PAN-OS includes security enhancements to restrict attackers and prevent malware
execution, providing stronger protection for your network security
infrastructure.
PAN-OS includes several enhancements and new features that improve the
security of PAN-OS against attacks on the platform. A majority of these features are
implemented behind the scenes as part of the platform’s built-in protections. These
features are designed to prevent successful exploits, reduce the impact of exploits,
detect attempted exploits, and enable the ability to respond to attacks on PAN-OS.
These security features either have settings that can be configured or that generate
logs to provide more information on PAN-OS security.
PAN-OS security is enhanced with Integrity Measurement Architecture (IMA) to protect
against sophisticated attacks and reduce the impact if a process is being
compromised. These security mechanisms work together to restrict what an attacker
can do if they manage to exploit a vulnerability in PAN-OS, limiting their ability
to move laterally within the system or tamper with critical system files and
logs.
IMA runs in enforcement mode by default, and only allows execution of binaries and
programs cryptographically signed by Palo Alto Networks. This prevents the execution
of malware that might be dropped by an attacker and blocks attempts to modify
existing PAN-OS binaries, effectively extending the secure boot and hardware root of
trust into the run-time environment. When IMA detects an attempted violation, it
logs a critical severity alert that you can use for investigation.
You can monitor IMA violations through system logs using the CLI or from the web
interface. When IMA detects violations or attempted violations, PAN-OS can be
configured to either continue running (collect logs and alerts for investigation),
which is the default, or reboot to maintenance mode to disrupt the attacker and
facilitate a more thorough investigation.
The IMA security enhancements work alongside other
PAN-OS security features, including
updated open source software components, improved cryptographic libraries, TPM-based
secure boot, hardware root of trust (on Gen 4 hardware and newer), and both
boot-time and periodic software integrity checks. Together, these mechanisms create
multiple layers of defense that significantly improve the security posture of your
PAN-OS devices against sophisticated attacks.