Use Network Query to find real-time network security risks on your resources deployed in public cloud environments.
When you onboard your cloud accounts to Prisma Cloud, it monitors network configuration and traffic logs to and from your assets deployed on the cloud environment. You can then use this data to find previously unidentified network security risks:
Flow Log-based Network Query
Prisma Cloud provides the
network from vpc.flow_recordnetwork query that is based on networking logs, such as VPC flow logs, which you can use to detect when services, applications, or databases are exposed to the Internet and fix risky configuration issues, or to search for assets that are receiving traffic and connections from suspicious IP addresses to prevent data exfiltration attempts before it is too late.
When you use the
network from vpc.flow_record where cloud.account=RQL, the following are the list of resources for which you can visualize flow log information on Prisma Cloud:
Resources that Support Flow Logs
Network flow log queries are supported on AWS, Azure, and GCP cloud environments.
Configuration-based Network Query
Prisma Cloud also provides the
config from network wherenetwork query that is based on network configuration, which you can use to identify overly-exposed resources by providing end-to-end network path visibility from any source, such as AWS EC2 virtual machine, DB instance, or Lambda application to any destination, such as the Internet, another VPC, or on-premises networks. This visibility in to the associations between security groups and compute instances help you identify network security risks before they become incidents. Prisma Cloud does not send traffic or read network logs for performing network path analysis.
When you use the
config from network where=RQL, the following are the list of resources for which you can query network exposure on Prisma Cloud:
Resources that Support Network Exposure
Network configuration queries are currently supported only on AWS cloud environments.
Recommended For You
Recommended videos not found.