Private App Security in Prisma Access.
Enterprise private applications used by internal employees and contractors
are often kept private because of their critical business data (such as intellectual
property) or the difficulty in migrating them to a SaaS model. Because of the
sensitive data they host, private apps are often prime targets for malicious actors.
However, their internal accessibility often gives administrators a false sense of
security.
While Secure Access Service Edge (SASE) and Zero Trust Network Access
(ZTNA) principles such as least privilege access and data security contribute to
protecting such private applications, they are still at risk of app-centric attacks
(such as account takeovers [ATOs] and application logic exploits). These attacks
increase the risk to applications, especially considering the prevalence of bring
your own devices (BYODs) and "work from anywhere" environments, where compromised
internal hosts should be a concern.
Prisma Access Private App Security not
only offers foundational web application firewall (WAF) capabilities, such as
protection against OWASP Top 10 attacks, rate limiters for DDoS protections, and bot
controls, but it delivers next-generation functionalities that enable admins to
overcome traditional WAF challenges above and protect the modern app-verse. This
includes:
- Private App Security Intelligent Policy Recommendations, accompanied by
rich impact evaluation reports, enable admins to maintain a strong app security
posture while minimizing the risk of unintended effects when adopting new
policies.
- Automatic App Fingerprinting allows Private App Security to accurately
detect anomalies in the app by app usage behaviors, providing a high efficacy
against new day-0 sophisticated attacks.
Private App Security is a Prisma SASE native component, providing
complete visibility into all app traffic, regardless of user, device, or
destination. This unique architectural advantage over legacy WAF solutions
provides:
Automatic discovery of private app inventory
Critical contextual insights for the sources of the detected
attacks such as user-ID, device-ID, branch, location: these are critical
details in the mitigation process of a compromised host.