Post

Palo Alto Networks - Prisma Cloud - 7

[toc]


Prisma Cloud - Compute

Overview of Prisma Cloud Compute

Prisma Cloud Compute supports an architecture that requires no changes to your host, container engine, or applications.

Prisma Cloud Compute

  • Prisma Cloud Compute is the SaaS version of the full Cloud Native Security Platform hosted by Palo Alto Networks.
  • Prisma Cloud protects your cloud native assets anywhere they operate, whether you’re running containers, serverless functions, non-container hosts, or any combination of them.
  • Advanced threat intelligence and machine learning enable protection of your entire cloud native stack, whether it runs in the public cloud, private, or hybrid cloud.
  • Prisma Cloud offers a rich set of cloud workload protection capabilities. These features are called Compute.
  • For environments that do not support deployment of Prisma Cloud Compute as a privileged peer, we offer runtime application self protection (RASP) capabilities.
  • Cloud Environment
    • Upon deployment, Prisma Cloud immediately begins working to secure your container and cloud native assets.
    • Prisma Cloud Compute discovers assets within your cloud environment, identify assets which are not protected.
  • Scanning Capabilities
    • Prisma Cloud Compute is easily integrated into your container build process with support for continuous integration continuous deployment (CI/CD) systems, registry, and serverless repository scanning capabilities.
  • Serverless Functions
    • Prisma Cloud Compute supports the full stack and lifecycle of your cloud native workloads.
    • With Prisma Cloud Compute, protect mixed workload environments.
    • Whether running standalone hosts, containers, serverless functions, or combination of the above, Prisma Cloud Compute allows to manage the environment with a single interface across the entirety of the lifecycle from development to runtime.

Accessing Compute

  • Compute has a dedicated management interface called Compute Console, that can be accessed in one of two ways
  • Prisma Cloud Compute
    • Hosted by Palo Alto Networks
    • SaaS offering
    • Provides full Cloud Native Security Platform capability
    • Access the Compute Console from the Compute tab in the Prisma Cloud user interface
  • Prisma Cloud Compute Edition
    • Self-hosted offering, deployed and managed by the enterprise
    • Provides Cloud Workload Protection Platform (CWPP) capability
    • Software can be downloaded from the Palo Alto Networks Customer Support Portal

Prisma Cloud Compute Core Concepts

  • Compute software consists of two components: Console and Defender.
  • Console
    • Palo Alto Networks hosts the Console in Prisma Cloud Compute.
    • Use Prisma Cloud Compute’s management console to define policies and monitor the cloud environment.
  • Defender
    • Prisma Cloud Defenders are deployed in your cloud native workloads
    • enforce the policies defined in Console
    • and send event data up to the Console for correlation.
    • There are several types of Defenders, and depending on the assets in your environment that require protection you may end up deploying all of them or a subset.
    • Defenders support the full variety of workloads in your cloud environment.
    • The following types of defenders can be deployed.
    • All Defenders, regardless of their type, report back to the Console, letting you secure a hybrid environment with a single tool.
    • The main requirement for installing Defender is that it can connect to the Console.
    • Defender connects to the Console using a websocket over port 8084 to retrieve policies and send data.
    • The following diagram shows the key connections.
    • When Defender is installed, it automatically starts scanning images, containers, and hosts for vulnerabilities.
    • Container Defenders:
      • Deploy Container Defenders on every host that runs containers in your cloud native environment.
    • host Defenders:
      • This Defender type is deployed for Virtual Machines that do not run containers.
    • App Embedded Defenders:
      • offer runtime protection for containers.
      • Deploy App Embedded Defender anywhere can run a container, but can’t run Container Defender.
    • Serverless Defenders
      • offer runtime protection for AWS Lambda functions.
      • Serverless Defender must be embedded inside your functions.
      • Deploy one Serverless Defender per function.

How Prisma Cloud Compute Works

  • Prisma Cloud Advanced Threat Protection (TATP) is a collection of malware signatures and IP reputation lists curated from commercial threat feeds, open source threat feeds, and Prisma Cloud Labs.
  • It is delivered to your installation via the Prisma Cloud Intelligence Stream.
  • Default Rules
    • The TATP is enabled in the default rules that ship with the product, with the effect set to alert.
    • You can impose more stringent control by setting the action to prevent or block.
    • Runtime defense for file systems lets you actively block any container that tries to download malware.
  • Network Intelligence
    • With app-specific network intelligence, Prisma Cloud can learn about the settings for apps from their configuration files, and use this knowledge to detect runtime anomalies.
    • No special configuration is required to enable this feature.
  • Port Settings
    • In addition to identifying ports that are exposed via the EXPOSE directive in a Dockerfile, or the –p argument passed to docker run, Compute can identify port settings from an app’s configuration file.
    • This enables Compute to detect, for example, if the app has been commandeered to listen on an unexpected port, or if a malicious process has managed to listen on the app’s port to steal data.

Demo: Accessing the Compute Console

require: prisma cloud system admin role

prisma cloud > compute:

Screen Shot 2020-10-22 at 19.16.21

manage > system > download > tools:

Screen Shot 2020-10-22 at 19.17.55

Demo: Compute Console

prisma cloud > compute:

refresh: 24h

Screen Shot 2020-10-22 at 19.19.43

Screen Shot 2020-10-22 at 19.20.54


Prisma Cloud Compute Operations

Prisma Cloud Compute is deployed in stages. Initially learn about the capabilities of Compute and plan your deployment, making considerations for accessing the console and for deploying defenders.

Prisma Cloud Compute Operations Overview

  • Palo Alto Networks operates the Console for you, and you must deploy Defenders into your environment to secure hosts, containers, and serverless functions running in any cloud, including on-premises.
  • After deployment, observe the results of data that are reported from your applications. When you are ready, it is time to operationalize Compute. Prisma Cloud Compute supports the following operations.

Vulnerability Management

  • Vulnerability management is the optimization of your rule and policy configurations.

Compliance

  • Compliance enforces the compliance checks that are built into Prisma Cloud Compute and tuning the default compliance policies for your environment.

Runtime Defense

  • Runtime defense automatically models the intent of a container image so that it can be secured at runtime.

Native Firewalls

  • Prisma Cloud Native Firewalls learn the topology of your applications and provide micro-segmentation for all your microservices.

CNAF

  • CNAF is a layer 7 web application firewall (WAF).
  • If a container handles web requests, configure CNAF to protect it.

CNNF

  • CNNF is a layer 3 firewall that automatically models inter-container traffic.
  • As part of the automatic behavioral learning at runtime, Prisma Cloud builds out a topology of connections from one container to another.

Vulnerability Management

  • In Prisma Cloud Compute, when Defenders are installed, it automatically starts scanning images, containers, and hosts for vulnerabilities.
  • Vulnerability Policies:
    • composed of discrete 分离的 rules.
  • Rules Declaration:
    • Rules declare the actions to take when vulnerabilities are found in the resources in your environment.
    • They also control the data surfaced in Prisma Cloud Console, including scan reports and Radar visualizations.
  • Actions
    • Rules let you target segments of your environment and specify actions to take when vulnerabilities of a given type are found.
    • For example,
    • block images with critical severity vulnerabilities from being deployed to production environment hosts.
    • There are separate vulnerability policies for containers and hosts.
    • Host rules offer a subset of the capabilities of container rules.
    • The big difference is that container rules support blocking.

Demo: Vulnerability Rules how Prisma Cloud Compute ships with a simple default vulnerability policy for both containers and hosts.

compute > defend > vulnerability

rules: top -> bottom

Screen Shot 2020-10-22 at 19.32.50

Screen Shot 2020-10-22 at 19.33.21

Screen Shot 2020-10-22 at 19.34.02

compute > monitor > vulnerability

Screen Shot 2020-10-22 at 19.34.55

Demo: Compliance how Prisma Cloud helps enterprises monitor and enforce compliance for hosts, containers, and serverless environments.

compute > defend > compliance

Screen Shot 2020-10-22 at 19.36.29

Screen Shot 2020-10-22 at 19.36.54

Demo: Runtime Defense how to set the features that provide both predictive and threat-based active protection for running containers.

compute > defend > Runtime

Screen Shot 2020-10-22 at 19.39.34

Screen Shot 2020-10-22 at 19.40.16

Screen Shot 2020-10-22 at 19.40.48

Screen Shot 2020-10-22 at 19.40.30

Demo: Firewalls how Prisma Cloud provides layer 4 and layer 7 firewalls that automatically learn the network topology of applications and provide application-tailored micro-segmentation for all microservices.

Screen Shot 2020-10-22 at 19.42.04

Screen Shot 2020-10-22 at 19.43.21

Screen Shot 2020-10-22 at 19.42.51


Prisma Cloud Compute Monitoring

Prisma Cloud combines vulnerability detection with an always up-to-date threat feed and knowledge about your runtime deployments to prioritize risks specifically for your environment.

the types of Compute Monitoring.

  • Monitor Applications
    • In Prisma Cloud Compute, monitor applications once they have been discovered and identify and prevent vulnerabilities across the entire application lifecycle while prioritizing risk for your cloud native environments.
  • Integrate Vulnerability Management
    • Integrate vulnerability management into any CI/CD process, while continuously monitoring, identifying, and preventing risks to all the hosts, images, and functions in your environment.

Demo: Vulnerability Explorer how Vulnerability Explorer takes it a step further by analyzing the data within the context of your environment.

compute > monitor > vulnerability:

Screen Shot 2020-10-22 at 19.46.46

Screen Shot 2020-10-22 at 19.47.40

Screen Shot 2020-10-22 at 19.47.52

Demo: Search CVEs how to search for exposure to specific CVEs and determine if Prisma Cloud offers coverage for a specific CVE by using the search interface in the Console.

compute > monitor > vulnerability:

CVE-yyyy-nnnn

Screen Shot 2020-10-22 at 19.49.07

Screen Shot 2020-10-22 at 19.49.19


Prisma Cloud Compute Reports

Prisma Cloud enables you to view, assess, report, monitor, and review your cloud infrastructure health and compliance posture.

Prisma Cloud Scan Reports

  • After Defender is installed, it automatically starts scanning images on the host.
  • After the initial scan, subsequent scans are triggered periodically, according to the scan interval configured in the Console.
  • By default, images are scanned every 24 hours.

Scanning Process Prisma Cloud scans are also triggered when new images are created, pushed, or pulled onto the host, when images change, and when scans are forced with the Scan button in console.

  • Step 1
    • Prisma Cloud scans all Docker images on all hosts that run Defender.
  • Step 2
    • After Defender is installed, it automatically starts scanning images on the host.
  • Step 3
    • After the initial scan, subsequent scans are triggered.

What Defender Scans For

  • The Prisma Cloud Intelligence Stream keeps Console up to date with the latest vulnerabilities.
  • The data in this feed is distributed to your Defenders, and employed in subsequent scans.
  • Through Console, Defender can be extended to scan images for custom components.
  • For example
  • configure Defender to scan for an internally developed library named libexample.so, and set a policy to block a container from running if version 1.9.9 or earlier is installed.

Defender scans Docker images for:

Demo: View Scan Reports

compute > monitor > vulnerability > images

Screen Shot 2020-10-22 at 20.02.37

Screen Shot 2020-10-22 at 20.02.59

compute > monitor > vulnerability > hosts

Screen Shot 2020-10-22 at 20.03.18

Screen Shot 2020-10-22 at 20.03.29


check

Compute supports which two Defender types? (Choose two.)

  • Host
  • Container

What does the Intelligence Stream provide to the Console?

  • Delivery of real-time threat feed

How can the Compute Console be accessed in Prisma Cloud?

  • Click the Compute tab in Prisma Cloud

.

This post is licensed under CC BY 4.0 by the author.

Comments powered by Disqus.