytics linked storage account is not configured with CMK encryption | Identifies Azure Log analytics linked Storage accounts which are not encrypted with CMK. By default Azure Storage account is encrypted using Microsoft Managed Keys. It is recommended to use Customer Managed Keys to encrypt data in Azure Storage accounts linked Log analytics for better control on the data. Policy Severity— LowPolicy Type— Config
|
Azure Synapse Workspace vulnerability assessment is disabled | Identifies Azure Synpase workspace which has Vulnerability Assessment setting disabled. Vulnerability Assessment service scans Azure Synapse workspaces for known security vulnerabilities and highlight deviations from best practices, such as misconfigurations, excessive permissions, and unprotected sensitive data. It is recommended to enable Vulnerability assessment. Policy Severity— MediumPolicy Type— Config
|
GCP Cloud Function has risky basic role assigned | Identifies GCP Cloud Functions configured with the risky basic role. Basic roles are highly permissive roles that existed prior to the introduction of IAM and grant wide access over project to the grantee. To reduce the blast radius and defend against privilege escalations if the Cloud Function is compromised, it is recommended to follow the principle of least privilege and avoid use of basic roles. Policy Severity— MediumPolicy Type— Config
|
GCP VM instance has risky basic role assigned | Identifies GCP VM instances configured with the risky basic role. Basic roles are highly permissive roles that existed prior to the introduction of IAM and grant wide access over project to the grantee. To reduce the blast radius and defend against privilege escalations if the VM is compromised, it is recommended to follow the principle of least privilege and avoid use of basic roles. Policy Severity— MediumPolicy Type— Config
|
Policy Updates
POLICY UPDATES | DESCRIPTION |
Policy Updates—RQL | |
AWS Elastic Load Balancer v2 (ELBv2) with listener TLS/SSL is not configured | Changes— The policy RQL has been updated to not trigger an alert when the HTTP listener requests are redirected to HTTPS URL.Severity— LowPolicy Type— ConfigCurrent RQL—
Updated RQL—
Impact— Low. Existing alerts where the Listener requests are redirected to HTTPS URL are resolved. |
GCP VM instance configured with default service account | Changes— The policy RQL has been updated to check for Default Service Accounts with editor role.Severity— InformationalPolicy Type— ConfigCurrent RQL—
Updated RQL—
Impact— Low. Existing alerts where they do not have editor role attached to default service account are resolved. |
Policy Updates—Metadata | |
AWS EC2 instance not configured with Instance Metadata Service v2 (IMDSv2) | Changes— The policy now supports remediation. You can resolve the alerts by running the remediation.Severity— HighPolicy Type— ConfigImpact— No impact since support for remediation is introduced. |
IAM Policy Updates
Prisma Cloud has updated the following Azure IAM out-of-the-box (OOTB) policies:
POLICY NAME | DESCRIPTION | CURRENT RQL | UPDATED RQL |
Azure VM instance associated managed identities with Key Vault management access (data access is not included) | With access to 'Microsoft.KeyVault' service, an adversary can elevate the access of the VM instance, expanding the surface of the attack and granting access to cloud resources with sensitive information |
|
|
Azure Managed Identity (user assigned or system assigned) with broad Key Vault management access | Managed identities provide an automatic way for applications to connect to resources that support Azure Active Directory (Azure AD) authentication. Providing Key Vault management access lets non-human identities manage key vaults. The least privilege model should be enforced and unused sensitive permissions should be revoked. |
|
|
Azure Service Principals with broad Key Vault management access | Service Principles provide an automatic way for applications to connect to resources that support Azure Active Directory (Azure AD) authentication. Providing Key Vault management access lets non-human identities manage key vaults. The least privilege model should be enforced and unused sensitive permissions should be revoked |
|
|
Azure AD users with broad Key Vault management access | Providing Key Vault access lets users manage key vaults. The least privilege model should be enforced and unused sensitive permissions should be revoked |
|
|
Changes in Existing Behavior
FEATURE | DESCRIPTION |
Pending Resolution State for Alerts | A new alert state Pending Resolution is available for filtering alerts. If you configured an alert rule with Auto Remediation enabled and it includes config policies that are remediable, the alerts is marked with pending_resolution which is an interim state. As soon as the CLI is executed and the resource misconfguration is addressed, the alert transitions from the Pending Resolution state to the Resolved state.API change— The https://pan.dev/prisma-cloud/api/cspm/get-alert-filter-and-options/ includes the new state in the response.
If you have not explicitly included the alert.status value in the API request, the response will include alerts with all states ("dismissed", "snoozed", "pending_resolution", "open", "resolved"). |
REST API Updates
CHANGE | DESCRIPTION |
New Search APIs | The following new endpoints are available as part of the Search APIs: |