Prisma Cloud Release Notes
Prisma Cloud Release Notes
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2023-2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
August 18, 2023
API Changes..................................................................................................................556
Features Introduced in July 2023...................................................................................... 557
New Features in Prisma Cloud Compute.............................................................. 557
API Changes..................................................................................................................560
Features Introduced in June 2023..................................................................................... 562
New Features in Prisma Cloud Compute.............................................................. 562
API Changes..................................................................................................................564
Breaking Changes in API........................................................................................... 564
Deprecation Notice.....................................................................................................566
Features Introduced in May 2023......................................................................................568
New Features in Prisma Cloud Compute.............................................................. 568
API Changes..................................................................................................................569
End of Support Notifications....................................................................................570
Features Introduced in April 2023..................................................................................... 571
New Features in Prisma Cloud Compute.............................................................. 571
API Changes..................................................................................................................576
Breaking Changes in API........................................................................................... 576
DISA STIG Scan Findings and Justifications......................................................... 577
Backward Compatibility for New Features...........................................................577
End of Support Notifications....................................................................................577
Changes in Existing Behavior................................................................................... 577
Features Introduced in March 2023..................................................................................579
New Features in Prisma Cloud Compute.............................................................. 579
Features Introduced in February 2023............................................................................. 581
New Features in Prisma Cloud Compute.............................................................. 581
Features Introduced in January 2023............................................................................... 585
New Features in Prisma Cloud Compute.............................................................. 585
API Changes..................................................................................................................601
Addressed Issues......................................................................................................... 606
Backward Compatibility for New Features...........................................................608
Features Introduced in December 2022...........................................................................611
Addressed Issues......................................................................................................... 611
Features Introduced in November 2022.......................................................................... 612
Addressed Issues......................................................................................................... 612
Features Introduced in September 2022..........................................................................614
New Features in Prisma Cloud Compute.............................................................. 614
Addressed Issues......................................................................................................... 615
Supported Host Operating Systems and Orchestrators.................................... 616
End of Support Notifications....................................................................................616
Breaking Change Notification.................................................................................. 617
Features Introduced in July 2022...................................................................................... 618
Get Help...........................................................................................................723
Related Documentation.........................................................................................................724
Request Support......................................................................................................................725
Contact Information....................................................................................................725
7
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
Updates to Workload Defense Metrics on The Adoption Advisor dashboard and report
Adoption Advisor now provide valuable insights on your
workload defense coverage through both
agentless scanning and Defenders. In addition
to the information on how many hosts and
cloud accounts are protected with Defenders,
you can now review how many hosts are
scanned using agentless security. This way,
you’ll have a comprehensive picture of the
total number of hosts that are protected and
scanned hosts using Prisma Cloud.
API Ingestions
• Microsoft.OperationalInsights
/workspaces/storageinsightcon
figs/read
• Microsoft.Sql/servers/databas
es/read
• Microsoft.Sql/servers/databas
es/backupLongTermRetentionPol
icies/read
• Microsoft.Synapse/workspaces/
sqlPools/vulnerabilityAssessm
ents/read
• identitytoolkit.tenants.list
• identitytoolkit.tenants.get
New Policies
AWS Lambda function URL having overly Identifies AWS Lambda functions which
permissive cross-origin resource sharing have overly permissive cross-origin resource
permissions sharing (CORS) permissions. Overly
permissive CORS settings (allowing wildcards)
can potentially expose the Lambda function to
unwarranted requests and cross-site scripting
attacks. It is highly recommended to specify
the exact domains (in 'allowOrigins') and
HTTP methods (in 'allowMethods') that should
be allowed to interact with your function to
ensure a secure setup.
Policy Severity— Medium
Policy Type— Config
AWS Auto Scaling group launch configuration Identifies the autoscaling group launch
has public IP address assignment enabled configuration that is configured to assign
a public IP address. Auto Scaling groups
assign a public IP address to the group’s ec2
instances if its associated launch configuration
is configured to assign a public IP address.
Amazon EC2 instances should only be
accessible from behind a load balancer instead
of being directly exposed to the internet. It is
recommended that the Amazon EC2 instances
in an autoscaling group launch configuration
do not have an associated public IP address
except for limited edge cases.
Policy Severity— Medium
Policy Type— Config
and associatePublicIpAddress is
true
AWS Auto Scaling group launch configuration Identifies the autoscaling group launch
configured with Instance Metadata Service configuration where the Instance Metadata
hop count greater than 1 Service network hops count is set to greater
than 1. A launch configuration is an instance
configuration template that an Auto Scaling
group uses to launch EC2 instances. With
the metadata response hop limit count for
the IMDS greater than 1, the PUT response
that contains the secret token can travel
outside the EC2 instance. Only metadata with
a limited hop count for all your EC2 instances
is recommended.
Policy Severity— Medium
Policy Type— Config
AWS Auto Scaling group launch configuration Identifies the autoscaling group launch
not configured with Instance Metadata configuration where IMDSv2 is set to
Service v2 (IMDSv2) optional. A launch configuration is an instance
configuration template that an Auto Scaling
group uses to launch EC2 instances. With
IMDSv2, every request is now protected by
session authentication. Version 2 of the IMDS
adds new protections that weren’t available
in IMDSv1 to further safeguard your EC2
instances created by the autoscaling group. It
is recommended to use only IMDSv2 for all
your EC2 instances.
Policy Severity— Medium
Azure Database for MySQL server not Identifies Azure MySQL database servers
configured private endpoint that are not configured with private endpoint.
Private endpoint connections enforce
secure communication by enabling private
connectivity to Azure Database for MySQL.
Policy Severity— Medium
Policy Type— Config
Azure Cache for Redis not configured with Identifies Azure Cache for Redis which are
data in-transit encryption not configured with data encryption in transit.
Enforcing an SSL connection helps prevent
unauthorized users from reading sensitive
data that is intercepted as it travels through
the network, between clients/applications and
cache servers, known as data in transit.
Policy Severity— Medium
Policy Type— Config
Azure SQL Database server not configured Identifies Azure SQL database servers that
private endpoint are not configured with private endpoint.
Private endpoint connections enforce
secure communication by enabling private
connectivity to Azure Database for SQL.
Configuring a private endpoint enables
access to traffic coming from only known
networks and prevents access from malicious
or unknown IP addresses which includes IP
addresses within Azure. It is recommended
to create private endpoint for secure
communication for your Azure SQL database.
Policy Severity— Medium
Policy Type— Config
Azure Database for MariaDB not configured Identifies Azure MariaDB database servers
private endpoint that are not configured with private endpoint.
Private endpoint connections enforce
secure communication by enabling private
connectivity to Azure Database for MariaDB.
Configuring a private endpoint enables
access to traffic coming from only known
networks and prevents access from malicious
or unknown IP addresses which includes IP
addresses within Azure. It is recommended
to create private endpoint for secure
communication for your Azure MariaDB
database.
Policy Severity— Medium
Policy Type— Config
Policy Updates
Policy Updates—RQL
AWS CloudTrail is not enabled with multi trail Changes— The policy RQL is updated to check
and not capturing all management events if logging all management events has been
enabled via basic or advanced event selectors.
Severity— Informational
Policy Type— Config
Current RQL—
= 'isMultiRegionTrail is true
and includeGlobalServiceEvents
is true' as X; config from
cloud.resource where api.name=
'aws-cloudtrail-get-trail-
status' AND json.rule =
'status.isLogging equals
true' as Y; config from
cloud.resource where api.name=
'aws-cloudtrail-get-event-
selectors' AND json.rule =
'eventSelectors[*].readWriteType
contains All' as Z; filter
'($.X.trailARN equals
$.Z.trailARN) and ($.X.name
equals $.Y.trail)'; show X;
count(X) less than 1
Updated RQL—
GCP VM instances have block project-wide Changes— The policy RQL is updated to
SSH keys feature disabled check for enabling OS login for the GCP VM
instances.
Severity— Low
Policy Type— Config
Current RQL—
Updated RQL—
Policy Updates—Metadata
Updates to Azure Policy Names Changes— The policy names are revised as
follows:
Current Policy Name— Azure storage account
logging for tables is disabled
Updated Policy Name— Azure storage
account logging (Classic Diagnostic Setting)
for tables is disabled
Current Policy Name— Azure storage account
logging for blobs is disabled
Updated Policy Name— Azure storage
account logging (Classic Diagnostic Setting)
for blobs is disabled
Support for CIS AWS Foundations Prisma Cloud now supports the CIS AWS
Benchmark v2.0.0 Foundations Benchmark v2.0.0 compliance
standard. This benchmark specifies best
practices for configuring AWS services in
accordance with industry best practices.
You can now view this built-in standard and
the associated policies on the Compliance >
Standard page with this support. You can also
generate reports for immediate viewing or
download, or schedule recurring reports to
track this compliance standard over time.
FEATURE DESCRIPTION
Code Security has a New Name Cloud Application Security is the new name
for the combination of the Cloud Code
Security capabilities and the newly introduced
CI/CD Security module. CI/CD Security is
available as a standard a-la-carte option or
as an add-on with the Prisma Cloud Runtime
Security Foundations or Advanced bundles.
Update Amazon Inspector API Prisma Cloud will no longer ingest metadata
for aws-inspector-v2-finding API. Due
to this change, you will no longer be able to
view the list the assets on the Investigate
page and perform an RQL search query for
this API.
New Features
FEATURE DESCRIPTION
Attack Path Analysis and Visualization Prisma Cloud now includes attack path
analysis and visualization that identifies attack
paths and presents them in a graph view,
offering valuable security context to protect
against high-risk threats. It is an automated
process that identifies the exposed vulnerable
assets and indicates the likelihood of a breach
which often requires immediate action.
Whenever there is a policy violation, the
attack path policy generates an alert as long
as there is a matching alert rule. You can see
additional information in the graph view by
clicking on the node. Additionally, the asset
detail view displays the finding types and
vulnerabilities. To review these policies, select
Policies and filter by Policy Type Attack Path.
Attack Path policies are not available in China
and Government regions.
Support for New Region on AWS Prisma Cloud now ingests data for resources
deployed in the Spain region on AWS.
To review a list of supported regions, select
Inventory > Assets, and choose Cloud Region
from the filter drop-down.
Enhancement Tenant-Level Opt-Out for For greater control and flexibility for system
Prisma Cloud Chronicles administrators within your organization, you
can now opt-out all your administrators from
receiving the Prisma Cloud Chronicles at the
tenant level Settings > Enterprise Settings >
Unsubscribe from Prisma Cloud Chronicles.
An email is sent to all administrators notifying
them that a System Administrator has opted
them out. Each administrator who wants to
receive the latest weekly updates can edit
their preference on their Prisma Cloud user
profile to opt-in to receive the newsletter.
API Ingestions
DeliverLogStatus
field.
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
• firebaseappdistro.testers.lis
t
• identitytoolkit.tenants.getIa
mPolicy
• firebaseauth.users.get
• VOLUME_INSPECT
• VOLUME_ATTACHMENT_INSPECT
• VOLUME_ATTACHMENT_READ
• PRIVATE_IP_READ
• psubnetId
• backupNetworkNsgIds
• backupSubnetId
New Policies
Unusual Usage of Workload Credentials Two new anomaly policies are now available
Anomaly Policies on the Policies page in Prisma Cloud.
• Unusual usage of Workload Credentials
from outside the Cloud
AWS Route53 Hosted Zone having dangling Identifies AWS Route53 Hosted Zones which
DNS record with subdomain takeover risk have dangling DNS records with subdomain
associated with AWS Elastic Beanstalk takeover risk. A Route53 Hosted Zone having
Instance a CNAME entry pointing to a non-existing
Elastic Beanstalk (EBS) will have a risk of
these dangling domain entries being taken
over by an attacker by creating a similar
Elastic beanstalk (EBS) in any AWS account
which the attacker owns / controls. Attackers
can use this domain to do phishing attacks,
spread malware and other illegal activities. As
a best practice, it is recommended to delete
dangling DNS records entry from your AWS
Route 53 hosted zones.
Severity— High
Azure App Service web apps with public Identifies Azure App Service web apps that
network access are publicly accessible. Publicly accessible
web apps could allow malicious actors to
remotely exploit if any vulnerabilities and
could. It is recommended to configure the
App Service web apps with private endpoints
so that the web apps hosted are accessible
only to restricted entities.
Azure Function app configured with public Identifies Azure Function apps that are
network access configured with public network access.
Publicly accessible web apps could allow
malicious actors to remotely exploit any
vulnerabilities and could. It is recommended
to configure the App Service web apps with
private endpoints so that the functions hosted
are accessible only to restricted entities.
Azure Data Explorer cluster double Identifies Azure Data Explorer clusters
encryption is disabled in which double encryption is disabled.
Double encryption adds a second layer of
encryption using service-managed keys. It
is recommended to enable infrastructure
double encryption on Data Explorer clusters
so that encryption can be implemented at the
layer closest to the storage device or network
wires.
Azure Data Explorer cluster disk encryption is Identifies Azure Data Explorer clusters in
disabled which disk encryption is disabled. Enabling
encryption at rest on your cluster provides
data protection for stored data. It is
recommended to enable disk encryption on
Data Explorer clusters.
Policy Updates
Policy Updates—RQL
GCP VPC Flow logs for the subnet is set to Changes— The policy RQL has been updated
Off to exclude checking for proxy-only subnets in
the policy as VPC flow logs are not supported
for proxy-only subnets.
Severity— Informational
Policy Type— Config
Current RQL—
Updated RQL—
source.cloud.resource.type
= 'ec2' AND
= 'instance' source.cloud.resource.type
= 'instance'
FEATURE DESCRIPTION
Microsegmentation EoS With the 23.8.1 release, the credit usage for
Microsegmentation is no longer displayed
on Settings > Licensing. This change follows
the announcement of the Microsegmentation
capabilities as End-of-Sale effective August
31, 2022. To retrieve your credit consumption
for Microsegmentation, you can use the
POST /license/api/v1/usage API.
New Features
FEATURE DESCRIPTION
Integrated View of Run and Build details for To help you as a Cloud Security Engineer
Alerts investigate issues from code to cloud, the
alert details now include information to trace
and attribute which build-time resource
has caused a policy violation for a runtime
resource deployed in your cloud account.
The alert details overview includes the IaC
resource details and information on the
build time resource. The new Traceability
information helps you connect an alert from
the production environment back to the origin
templates in your upstream development
environment.
To view the build-time details in an alert:
• You must enable a Configuration policy
with the subtype Run, Build and attach it to
an alert rule on Prisma Cloud.
• Your IaC templates must be onboarded
through a VCS integration.
• Terraform resources must include the
yor_trace tag so that your IaC resources
are tagged with a unique UUID for
tracing the relationship between the code
resource and the runtime resource that is
deployed from it. This is not necessary for
CloudFormation.
Prisma Cloud Data Security - Asset Level There is usually several TB or PB of data
Scan stored in your organization’s S3 buckets. In
order to reduce the cost associated with the
scanning of a large volume of data and to
provide you with more value, Prisma Cloud
Data Security now provides you the option
of Asset Level Scan. When you select this
option (default) while configuring a scan,
Prisma Cloud randomly scans 10% of objects
or maximum of 1TB (whichever is lower)
and sends the data for analysis. It stops the
scan as soon as it detects an object with
sensitive data and triggers a 'Storage Asset
with sensitive data found' policy.
Asset Level Scan only applies when you
select the Backward Scan mode and does
exposure analysis and data classification and
not malware scanning. It is only available
when you’re configuring a data security scan
for your AWS cloud accounts.
API Ingestions
• Microsoft.Insights/Diagnostic
Settings/Read
• deploymentmanager.deployments
.getIamPolicy
deploymentmanager.deployments.l
ist
.
You must manually add the permission or
update the Terraform template to enable
deploymentmanager.deployments.ge
tIamPolicy
• deploymentmanager.manifests.l
ist
• monitoring.groups.list
• cloudtranslate.customModels.l
ist
• cloudtranslate.datasets.list
New Policies
No new policies for 23.7.2.
Policy Updates
Policy Updates—RQL
AWS Secret Manager Automatic Key Changes— The policy description and RQL
Rotation is not enabled are updated. The policy RQL is updated to
exclude the secrets managed by owning
services.
Updated RQL—
AWS Elastic Load Balancer v2 (ELBv2) with Changes— The policy RQL is updated to
listener TLS/SSL is not configured exclude the NLBs which are forwarding to
ALB using TCP as a listener as per the AWS
limitation.
Policy Severity— Low
Policy Type— Config
Current RQL—
Updated RQL—
OCI Block Storage Block Volume does not Changes— The policy description and RQL are
have backup enabled updated. The RQL is updated to exclude the
Block volumes which are attached to volume
groups.
Updated RQL—
Policy Updates—Metadata
AWS Route53 Hosted Zone having dangling Changes— The policy name and description
DNS record with subdomain takeover risk are updated to reflect the association of
this risk with S3 Buckets, providing a more
accurate representation of the associated
service.
Current Policy Name— AWS Route53 Hosted
Zone having dangling DNS record with
subdomain takeover risk
Updated Policy Name— AWS Route53
Hosted Zone having dangling DNS record
with subdomain takeover risk associated with
AWS S3 Bucket
does not
exist
dest.cloud.resource.name
dest.cloud.wildcardscope
ENDS WITH '*’ = true
('iam:PassedToService')
does not
does not exist
exist
CHANGE DESCRIPTION
New API to Get Resource The following new endpoint is added to get the latest
Snapshot resource snapshot by using the Restricted Resource
Name(rrn).
• Get Resource Snapshot - GET /das/api/v1/resource
New Features
FEATURE DESCRIPTION
Support for New Regions on AWS Prisma Cloud now ingests data for resources
deployed in the Zurich and Melbourne regions
on AWS.
To review a list of supported regions, select
Inventory > Assets, and choose Cloud Region
from the filter drop-down.
Prisma Cloud Data Security Support for Prisma Cloud Data Security is now available
Singapore on the app.sg stack for all Prisma Cloud
customers in Singapore. The data scans and
data will remain within Singapore.
API Ingestions
• cloudtranslate.glossaries.lis
t
• INSTANCE_IMAGE_READ
New Policies
Azure SQL on Virtual Machine (Linux) with Identifies Azure Virtual Machines that are
basic authentication hosted with SQL on them and have basic
authentication.
Azure Virtual Machines with basic
authentication could allow attackers to
brute force and gain access to SQL database
hosted on it, which might lead to sensitive
information leakage. It is recommended to use
SSH keys for authentication to avoid brute
force attacks on SQL database hosted virtual
machines.
AWS Route53 Hosted Zone having dangling Identifies AWS Route53 Hosted Zones which
DNS record with subdomain takeover risk have dangling DNS records with subdomain
takeover risk. A Route53 Hosted Zone
having a CNAME entry pointing to a non-
existing S3 bucket will have a risk of these
dangling domain entries being taken over by
an attacker by creating a similar S3 bucket in
any AWS account which the attacker owns /
controls. Attackers can use this domain to
do phishing attacks, spread malware and
other illegal activities. As a best practice, it is
recommended to delete dangling DNS records
entry from your AWS Route 53 hosted zones.
resourceRecordSet[?
any( type equals CNAME and
resourceRecords[*].value
contains s3-website )]
exists as X; config from
cloud.resource where api.name
= 'aws-s3api-get-bucket-
acl' as Y; filter 'not
($.X.resourceRecordSet[*].name
intersects $.Y.bucketName)';
show X;
Policy Updates
Policy Updates—RQL
AWS Application Load Balancer (ALB) is not Changes— The policy description
using the latest predefined security policy and recommendation steps have
been updated. The policy RQL has
been updated to check for the latest
security policy ELBSecurityPolicy-
TLS13-1-2-2021-06
Updated Description— Identifies Application
Load Balancers (ALBs) are not using the latest
predefined security policy. A security policy
is a combination of protocols and ciphers.
The protocol establishes a secure connection
between a client and a server and ensures
that all data passed between the client and
your load balancer is private. A cipher is an
encryption algorithm that uses encryption
keys to create a coded message. So it is
recommended to use the latest predefined
security policy which uses only secured
protocol and ciphers.
We recommend using ELBSecurityPolicy-
TLS13-1-2-2021-06 policy to meet
compliance and security standards that
require disabling certain TLS protocol versions
or to support legacy clients that require
deprecated ciphers.
Severity— Low
Updated RQL—
AWS EC2 instance that is reachable from Changes— Policy RQL is updated to check and
untrust internet source to ports with high risk report EC2 instance which are in active state.
Severity— High
Policy Type— Config
Current RQL—
'tcp/3306', 'tcp/4333',
'tcp/5000', 'tcp/5432',
'tcp/5500', 'tcp/5601',
'tcp/8080', 'tcp/8088',
'tcp/8888', 'tcp/9200',
'tcp/9300' )
Updated RQL—
Azure SQL Server ADS Vulnerability Changes— The policy description and
Assessment is disabled recommendation steps have been updated.
The policy RQL has been updated according
to new express configuration to check if ADS
vulnerability assessment is disabled.
Updated Decsription— Identifies Azure
SQL Server which has ADS Vulnerability
Assessment setting disabled. Advanced Data
Security - Vulnerability Assessment service
scans SQL databases for known security
vulnerabilities and highlight deviations from
best practices, such as misconfigurations,
excessive permissions, and unprotected
sensitive data. It is recommended to enable
ADS - VA service.
Severity— Medium
Policy Type— Config
Current RQL—
Updated RQL—
Otoritas Jasa Keuangan (OJK) 38/ Prisma Cloud now supports Otoritas Jasa
POJK.03/2016 Keuangan (OJK) 38/POJK.03/20 regulations.
The regulation provides specific guidance on
the contents of the outsourcing agreement,
due diligence, monitoring performance,
contingency planning, audit, and information
access rights.
You can review this compliance standard
and its associated policies on Prisma Cloud’s
Compliance > Standard page.
FEATURE DESCRIPTION
Access to Alerts for Deleted Assets The ability to view resolved alerts for assets
that have been deleted in cloud accounts
This change was first announced in the Look
onboarded to Prisma Cloud will be available
Ahead that was published with the 23.5.2
for up to 90 days after asset deletion. After
release
90 days, these alerts will be permanently
deleted from Prisma Cloud.
New Features
FEATURE DESCRIPTION
API Ingestions
resourceRecordSet[*].name
New Policies
GCP VM instance that is reachable from Identifies GCP VM instances that are
untrust internet source to ports with high risk reachable from untrusted internet sources
to ports with high risk. VM instances with
unrestricted access to the internet for high
risky port may enable bad actors to use brute
force on a system to gain unauthorized access
to the entire network. As a best practice,
restrict traffic from unknown IP addresses
and limit access to known hosts, services, or
specific entities.
Policy Updates
Policy Updates-Metadata
AWS S3 bucket policy overly permissive to Changes— Updating Policy Name, and
any principal Description
Policy Type— Config
Severity— Medium
FEATURE DESCRIPTION
Rate Limit on POST /login Endpoint The POST /login endpoint will enforce rate
limiting (HTTP Response Code 429).
This change was first announced in the look
ahead that was published with the 23.5.1
release.
New Features
FEATURE DESCRIPTION
Trendline for Critical Severity in Adoption The Assets With Urgent Alerts, Incident
Advisor Widgets Burndown, and Risk Burndown widgets have
a trendline for critical severity alerts and
assets to help you quickly review the trends
for the most critical issues.
For Assets With Urgent Alerts, you can
see the critical and high severity asset data
points in all the 30, 60, and 90 day time series
starting June 2023.
API Ingestions
• dax:DescribeParameters
• dns.resourceRecordSets.list
• notebooks.schedules.list
• dataplex.lakes.list
• dataplex.zones.list
• dataplex.zoneActions.list
• dataplex.lakes.list
• dataplex.lakeActions.list
• MESH_INGRESS_GATEWAY_ROUTE_TA
BLE_LIST
• MESH_INGRESS_GATEWAY_ROUTE_TA
BLE_READ
• MESH_INGRESS_GATEWAY_READ
• DB_NODE_INSPECT
• DB_NODE_QUERY
New Policies
AWS EC2 instance that is internet reachable Identifies AWS EC2 instances that are
with unrestricted access (0.0.0.0/0) to Admin internet reachable with unrestricted access
ports (0.0.0.0/0) to Admin ports (22 / 3389). EC2
instances with unrestricted access to the
internet for admin ports may enable bad
actors to use brute force on a system to gain
unauthorized access to the entire network. As
a best practice, restrict traffic from unknown
AWS EC2 instance that is reachable from Identifies AWS EC2 instances that are
untrust internet source to ports with high risk internet reachable with untrust internet
source to ports with high risk. EC2 instances
with unrestricted access to the internet for
high risky port may enable bad actors to use
brute force on a system to gain unauthorized
access to the entire network. As a best
practice, restrict traffic from unknown IP
addresses and limit the access to known
hosts, services, or specific entities.
Azure Virtual Machine that is internet Identifies Azure Virtual Machines that are
reachable with unrestricted access (0.0.0.0/0) internet reachable with unrestricted access
to Admin ports (0.0.0.0/0) to admin ports. Azure VMs with
unrestricted internet access to admin ports
may enable bad actors to use brute force
GCP VM instance that is internet reachable Identifies GCP VM instances that are internet
with unrestricted access (0.0.0.0/0) to Admin reachable with unrestricted access (0.0.0.0/0)
ports to Admin ports (22 / 3389). VM instances
with unrestricted internet access to admin
ports may enable bad actors to use brute
force on a system to gain unauthorized access
to the entire network. As a best practice,
restrict traffic from unknown IP addresses
and limit access to known hosts, services, or
specific entities.
Policy Updates
Policy Updates—RQL
AWS S3 bucket policy overly permissive to Changes— The policy description and RQL are
any principal updated. The RQL now considers Block public
access settings configuration at account and
bucket Level.
Updated Description— Identifies the S3
buckets that have a bucket policy overly
permissive to any principal and don’t have
Block public and cross-account access to
buckets and objects through any public
bucket or access point policies enabled. It is
recommended to follow the principle of least
privileges ensuring that the only restricted
entities have permission on S3 operations
instead of any anonymous.
Policy Type— Config
Severity— Medium.
Current RQL—
Updated RQL—
AWS S3 bucket publicly writable Changes— The policy remediation steps and
RQL are updated. The policy RQL now checks
for Authenticated Users access.
Policy Type— Config
Severity— High.
Current RQL—
is false and
accountLevelPublicAccessBlockConfiguration
is false))) and
(policy.Statement[?any(Effect
equals Allow and (Principal
equals * or Principal.AWS
equals *) and (Action contains
s3:* or Action contains
s3:Put or Action contains
s3:Create or Action contains
s3:Replicate or Action contains
s3:Update or Action contains
s3:Delete) and (Condition does
not exist))] exists))) and
websiteConfiguration does not
exist
Updated RQL—
is false and
accountLevelPublicAccessBlockConfiguration
is false))) and
(policy.Statement[?any(Effect
equals Allow and (Principal
equals * or Principal.AWS
equals *) and (Action contains
s3:* or Action contains
s3:Put or Action contains
s3:Create or Action contains
s3:Replicate or Action contains
s3:Update or Action contains
s3:Delete) and (Condition does
not exist))] exists))) and
websiteConfiguration does not
exist
GCP Log metric filter and alert does not exist Changes— The Policy RQL is updated to verify
for VPC network route delete and insert if resource type is present in the Log metric
filter.
Policy Type— Config
Severity— Informational.
Current RQL—
Updated RQL—
GCP Log metric filter and alert does not exist Changes— The Policy RQL is updated to verify
for VPC network route changes if resource type is present in the Log metric
filter.
Policy Type— Config
Severity— Informational.
Current RQL—
api.name = 'gcloud-monitoring-
policies-list' as Y; filter
'$.Y.conditions[*].metricThresholdFilter
contains $.X.name and
($.X.filter does not
contain "resource.type
=" or $.X.filter does not
contain "resource.type=")
and ($.X.filter does not
contain "resource.type !
=" and $.X.filter does not
contain "resource.type!=") and
$.X.filter contains "gce_route"
and ($.X.filter contains
"jsonPayload.event_subtype="
or $.X.filter contains
"jsonPayload.event_subtype
=") and ($.X.filter
does not contain
"jsonPayload.event_subtype!="
and $.X.filter does not contain
"jsonPayload.event_subtype !
=") and $.X.filter contains
"compute.routes.delete"
and $.X.filter contains
"compute.routes.insert"'; show
X; count(X) less than 1
Updated RQL—
"compute.routes.delete"
and $.X.filter contains
"compute.routes.insert"'; show
X; count(X) less than 1
GCP Log metric filter and alert does not exist Changes— The Policy RQL is updated to verify
for VPC network route patch and insert if resource type is present in the Log metric
filter.
Policy Type— Config
Severity— Informational.
Current RQL—
Updated RQL—
api.name = 'gcloud-monitoring-
policies-list' as Y; filter
'$.Y.conditions[*].metricThresholdFilter
contains $.X.name and
( $.X.filter contains
"resource.type =" or $.X.filter
contains "resource.type=" )
and ( $.X.filter does not
contain "resource.type !
=" and $.X.filter does not
contain "resource.type!=" ) and
$.X.filter contains "gce_route"
and ( $.X.filter contains
"protoPayload.methodName="
or $.X.filter contains
"protoPayload.methodName
=" ) and ( $.X.filter
does not contain
"protoPayload.methodName!="
and $.X.filter does not contain
"protoPayload.methodName !
=" ) and $.X.filter contains
"beta.compute.routes.patch"
and $.X.filter contains
"beta.compute.routes.insert"';
show X; count(X) less than 1
GCP Log metric filter and alert does not exist Changes— The Policy RQL is updated to verify
for VPC network changes if resource type is present in the Log metric
filter.
Policy Type— Config
Severity— Informational.
Current RQL—
Updated RQL—
"compute.networks.delete"
and $.X.filter contains
"compute.networks.removePeering"
and $.X.filter contains
"compute.networks.addPeering"';
show X; count(X) less than 1
GCP Log metric filter and alert does not exist Changes— The Policy RQL is updated to verify
for Cloud Storage IAM permission changes if resource type is present in the Log metric
filter.
Policy Type— Config
Severity— Informational.
Current RQL—
Updated RQL—
CIS Google Kubernetes Engine (GKE) v1.4.0 - The Center for Internet Security (CIS) releases
(Level 1 and Level 2) benchmarks for best practice security
recommendations. CIS Google Kubernetes
Engine (GKE) v1.4.0 - (Level 1 and Level 2)
is a set of recommendations for configuring
Kubernetes to support a strong security
posture. Benchmarks are tied to specific
Kubernetes releases. The CIS Kubernetes
Benchmark is written for open-source
Kubernetes distribution and is intended to be
universally applicable. Based on the existing
CIS Benchmark, this standard adds additional
Google Cloud-specific controls.
You can review this compliance standard
and its associated policies on Prisma Cloud’s
Compliance > Standard page.
FEATURE DESCRIPTION
S3 Flow Logs with Hourly Partition If you currently ingest AWS flow logs using
S3 with the 24-hour partition, you need to
This change was first announced in the look
change it to the hourly partition.
ahead that was published with the 23.1.1
release. To make this change, Configure Flow Logs
to use the hourly partition and enable the
required additional fields.
Impact— VPC Flow logs with partitions set to
Every 24 hours (default) will be disabled. As a
result, you will no longer be able to monitor or
receive alerts for these logs.
New Features
FEATURE DESCRIPTION
Release Notes Look Ahead Displayed on The New in Prisma Cloud section on the
Home Page Home page now includes information from
the Look Ahead section of the release notes.
Adoption Advisor Furthers Your Code & Build The Adoption Advisor now includes two
Hygiene additional checks for enforcing hygiene in the
Code & Build phase.
You can Create Custom Secret Signature
in the Code Policy Management category.
This enables you to prevent developers from
committing hard coded secrets based on
custom signatures.
You can Add Drift Alert Rule in the
Notifications category. This enables you
to trace and get notified regarding the
configuration changes between the deployed
cloud resources and your IaC templates in
order to quickly remediate drifts.
Attack Path Policies Displayed on Home Prisma Cloud Attack Path policies identify
Page, Command Center, and Alerts the confluence of issues that increase the
likelihood of a security breach.
You can now view the Attack Path policies on
the Homepage, Command Center dashboard,
and the Alerts page as a specific Saved View.
API Ingestions
• serverlessrepo:ListApplicatio
ns
• transfer:DescribeUser
• networkservices.grpcRoutes.li
st
New Policies
Azure Virtual Machine that is reachable from Identifies Azure Virtual machines that are
any untrust internet source to ports with high reachable from any untrust internet source
risk to ports with high risk. Azure VMs with
untrusted access to high risky ports may
enable bad actors to use brute force on a
system to gain unauthorized access to the
entire network. As a best practice, restrict
traffic from unknown IP addresses and limit
the access to known hosts, services, or
specific entities.
Severity— High
RQL—
'tcp/3000', 'tcp/3306',
'tcp/4333', 'tcp/5000',
'tcp/5432', 'tcp/5500',
'tcp/5601', 'tcp/8080',
'tcp/8088', 'tcp/8888',
'tcp/9200', 'tcp/9300' ) and
dest.resource.state = 'Active'
Azure SQL Server (PaaS) reachable from any Identifies Azure SQL Servers (PaaS) that are
untrust internet source reachable from any untrust internet source
on TCP port. SQL Server instances with
untrusted access to the internet may enable
bad actors to use brute force on a system
to gain unauthorised access to the entire
network. As a best practice, restrict traffic
from untrusted IP addresses and limit the
access to known hosts, services, or specific
entities.
Severity— High
RQL—
GCP VM instance that is internet reachable Identifies GCP VM instances that are internet
with unrestricted access (0.0.0.0/0) reachable with unrestricted access (0.0.0.0/0).
VM instances with unrestricted access to the
internet may enable bad actors to use brute
force on a system to gain unauthorised access
to the entire network. As a best practice,
restrict traffic from unknown IP addresses and
limit the access to known hosts, services, or
specific entities.
Severity— High
RQL—
Policy Updates
Policy Updates—RQL
AWS S3 bucket is not configured with MFA Changes— The policy RQL has been updated
Delete to exclude S3 buckets which are configured
with bucketLifecycleConfiguration
rules because MFA Delete can’t be enabled for
those buckets.
Severity— Low
Current RQL—
Updated RQL—
FEATURE DESCRIPTION
Disabled Policy cannot be Re-enabled within When you disable a policy, a message to
4 Hours inform you that Disabling this policy will
automatically mark any open alerts as
resolved. You won’t be able to enable the
policy back for 4 hours. Are you sure you
want to continue? is displayed. After you
confirm, the policy will be disabled and that
marks the start of a 4-hour window during
which you cannot re-enable the policy. During
this period, the button to enable the policy
will be greyed out in the UI, and if you use
the API to change the policy status the HTTP
response will display an error.
Impact— The restriction will apply to all policy
types and all policy severities.
UEBA Anomaly Policy Attribution Extended Alerts from UEBA anomaly policies were
to Support Compute Instances attributed to compute instances using their
cloud IDs and not names. For example, an
alert was attributed to an AWS EC2 instance
by its ID i-019b8f824f4f77001 and not by
its name demo-host. When such an alert was
generated, you would not be able to click
on the resource to see the Unified Asset
Inventory (UAI) details and the Command
Center also reported the instance by its ID
instead of name.
Prisma Cloud has now added additional
checks to UEBA anomaly policies to make
sure alerts are attributed to a resource by its
name. Now, when you click on a resource
on the Alerts page, the UAI details will be
displayed.
Deprecation Notice
FEATURE DESCRIPTION
Azure Defender for Cloud Secure Score API Prisma Cloud no longer ingests metadata
Ingestion for the azure-defender-for-cloud-
secure-score API.
In RQL, the key is not available in the
api.name attribute auto completion.
Impact— If you have a saved search or custom
policies based on this API, you must delete
them manually.
The policy alerts will be resolved as
Policy_deleted.
New Features
FEATURE DESCRIPTION
Recurring Reports for Cloud Security To make sure that you are not missing
Assessment anything important, you can now schedule a
recurring Cloud Security Assessment Report
and keep track of the risks from open alerts in
your monitored cloud accounts.
You can customize it to run on a daily,
weekly, or monthly basis and pick an email
template. Once you set it up, you can access
all scheduled reports on Alerts > Reports.
Credit Allocation for Usage You can now distribute the credits you have
purchased for the security features on Prisma
Cloud amongst your teams. When you add a
credit allocation rule (Settings > Licensing >
Credit Allocation), you can provide the total
number of credits for an account group, and
define a usage threshold % at which you want
to be notified. For example, if you set the
threshold to 80% for 1000 credits, an alarm is
generated when the usage is at 800 credits.
You can also monitor the credit usage on
Settings > Licensing > Credit Allocation for a
specified time range.
Cloud Network Analyzer Support for GCP Prisma Cloud now supports network exposure
queries on GCP cloud environments. In
addition to AWS and Azure, you can now also
calculate the net effective reachability of your
GCP cloud resources.
Additional Alert Details in Asset Detail View In Asset Inventory, to better understand the
risks posed by policy violations, the alert
details now also display Policy Name and
Alert Time in addition to Alert ID and Severity
in the asset detail view.
Home Page Access for all All Prisma Cloud users who log in to the
administrative console can now view the
Home page. Based on your permissions, you
can use this page to see the urgent alerts,
recommended workflows, and as a launch
point for onboarding assets that you want
to monitor. Release Notes and industry
research from our Unit 42 team are also at
your fingertips.
Broadened Access for Adoption Advisor The Adoption Advisor is now accessible to
all Prisma Cloud users. Based on your role
and access privileges, you can view a list of
API Ingestions
• iotanalytics:ListTagsForResou
rce
• securityhub:GetEnabledStandar
ds
• Microsoft.Compute/galleries/i
mages/read
• n
• kty
• size
• key_ops
• y
• crv
• kty
• key_ops
• networkconnectivity.hubs.getI
amPolicy
• networkconnectivity.spokes.li
st
• networkconnectivity.spokes.ge
tIamPolicy
• vpcaccess.locations.list
• vpcaccess.connectors.list
• MESH_VIRTUAL_SERVICE_ROUTE?_T
ABLE_READ
• MESH_VIRTUAL_SERVICE?_READ
New Policies
AWS EC2 instance publicly exposed with Identifies AWS EC2 instances which are
critical/high exploitable vulnerabilities and publicly exposed and have exploitable
port scan activity vulnerabilities that are connected with remote
systems known for port scan activities. Port
scans are a type of discovery attack where
a source host is probing a target host across
multiple ports, to find out what services
are running and to uncover vulnerabilities
AWS EC2 instance publicly exposed with Identifies AWS EC2 instances which are
critical/high exploitable vulnerabilities and publicly exposed and have exploitable
ransomware activity vulnerabilities that are connected with remote
systems known for ransomware activities.
Ransomware is a type of malware that
prevents users from accessing their system or
personal files and demands ransom payment
in order to regain access. The network
connectivity with remote systems known for
ransomware activity on a publicly exposed
and exploitable instance indicates that the
instance could be under attack or already
have been compromised.
Policy Severity— Critical.
Policy Updates
Policy Updates-RQL
Azure VM instance in running state that is Changes— The policy name and the RQL is
internet reachable with unrestricted access updated to report instance configured with
(0.0.0.0/0) other than HTTP/HTTPS port HTTP (80) and HTTP (443) port and instance
which are in active state only.
Current Name— Azure VM instance in
running state that is internet reachable with
unrestricted access (0.0.0.0/0) other than
HTTP/HTTPS port Updated Name— Azure
Virtual Machine in running state that is
internet reachable with unrestricted access
(0.0.0.0/0)
Updated Description— Identifies azure VM
instances in running state that are internet
reachable with unrestricted access (0.0.0.0/0).
VM instances with unrestricted access to the
internet may enable bad actors to use brute
force on a system to gain unauthorised access
Updated RQL—
GCP Kubernetes Engine Clusters have Master Changes— The policy RQL is updated to
authorized networks disabled reflect the latest CSP behavior.
Severity— Low
Current RQL—
Updated RQL—
Policy Deletions
Support for Mitre Att&ck v12 Prisma Cloud now supports the Mitre
Att&ck v12 compliance standard. The MITRE
ATTACK Framework is a curated knowledge
base that tracks threat actors' cyber adversary
tactics and techniques throughout the attack
lifecycle. The framework is intended to be
used as a tool to improve your organization’s
security posture.
You can now view this built-in standard and
the associated policies on Prisma Cloud’s
Support for CRI Profile v.1.2.1 Prisma Cloud now supports the CRI Profile
v.1.2.1 compliance standard. This version
includes a reference to cybersecurity
time synchronization controls based on
best practices as requested by the U.S.
Department of the Treasury.
You can now view this built-in standard and
the associated policies on Prisma Cloud’s
Compliance > Standard page with this
support. You can also generate reports for
immediate viewing or download, or schedule
recurring reports to track this compliance
standard over time.
Support for CIS Microsoft Azure Foundations Prisma Cloud now supports the CIS Microsoft
Benchmark v2.0.0 Azure Foundations Benchmark v2.0.0
compliance standard. This benchmark
specifies best practices for configuring Azure
services in accordance with industry best
practices.
You can now view this built-in standard and
the associated policies on Prisma Cloud’s
Compliance > Standard page with this
support. You can also generate reports for
immediate viewing or download, or schedule
recurring reports to track this compliance
standard over time.
FEATURE DESCRIPTION
Critical Severity Policies Included in Auto- Prisma Cloud now includes Critical severity
Enable Default Policies in Enterprise Settings policies in the list of policies that are enabled
out-of-the-box in Enterprise Settings > Auto-
Enable Default Policies. With this change,
both critical and high severity policies (current
behavior), will be enabled out-of-the-box.
Impact—
Support for Permissions for Code Security Prisma Cloud now includes additional read
permissions for Code Security in the terraform
template that you use for onboarding GCP
organizations and projects.
Impact— None. The additional read
permissions are included by default in the
terraform template.
New Features
FEATURE DESCRIPTION
Simplified Onboarding of AWS, Azure, and Prisma Cloud now provides a simplified
GCP Cloud Accounts onboarding experience to adapt to your
security priorities in a streamlined manner
with support for CSPM, CWPP, Data Security,
and Identity Security grouped as Foundational
and/or Advanced capabilities (with a few
enabled by default). The updated onboarding
workflow provides a Faster First Time to
Value (FTTV) by allowing you to onboard
your AWS, Azure, or GCP cloud accounts and
selecting the security capabilities in fewer
clicks.
Support for New Regions on GCP Prisma Cloud now ingests data for resources
deployed in the Doha and Turin cloud regions
on GCP.
To review a list of supported regions, select
Inventory > Assets, and choose Cloud Region
from the filter drop-down.
Enhancement Adoption Advisor Thresholds The thresholds on the Adoption Advisor are
updated to give you a more accurate progress
indicator for the following checks:
• Onboard and Configure Cloud Accounts
• Enable Audit Logs
• Enable Flow Logs
• Define Alert Rules
Enhancement IsSubset method for RQL _Set The _Set function is enhanced to add
function support for the _Set.isSubset method
that enables you to identify whether a specific
value or comma separated list of values
returned by the JSON path of the resource is
fully contained within the target list.
The syntax is:
_Set.isSubset(<path>,
<targelist>) is [ true |
false ]
where
<path> = JSON path
<target_list> = a set of strings
without any whitespace.
Example:
API Ingestions
• fms:ListComplianceStatus
• fms:ListPolicies
• fms:GetPolicy
fms:ListPolicies
fms:GetPolicy
and
fms:GetAdminAccount
dBclusterParameterGroupArn
• Microsoft.Cdn/profiles/origin
groups/read
• Microsoft.Cdn/profiles/securi
typolicies/read
• disableLocalAuth
MinimumTlsVersion
• cloudfunctions.functions.list
• cloudfunctions.functions.getI
amPolicy
• memcache.instances.list
Prisma™ Cloud Release Notes 100 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• DATA_LABELING_DATASET_READ
• MOUNT_TARGET_INSPECT
• MOUNT_TARGET_READ
• FLEET_READ
• MESH_ACCESS_POLICY_READ
Prisma™ Cloud Release Notes 101 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• MESH_VIRTUAL_DEPLOYMENT_READ
• MESH_VIRTUAL_DEPLOYMENT_PROXY
_CONFIG_READ
• MESH_PROXY_DETAILS_READ
• SERVICE_MESH_READ
• AI_SERVICE_SPEECH_TRANSCRIPTI
ON_JOB_READ
• AI_SERVICE_VISION_MODEL_READ
Prisma™ Cloud Release Notes 102 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• AI_SERVICE_VISION_PROJECT_REA
D
New Policies
AWS EC2 instance publicly exposed with Identifies AWS EC2 instances which are
critical/high exploitable vulnerabilities and publicly exposed, have critical or high
unusual high volume data transfer activity vulnerabilities and high volume data transfer
activity. The high volume data transfer could
be a data exfiltration attempt. Exfiltration
Prisma™ Cloud Release Notes 103 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
AWS EC2 instance publicly exposed with Identifies AWS EC2 instances which are
critical/high exploitable vulnerabilities and publicly exposed and have exploitable
cryptomining domain request activity vulnerabilities that are connected with remote
systems known for cryptomining domain
request activities. Cryptomining domain
request initiates suspicious DNS queries
to domain names that are associated with
known crypto-mining pools to generate new
coins in cryptocurrencies such as Bitcoin
and Monero. The network connectivity with
remote systems known for cryptomining
domain request on a publicly exposed and
exploitable instance indicates that the
instance could be under attack or already
have been compromised.
Policy Severity— Critical.
AWS EC2 instance publicly exposed with Identifies AWS EC2 instances which are
critical/high exploitable vulnerabilities and publicly exposed and have exploitable
DGA domain request activity vulnerabilities that are connected with remote
systems known for DGA domain request
activities. Domain generation algorithms
(DGAs) are used to generate pseudo-random
domain names, typically in large numbers
within the context of establishing a malicious
command-and-control (C2) communications
Prisma™ Cloud Release Notes 104 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Policy Updates
No Policy Updates for 23.4.2.
FEATURE DESCRIPTION
Rate Limit Exception for GCP APIs The API calls from Prisma Cloud now use
quota from the onboarded GCP Projects
instead of the GCP Project where the service
account is created. This change enables
Prisma Cloud to ingest resource metadata
across multiple projects without exceeding
the GCP API rate limits.
To ensure continuous insights into all of
your GCP resources and to prevent rate limit
exception errors, follow the steps listed in
prerequisites to onboard GCP and make sure
to complete them.
Update for Google Compute APIs Prisma Cloud now provides global region
support, as well as a backend update to the
resource ID for gcloud-compute-internal-lb-
backend-service API. As a result, all resources
for these APIs will be deleted and then
regenerated on the management console.
Existing alerts corresponding to
these resources will be resolved as
Prisma™ Cloud Release Notes 105 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CHANGE DESCRIPTION
Cloud Accounts Endpoints The following new endpoints are now available for the
Cloud Accounts API:
• Save Account Config With Given Attributes - POST /
config/v3/account
• Fetch Aws Org Master Account Details - GET /config/
v3/account/awsorg/:id
• Performs a Permissions Check for the Given PCDS
Account (AWS Org) - GET /config/v3/account/
awsorg/:id/status
Data Security Settings Endpoints The following new endpoints are now available for the
Data Security Settings API:
• Clone Data Pattern - POST /config/v3/dss-api/data-
pattern/clone/dssTenantId/:dssTenantId
• List Data Patterns - GET /config/v3/dss-api/data-
pattern/dssTenantId/:dssTenantId
• Add Data Pattern - POST /config/v3/dss-api/data-
pattern/dssTenantId/:dssTenantId
• Update Data Pattern - PUT /config/v3/dss-api/
data-pattern/dssTenantId/:dssTenantId/pattern-
id/:patternId
• Delete Data Pattern - DELETE /config/v3/dss-api/
data-pattern/dssTenantId/:dssTenantId/pattern-
id/:patternId
• Get Data Pattern by Name - GET /config/v3/dss-api/
data-pattern/name/dssTenantId/:dssTenantId
• List Data Profiles - GET /config/v3/dss-api/data-
profile/dssTenantId/:dssTenantId
• Update Data Profile Status - PUT /config/v3/dss-api/
data-profile/dssTenantId/:dssTenantId
Prisma™ Cloud Release Notes 106 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New APIs for Onboarding GCP The following new endpoints are now available for the
Cloud Accounts Cloud Accounts API.
• Add GCP Cloud Account- POST /cas/v1/gcp_account
• Update GCP Cloud Account - PUT /cas/v1/
gcp_account/:id
• Get GCP Cloud Account Status- POST /cas/v1/
cloud_account/status/gcp
• Generate and Download the GCP Terraform Template-
POST /cas/v1/gcp_template
New API to Get Cloud Account The following new endpoint is added to get the
Deployment Types deployment types of a cloud account. This endpoint is
supported only for Alibaba account.
• Get Cloud Account Deployment Type - GET /cas/v1/
cloud/:cloudType/deployment-type
Prisma™ Cloud Release Notes 107 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Parameter Added for A new parameter deployment type is added to the
Alibaba Account request or response body of the following endpoints. This
parameter is supported only for Alibaba accounts.
• Add Cloud Account - POST /cloud/:cloud_type
• Update Cloud Account - PUT /cloud/:cloud_type/:id
• List Cloud Accounts - GET /cloud
• List Cloud Org Accounts - GET /cloud/:cloud_type/:id/
project
Deprecation Notice
FEATURE DESCRIPTION
Prisma Cloud Data Security v1, The following Prisma Cloud Data Security APIs (v1, v2)
v2 APIs for AWS cloud account onboarding, data settings, data
profiles, snippets, and data patterns are deprecated:
Cloud Accounts Endpoints
• Add Data Security Config (AWS Org) - POST /dlp/
api/config/v2
• Update Data Security Config (AWS Org) - PUT /dlp/
api/config/v2
• Check Data Security Preconditions (AWS Org) -
POST /dlp/api/v1/config/awsorg/status
• Get Data Security Config (AWS Org) - GET /dlp/api/
config/v2/:accountId
Data Security Settings Endpoints
• List Data Resources - GET /dlp/api/v1/resource-
inventory/resources
• Update Data Scan Config - PUT /dlp/api/config/
v2/resource
• List Data Patterns - PUT /dlp/api/v1/dss-api/
data-pattern
• Add Data Pattern - POST /dlp/api/v1/dss-api/
data-pattern
Prisma™ Cloud Release Notes 108 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 109 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
Support for New Region on AWS Prisma Cloud now ingests data for resources
deployed in the Hyderabad cloud region on
AWS.
To review a list of supported regions, select
Inventory > Assets, and choose Cloud Region
from the filter drop-down.
Enhancement OCI Terraform File Update Prisma Cloud now supports over 100 IAM
policy statements without requiring a service
limit increase from OCI. With this change, you
must update your existing Terraform file to
enable read permissions for all the supported
services necessary for an OCI tenant on
Prisma Cloud.
API Ingestions
Prisma™ Cloud Release Notes 110 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• privateca.locations.list
• privateca.certificateTemplate
s.list
• privateca.certificateTemplate
s.getIamPolicy
• networkservices.gateways.list
• networkservices.meshes.list
• networkservices.meshes.getIam
Policy
New Policies
AWS EC2 instance publicly exposed with Identifies AWS EC2 instances which are
critical/high exploitable vulnerabilities and publicly exposed and have exploitable
malware activity vulnerabilities that are connected with
remote systems known for malware activities.
Malware includes viruses, trojans, worms and
other types of malware that affect the popular
open-source operating system. The network
connectivity with remote systems known
for malware activity on a publicly exposed
Prisma™ Cloud Release Notes 111 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
AWS EC2 instance publicly exposed with Identifies AWS EC2 instances which are
critical/high exploitable vulnerabilities and publicly exposed and have exploitable
botnet activity vulnerabilities that are connected with
remote systems known for botnet activities.
A Botnets can be used to perform distributed
denial-of-service (DDoS) attacks, steal data,
send spam, and allows the attacker to access
the device and its connection. The network
connectivity with remote systems known
for botnet activity on a publicly exposed
and exploitable instance indicates that the
instance could be under attack or already
have been compromised.
Policy Severity— Critical.
AWS EC2 instance publicly exposed with Identifies AWS EC2 instances which are
critical/high exploitable vulnerabilities and publicly exposed and have exploitable
cryptominer activity vulnerabilities that are connected with remote
systems known for cryptominer activities.
Cryptominer hides on computers or mobile
devices to surreptitiously use the machine’s
resources to mine cryptocurrencies. The
network connectivity with remote systems
known for cryptominer activity on a publicly
exposed and exploitable instance indicates
that the instance could be under attack or
already have been compromised.
Policy Severity— Critical.
AWS EC2 instance publicly exposed with Identifies AWS EC2 instances which are
critical/high exploitable vulnerabilities and publicly exposed and have exploitable
backdoor activity vulnerabilities that are connected with
remote systems known for backdoor
activities. A backdoor allows unauthorized
remote access to the instances where the
malware is installed while bypassing the
authentication mechanisms in place. The
network connectivity with remote systems
known for backdoor activity on a publicly
exposed and exploitable instance indicates
that the instance could be under attack or
already have been compromised.
Prisma™ Cloud Release Notes 112 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Policy Updates
No Policy Updates for 23.4.1.
Support for ISO/IEC 27001:2022 Prisma Cloud now supports the ISO/IEC
27001:2022 compliance standard.
ISO/IEC 27001:2022 provides guidelines
for organizational information security
standards and information security
management practices, including the
selection, implementation, and management
of controls while taking the organization’s
information security risk environment into
account.
With this support, you can now view this
built-in standard and the related policies on
Prisma Cloud’s Compliance > Standard page.
Additionally, you can generate reports for
immediate viewing or download, or you can
schedule recurring reports to keep track of
this compliance standard over time.
FEATURE DESCRIPTION
Changes to Policy Severity Level First Prisma Cloud updated the system default
announced in 23.2.1 policies to help you identify critical alerts and
address them effectively. The policy severity
levels for some system default policies are
re-aligned to use the newly introduced
Critical and Informational severities. Due to
this change, the policies have five levels of
severity; Critical, High, Medium, Low, and
Informational. You can prioritize critical alerts
first and then move on to the other levels.
For more information, see the updated list of
policies.
Impact—
Prisma™ Cloud Release Notes 113 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Update for Google Compute APIs Prisma Cloud now provides global region
support, as well as a backend update to the
resource ID for gcloud-compute-url-maps,
gcloud-compute-target-http-proxies, and
gcloud-compute-target-https-proxies APIs.
As a result, all resources for these APIs will
be deleted and then regenerated on the
management console.
Existing alerts corresponding to
these resources will be resolved as
Resource_Updated, and new alerts will be
generated against policy violations if any.
Prisma™ Cloud Release Notes 114 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CHANGE DESCRIPTION
New APIs for Onboarding Azure The following new endpoints are now available for the
Cloud Accounts Cloud Accounts API.
• Add Azure Cloud Account- POST /cas/v1/
azure_account
• Update Azure Cloud Account- PUT /cas/v1/
azure_account/:account_id
• Generate and Download the Azure Terraform
Template- POST /cas/v1/azure_template
New APIs for Data Security The following new endpoints are now available for the
Onboarding Data Security Onboarding API.
• Fetch Account Config By Storage UUID- GET /config/
v3/account/storageUUID/:id
• Fetch Account Config By PCDS Account ID- GET /
config/v3/account/:id
• Update the account config for the specified PCDS
Account ID- PUT /config/v3/account/:id
• Performs a Permissions Check for the Given PCDS
Account- GET /config/v3/account/:id/status
• Generate an Azure Terraform Script- GET /config/v3/
account/:subscriptionId/acl-script
• Generate an Azure Terraform Script- GET /config/v3/
tenant/:tenantId/:subscriptionId/terraform-script
Prisma™ Cloud Release Notes 115 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
Support for New Regions on GCP Prisma Cloud now ingests data for resources
deployed in the Madrid, Milan, Paris, Tel Aviv,
Toronto, Santiago, Columbus, and Dallas
cloud regions on GCP.
To review a list of supported regions, select
Inventory > Assets, and choose Cloud Region
from the filter drop-down.
API Ingestions
Prisma™ Cloud Release Notes 116 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• network-firewall:DescribeFire
wallPolicy
• network-firewall:DescribeReso
urcePolicy
• network-firewall:DescribeFire
wall
network-firewall:ListFirewalls
network-firewall:DescribeFirewa
ll
Prisma™ Cloud Release Notes 117 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• datastore.databases.list
• gkehub.memberships.list
• gkehub.memberships.getIamPoli
cy
• gkehub.features.list
• gkehub.features.getIamPolicy
privateca.locations.list
Prisma™ Cloud Release Notes 118 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Policies
No New Policies for 23.3.2.
Policy Updates
Policy Updates-RQL
AWS Cloudfront Distribution with S3 have Changes— The policy RQL is updated to
Origin Access set to disabled include the new feature of AWS origin access
control.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 119 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
AWS access keys not used for more than 90 Changes— The policy name, description, and
days RQL are updated to meet the compliance
standard of 45 days.
Updated Policy name— AWS Access key not
used for more than 45 days
Updated Description— This policy identifies
IAM users for which access keys are not used
for more than 45 days. Access keys allow
users programmatic access to resources.
However, if any access key has not been
used in the past 45 days, then that access key
needs to be deleted (even though the access
key is inactive).
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 120 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
= N/A and
_DateTime.ageInDays(access_key_1_last_used
> 45) or
(access_key_1_last_used_date
== N/A and
access_key_1_last_rotated !
= N/A and
_DateTime.ageInDays(access_key_1_last_rota
> 45))) or (access_key_2_active
is true and
((access_key_2_last_used_date !
= N/A and
_DateTime.ageInDays(access_key_2_last_used
> 45) or
(access_key_2_last_used_date
== N/A and
access_key_2_last_rotated !
= N/A and
_DateTime.ageInDays(access_key_2_last_rota
> 45)))'
GCP VM disks not encrypted with Customer- Changes— The policy RQL is updated to check
Supplied Encryption Keys (CSEK) the GCP compute disks that are not encrypted
with CSEK.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 121 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for ISO/IEC 27002:2022 Prisma Cloud now supports the ISO/IEC
27002:2022 compliance standard.
ISO/IEC 27002:2022 provides guidelines
for organizational information security
standards and information security
management practices, including the
selection, implementation, and management
of controls while taking the organization’s
information security risk environment into
account.
With this support, you can now view this
built-in standard and the related policies on
Prisma Cloud’s Compliance > Standard page.
Additionally, you can generate reports for
immediate viewing or download, or you can
schedule recurring reports to keep track of
this compliance standard over time.
FEATURE DESCRIPTION
Global Region Support for Target ssl proxy Prisma Cloud now provides global region
support for gcloud-compute-target-ssl-
proxy API. Due to this, all the resources will
be deleted and then regenerated on the
management console.
Existing alerts corresponding to these
resources are resolved as Resource_Updated,
and new alerts will be generated against the
policy violations.
Impact— You may notice a reduced count
for the number of alerts. However, the alert
count will return to the original numbers once
the resources for gcloud-compute-target-ssl-
proxy start ingesting data again.
Update Prisma Cloud Data Security IP The list of source IP addresses for data
Addresses security in US and EU regions are updated.
Make sure you review the list, add the new IP
Prisma™ Cloud Release Notes 122 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 123 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• 138.91.228.231
• 104.42.8.63
• 104.42.4.238
• 40.118.249.60
• 40.112.243.64
EU New IPs (to add)
• 3.64.66.135
• 18.198.52.216
• 3.127.191.112
• 20.223.237.240
• 20.238.97.44
• 20.26.194.122
• 51.142.252.210
• 51.124.198.75
• 51.124.199.134
EU Old IPs (to remove)
• 20.113.10.157
• 20.113.11.130
• 20.113.12.29
• 20.113.12.30
• 20.79.228.76
• 20.113.9.21
• 20.79.107.0
• 20.223.28.120
• 20.223.28.149
• 20.223.28.176
• 20.223.28.189
• 20.223.28.207
• 20.223.28.226
• 20.107.224.16
• 20.90.227.199
• 20.90.227.255
• 20.90.228.8
• 20.90.228.71
• 20.90.228.129
• 20.90.228.194
Prisma™ Cloud Release Notes 124 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• 20.90.134.24
• 20.103.147.247
• 20.103.148.141
• 20.103.149.167
• 20.103.149.216
• 20.103.149.237
• 20.103.150.28
• 20.105.232.10
New Features
FEATURE DESCRIPTION
GRBAC now available for Data Security Granular Role Based Access Control
(GRBAC) is now available for Data Security
functionality in Prisma Cloud. You can now
create Custom Roles with the option to View,
Create, Update or Delete Data Security
functions. GRBAC allows you to enforce least
privileged access, giving you the option to
create roles with the minimum amount of
access to Data Security required for a users
job function. Custom Role creation is limited
to users with a current System Administrator
role.
Prisma™ Cloud Release Notes 125 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 126 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 127 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 128 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for Finance Regions on Alibaba Prisma Cloud now ingests data for resources
Cloud deployed in Alibaba Finance Cloud for
Hangzhou, Shanghai, and Shenzhen regions.
To review a list of supported regions, select
Inventory > Assets, and choose Cloud Region
from the filter drop-down.
Enhancement Separate Text Boxes for Key If you are using tags, you no longer need
and Value Entries to use a colon (:) to separate key and value
entries in a single text box while assigning
resource tags on Alert Overview and Asset
Inventory. You can now enter Key and Value
in separate text boxes.
Prisma™ Cloud Release Notes 129 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 130 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
API Ingestions
• Microsoft.Batch/batchAccounts
/pools/read
Prisma™ Cloud Release Notes 131 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• clouddeploy.locations.list
• clouddeploy.deliveryPipelines
.list
• clouddeploy.deliveryPipelines
.getIamPolicy
• clouddeploy.targets.list
• clouddeploy.targets.getIamPol
icy
New Policies
Prisma™ Cloud Release Notes 132 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 133 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 134 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Policy Updates
Changes to Network Anomaly Policies The names of the network anomaly policies
are modified to be self explanatory and also
make it easier to identify cloud resources
involved in the alerts reported by these
Prisma™ Cloud Release Notes 135 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Policy Updates-RQL
GCP HTTPS Load balancer is configured with Changes— The policy RQL is updated to
SSL policy having TLS version 1.1 or lower match changes introduced in the gcloud-
compute-ssl-policies API.
Current RQL—
Prisma™ Cloud Release Notes 136 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
GCP Load Balancer SSL proxy permits SSL Changes— The policy RQL is updated to
policies with weak cipher suites match changes introduced in the gcloud-
compute-ssl-policies API.
Current RQL—
Prisma™ Cloud Release Notes 137 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy
or $.Y.sslPolicies[?
(@.profile=='CUSTOM' &&
'TLS_RSA_WITH_AES_256_CBC_SHA'
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy
or $.Y.sslPolicies[?
(@.profile=='CUSTOM' &&
'TLS_RSA_WITH_3DES_EDE_CBC_SHA'
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy))"; show
X;
Updated RQL—
GCP Load Balancer HTTPS proxy permits SSL Changes— The policy RQL is updated to
policies with weak cipher suites match changes introduced in the gcloud-
compute-ssl-policies API.
Prisma™ Cloud Release Notes 138 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 139 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP HTTPS Load balancer SSL Policy not Changes— The policy RQL is updated to
using restrictive profile match changes introduced in the gcloud-
compute-ssl-policies API.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 140 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
= 'gcloud-compute-target-
https-proxies' AND json.rule
= sslPolicy exists as Y;
filter " $.X.selfLink contains
$.Y.sslPolicy "; show Y;
CSA Cloud Controls Matrix (CCM) v4.0.6 Prisma Cloud now supports the CSA Cloud
Controls Matrix (CCM) v4.0.6 compliance
standard.
The CSA Cloud Controls Matrix (CCM) is a
cybersecurity control framework for cloud
computing. It is a spreadsheet that contains
a list of common frameworks and regulations
that your organization must follow. Each
control maps to a number of industry-
accepted security standards, regulations, and
frameworks, which means that completing
the CCM controls also completes the
accompanying standards and regulations. It
reduces the need to use multiple frameworks
and simplifies cloud security by displaying all
common cloud standards in one place.
With this support, you can now view this
built-in standard and the related policies on
Prisma Cloud’s Compliance > Standard page.
Additionally, you can generate reports for
immediate viewing or download, or you can
schedule recurring reports to keep track of
this compliance standard over time.
FEATURE DESCRIPTION
Google Compute SSL Policies Update Prisma Cloud now includes a JSON update
to increase the visibility and monitoring of
gcloud-compute-ssl-policies API resources.
Due to this, all the resources will be deleted
Prisma™ Cloud Release Notes 141 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CHANGE DESCRIPTION
Command Center APIs The following new endpoints are available for the
Command Center API:
• List Top Vulnerabilities - POST /
commandcenter/v1/top-vulnerabilities
• List Total Vulnerable Images and Hosts -
POST /commandcenter/v1/vulnerabilities/summary
New APIs for Onboarding AWS The following new endpoints are now available for the
Cloud ccounts Cloud Accounts API. These endpoints include the updates
to generate External ID in the IAM Role and to enable
This change was first announced
selection of Security Capabilities and Permissions.
in the Look Ahead that was
published with the 22.4.1 release • Add AWS Cloud Account - POST /cas/v1/
aws_account
• Update AWS Cloud Account - PUT /cas/v1/
aws_account/:id
Prisma™ Cloud Release Notes 142 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Cloud Ingested Logs API The following new endpoints are available for the Cloud
Ingested Logs API:
• Get Eventbridge configuration
details - GET /audit_logs/v2/tenant/:tenantId/
aws_accounts/:accountId/eventbridge_config
• Update Eventbridge configuration
- PUT /audit_logs/v2/tenant/:tenantId/
aws_accounts/:accountId/eventbridge_config
• Get AWS eventbridge config status
- GET /audit_logs/v2/tenant/:tenantId/
aws_accounts/:accountId/eventbridge_config/status
• Generate Eventbridge CFT - GET /audit_logs/
v2/tenant/:tenantId/aws_accounts/:accountId/
eventbridge_config/cft_download
Prisma™ Cloud Release Notes 143 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
Enhancement Role Assignment Modification If you have enabled access to users on Prisma
for SSO Sign-In Cloud using SSO with JIT provisioning, you
can no longer modify their roles in the Prisma
Cloud administrative console, unless they
have previously been added to an SSO bypass
list. The role management for these users
needs to be completed from the Identity
Provider (IdP) for the change to take effect.
API Ingestions
• ecr:DescribeRegistry
• ecr:DescribePullThroughCacheR
ules
Prisma™ Cloud Release Notes 144 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• chime:GetVoiceConnectorLoggin
gConfiguration
chime:ListVoiceConnectors
permission.
chime:GetVoiceConnect
orLoggingConfiguratio
n
• analyticshub.listings.list
• analyticshub.dataExchanges.ge
tIamPolicy
Prisma™ Cloud Release Notes 145 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• metastore.federations.list
• metastore.federations.getIamP
olicy
New Policies
DNS Rebinding Activity Anomaly Policy A new DNS rebinding activity anomaly
policy is now available on the Policies page
in Prisma Cloud. It detects when computing
resources perform domain requests for
rebinding domains by inspecting every DNS
request performed by all monitored compute
resources and looking for consecutive
anomalous requests.
By default, the alert disposition of the policy is
set to conservative.
Azure AKS cluster is not configured with disk Identifies AKS clusters that are not configured
encryption set with disk encryption set. Azure Key Vault
Provider for Secrets Store CSI Driver allows
for the integration of an Azure key vault as
a secrets store with an Azure Kubernetes
Service (AKS) cluster via a CSI volume. It is
recommended to enable secret store CSI
driver for your Kubernetes clusters.
Prisma™ Cloud Release Notes 146 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure Service Fabric cluster not configured Identifies Service Fabric clusters that are
with cluster protection level security not configured with cluster protection level
security. Service Fabric provides levels of
protection for node-to-node communication
using a primary cluster certificate. It is
recommended to set the protection level to
ensure that all node-to-node messages are
encrypted and digitally signed.
Policy Updates
Policy Updates-RQL
AWS EC2 instance that is internet reachable Changes— The policy name and description
with unrestricted access (0.0.0.0/0) other are updated.The policy RQL is updated to
than HTTP/HTTPS port report instances configured with HTTP (80)
and HTTP (443) ports, which are in active
state only.
Current Name— AWS EC2 instance that is
internet reachable with unrestricted access
(0.0.0.0/0) other than HTTP/HTTPS port
Updated Name— AWS EC2 instance that is
internet reachable with unrestricted access
(0.0.0.0/0)
Updated Description— Identifies AWS EC2
instances that are internet reachable with
unrestricted access (0.0.0.0/0). EC2 instances
Prisma™ Cloud Release Notes 147 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
AWS Glue connection do not have SSL Changes— The policy RQL has been updated
configured to exclude AWS Glue with connection type as
Network from reporting because they cannot
be configured for SSL.
Current RQL—
Prisma™ Cloud Release Notes 148 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Azure Virtual Network subnet is not Changes— The policy RQL is updated to
configured with a Network Security Group exclude the private endpoint and private link
associated subnets.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 149 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
['properties.serviceName'] does
not equal "Microsoft.Netapp/
volumes"
Policy Updates-Metadata
GCP VPC Network subnets have Private Changes— The policy remediation CLI
Google access disabled command description to define granular
permissions required for running the
remediation CLI command is updated.
Updated Remediation CLI Description
— This CLI command requires
'compute.subnetworks.setPrivateIpGoogleAccess',
'compute.subnetworks.setPrivateIpGoogleAccess'
and 'compute.subnetworks.update'
permissions. Successful execution will enable
GCP VPC Network subnets 'Private Google
access'.
Impact— No impact on alerts.
GCP Storage buckets are publicly accessible Changes— The policy remediation CLI
to all authenticated users command description to define granular
permissions required for running the
remediation CLI command is updated.
Updated Remediation CLI Description
— This CLI command requires
'storage.buckets.getIamPolicy’ and
'storage.buckets.setIamPolicy' permissions.
Successful execution will revoke
'allAuthenticatedUsers' permission access in
GCP Storage buckets.
Impact— No impact on alerts.
GCP Storage log buckets have object Changes— The policy remediation CLI
versioning disabled command description to define granular
permissions required for running the
remediation CLI command is updated.
Updated Remediation CLI Description
— This CLI command requires
'storage.buckets.update' permission.
Successful execution will enable GCP Storage
log buckets 'versioning'.
Prisma™ Cloud Release Notes 150 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP Storage buckets are publicly accessible Changes— The policy remediation CLI
to all users command description to define granular
permissions required for running the
remediation CLI command is updated.
Updated Remediation CLI Description
— This CLI command requires
'storage.buckets.getIamPolicy' and
'storage.buckets.setIamPolicy' permissions.
Successful execution will revoke 'allUsers'
permission access in GCP Storage buckets.
Impact— No impact on alerts.
Update AWS Foundational The AWS Foundational Security Best Practices standard
Security Best Practices Standard has been updated to map default policies to the relevant
sections.
Impact— No impact on alerts. The compliance report score
will be impacted because of the new mapping.
FEATURE DESCRIPTION
Google Cloud Task Update Prisma Cloud will no longer ingest gcloud-
cloud-task API related resources because
these are ephemeral. As a result, all gcloud-
cloud-task resources will be deleted from
your tenant.
Impact— No impact on alerts.
Deprecation Notices
FEATURE DESCRIPTION
Legacy IaC Scan on Prisma Cloud no longer supports legacy IaC scanning
app.govcloud.io is End of on GovCloud. The IaC Scan plugins and the DevOps
Support dashboard have been removed from the platform.
Prisma™ Cloud Release Notes 151 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 152 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Performance Improvements for Investigate The config and event query results on
RQL Queries the Investigate page are optimized to load
the initial set of results significantly faster.
To enable faster load times, the backend
automatically uses a heuristic search to
retrieve search results for your query. When
you enter the query and click Search, the
interface loads the first 100 search results,
and you can use the Load More button to
fetch more results. The Get Total Count
button enables you to get a full count of all
pertinent results, and is available for eligible
queries that include attributes that support
the heuristic search only.
All config attributes except
cloud.accountgroup, azure.resource.group,
limit search records, aggregate functions
(count and group by), and all finding
type attributes such as finding.type,
finding.severity, are currently optimized for
faster search results. For event queries, the
attribute cloud type supports heuristic search.
API Access Key Expiration Notifications Prisma Cloud allows you to create and
manage API keys to facilitate programmatic
access to our features and functionality. To
ensure uninterrupted access to Prisma Cloud
APIs, you can now set up the following Access
Key Expiration Notifications:
• Email notifications for named user Access
Keys
• Alarm Center notifications for Service
Account Access Keys
Prisma™ Cloud Release Notes 153 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for AWS Tags on Prisma Cloud IAM Prisma Cloud IAM now supports AWS tags.
Leverage tags to create RQL queries and
dynamic custom policies, by using specific
tags to group your cloud resources, roles,
groups, policies, etc. when defining your alert
rules.
Send Audit Logs to External Integrations Forward audit logs from Prisma Cloud to an
external integration that you have configured
to integrate with your existing security
workflows.
• Select Settings > Enterprise Settings.
• Enable, Send Audit Logs to integration.
• Select the AWS SQS or Webhooks
notification channel to send the audit logs.
All new audit logs that are generated after
you enable the integration will be sent to
this channel. You can view the audit logs
on Settings > Audit Logs on Prisma Cloud.
Prisma™ Cloud Release Notes 154 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 155 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
'xxx@paloaltonetworks.com'(with
role 'System
Admin':'System
Admin') logged in
via password
Support for Azure Permission Levels on Prisma Cloud IAM now leverages Azure
Prisma Cloud IAM Permission levels for better visibility into your
Azure identity permissions, providing you with
a more granular view of granted permissions.
In addition, you can use these new attributes
to create custom policies to more closely
monitor your cloud resources.
CONTAINS ALL
Prisma™ Cloud Release Notes 156 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
API Ingestions
• cloudwatch:ListTagsForResourc
e
• kinesisvideo:ListStreams
• kinesisvideo:DescribeNotifica
tionConfiguration
Prisma™ Cloud Release Notes 157 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• compute.targetVpnGateways.lis
t
• read leaf-certificates
• read security-zone
• read security-recipe
• read data-safe-private-endpoi
nts
Prisma™ Cloud Release Notes 158 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• read target-databases
• read nosql-tables
• read host-scan-targets
• read host-scan-recipes
• read vaults
Prisma™ Cloud Release Notes 159 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Policies
AWS SSM documents are public Identifies list of SSM documents that are
public and might allow unintended access. A
public SSM document can expose valuable
information about your account, resources,
and internal processes. It is recommended
to only share SSM documents to only
few private AWS accounts based on the
requirement.
AWS CloudFront distributions does not have Identifies list of CloudFront distributions
a default root object configured which does not have default root object
configured. If a CloudFront distribution does
not have a default root object configured,
requests for the root of your distribution
pass to your origin server which might
return a list of the private contents of your
origin. To avoid exposing the contents of
your distribution or returning an error it is
recommended to specify a default root object.
Azure Storage account is not configured with Identifies Storage accounts that are
private endpoint connection not configured with a private endpoint
connection. Azure Storage account private
endpoints can be configured using Azure
Private Link. Private Link allows users to
access an Azure Storage account from within
the virtual network or from any peered virtual
network. When Private Link is combined with
restricted NSG policies, it helps reduce the
risk of data exfiltration. It is recommended
Prisma™ Cloud Release Notes 160 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure Microsoft Defender for Cloud set to Identifies Azure Microsoft Defender for Cloud
Off for Resource Manager which has defender setting for Resource
Manager (ARM) set to Off. Enabling Azure
Defender for ARM provides protection
against issues like Suspicious resource
management operations, Use of exploitation
toolkits, Lateral movement from the Azure
management layer to the Azure resources
data plane. It is highly recommended to
enable Azure Defender for ARM.
GCP SQL server instance database flag 3625 Identifies GCP SQL server instance for which
(trace flag) is not set to on database flag 3625 (trace flag) is not set to
on. Trace flag can help prevent the disclosure
of sensitive information by masking the
parameters of some error messages using
'*', for users who are not members of the
sysadmin fixed server role. It is recommended
to set 3625 (trace flag) database flag for SQL
Server instance to on.
Prisma™ Cloud Release Notes 161 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
sql-instances-list' AND
json.rule = "databaseVersion
contains SQLSERVER and
state equals RUNNABLE and
(settings.databaseFlags[*].name
does not contain 3625 or
settings.databaseFlags[?
any(name contains 3625 and value
contains off)] exists)"
Policy Updates
Policy Updates-RQL
Activity Log Retention should not be set to Changes— The policy name, description,and
less than 365 days recommendations are updated according to
the latest vendor UI settings.The policy RQL
is updated to check log profile status so that
disabled log profiles will be reported.
Current Name— Activity Log Retention should
not be set to less than 365 days Updated
Name— Azure Activity Log retention should
not be set to less than 365 days
Updated Description— Identifies Log profiles
which have log retention set to less than
365 days. Log profile controls how your
Activity Log is exported and retained. Since
the average time to detect a breach is over
200 days, it is recommended to retain your
activity log for 365 days or more in order to
have time to respond to any incidents.
Current RQL—
Prisma™ Cloud Release Notes 162 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Policy Updates-Metadata
AWS Certificate Manager (ACM) has invalid Changes— The policy description is updated.
or failed certificate
Updated Description— Identifies certificates
in ACM which are either in Invalid or Failed
state. If the ACM certificate is not validated
within 72 hours, it becomes Invalid. An ACM
certificate fails when,
• the certificate is requested for invalid
public domains
• the certificate is requested for domains
which are not allowed
• missing contact information
• typographical errors
In such cases (Invalid or Failed certificate),
you will have to request for a new certificate.
It is strongly recommended to delete the
certificates which are in failed or invalid state.
Impact— No impact on alerts.
AWS ECS/ Fargate task definition root user Changes— The policy name and description
found are updated.
Current Name— AWS ECS/ Fargate task
definition root user found Updated Name—
AWS ECS Fargate task definition root user
found
Prisma™ Cloud Release Notes 163 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CloudTrail trail is not integrated with Changes— The policy name and description
CloudWatch Log are updated.
Current Name— CloudTrail trail is not
integrated with CloudWatch Log Updated
Name— AWS CloudTrail trail logs is not
integrated with CloudWatch Log
Updated Description— Identifies AWS
CloudTrail which has trail logs that are not
integrated with CloudWatch Log. Enabling
the CloudTrail trail logs integrated with
CloudWatch Logs will enable the real-time
as well as historic activity logging. This
will further improve monitoring and alarm
capability.
Impact— No impact on alerts.
S3 buckets with configurations set to host Changes— The policy name and description
websites are updated.
Current Name— S3 buckets with
configurations set to host websites Updated
Name— AWS S3 buckets with configurations
set to host websites
Updated Description— Identifies AWS S3
buckets that are configured to host websites.
To host a website on AWS S3 you should
configure a bucket as a website. By frequently
surveying these S3 buckets, you can ensure
that only authorized buckets are enabled to
host websites. Make sure to disable static
website hosting for unauthorized S3 buckets.
Impact— No impact on alerts.
Azure Storage account container storing Changes— The policy recommendation steps
activity logs is publicly accessible are updated to reflect CSP UI changes.
Impact— No impact on alerts.
Prisma™ Cloud Release Notes 164 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure Container Registry does not use a Changes— The policy description and
dedicated resource group recommendation steps are updated to
according to the new URL linked provided by
CSP.
Impact— No impact on alerts.
SQL Instances do not have SSL configured Changes— The policy name, description, and
recommendation steps are updated.
Current Name— SQL Instances do not have
SSL configured Updated Name— GCP SQL
Instances do not have valid SSL configuration
Updated Description— Identifies GCP
SQL instances that do not have valid
SSL configuration with an unexpired SSL
certificate. Cloud SQL supports connecting
to an instance using the Secure Socket Layer
(SSL) protocol. If Cloud SQL Auth proxy is not
used for authentication, it is recommended
to utilize SSL for connection to SQL Instance,
ensuring the security for data in transit.
Impact— No impact on alerts.
SQL DB Instance backup Binary logs Changes— The policy name, description, and
configuration is not enabled recommendation steps are updated.
Current Name— SQL DB Instance backup
Binary logs configuration is not enabled
Updated Name— GCP SQL MySQL DB
instance point-in-time recovery backup
(Binary logs) is not enabled
Updated Description— identifies Cloud SQL
MySQL DB instances whose point-in-time
recovery backup is not enabled. In case of
an error, point-in-time recovery helps you
recover an instance to a specific point in
time. It is recommended to enable automated
backups with point-in-time recovery to
prevent any data loss in case of an unwanted
scenario.
Impact— No impact on alerts.
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 165 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Global Region Support for Google VPC Prisma Cloud now provides global region
Firewall Rule support for gcloud-compute-firewall-
rules-list. Due to this, all the resources will
be deleted, and then regenerated on the
management console.
Existing alerts corresponding to this resource
are resolved as Resource_Deleted, and
new alerts will be generated against policy
violations.
Impact—You may notice a reduced count
for the number of alerts. However, the alert
count will return to the original numbers once
the resources for gcloud-compute-firewall-
rules-list start ingesting data again.
Google VPC Network API Update Prisma Cloud now provides global region
support, as well as a backend update to
the resource ID for the gcloud-compute-
networks-list API. As a result, all resources for
this API will be deleted and then regenerated
on the management console.
Existing alerts corresponding to
these resources will be resolved as
Resource_Updated, and new alerts will be
generated against policy violations if any.
Impact—You may notice a reduced alert
count. However, once the resources for
gcloud-compute-networks-list resume
ingesting data, the alert count will return to
the original numbers.
CHANGE DESCRIPTION
Update Enterprise Settings API The response object for the GET /settings/enterprise
endpoint now include the following additional properties:
• auditLogSiemIntgrIds
• auditLogsEnabled
Prisma™ Cloud Release Notes 166 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• auditLogSiemIntgrIds
• auditLogsEnabled
New Features
FEATURE DESCRIPTION
Cloud Account Onboarding for more Security Prisma Cloud provides an improved and
Coverage simplified onboarding experience, by
providing you with the option to select which
security capabilities you want and by creating
the role with the permissions required for
those capabilities.
You can now enable Agentless Workload
Scanning, Serverless Function Scanning,
Agent Based Workload Protection, Data
Security, and Remediation capabilities as part
of the new onboarding workflow for your
AWS, Azure, and GCP cloud accounts using
minimal steps.
• After you successfully onboard your cloud
account on Prisma Cloud, by default,
the account is automatically available
in Compute and enabled for Workload
Discovery and Serverless function scans.
Prisma™ Cloud Release Notes 167 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Ingest Audit Logs using Amazon EventBridge By default, Prisma Cloud uses the Amazon
CloudTrail service to ingest audit logs. Event
assisted ingestion is an enhancement that
makes the API call only if the resource
configuration is changed. After onboarding
your AWS account, you can now configure
Amazon EventBridge on Prisma Cloud to
support event assisted ingestion in near real
time, which allows Prisma Cloud to reduce
the total number of API calls and total time to
alert.
Prisma™ Cloud Release Notes 168 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for AWS GuardDuty and Inspector After onboarding your AWS account on
Malware Findings Prisma Cloud and configuring EventBridge,
you can now Configure Findings to view
vulnerability and malware findings generated
by AWS GuardDuty or vulnerabilities
generated by AWS Inspector on the Prima
Cloud Resource page. Once enabled, if
GuardDuty detects suspicious activity on
a workload, it initiates a malware scan on
the associated EC2 instance. If malware
is detected during the scan, GuardDuty
generates an additional finding. The findings
provide context and can detect the malicious
software that is the source of the suspicious
behavior, so that you can take appropriate
response actions.
GA Recurring Reports for Adoption Advisor You can now schedule a recurring Adoption
Advisor Report to receive a summary of your
adoption and improvements on our cloud
security posture at regular cadence. You can
schedule the report to run on a daily, weekly,
or monthly intervals, and view a list of all
scheduled reports under Adoption Advisor >
Reports.
Prisma™ Cloud Release Notes 169 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for AWS IAM Identity Center Prisma Cloud now integrates with AWS IAM
Identity Center, providing you complete
visibility into the access privileges of users
currently using AWS IAM Identity Center to
log into AWS, this includes users and groups
created in or imported into Identity Center.
You can also create access policies, user alerts
and remediate risky permissions for AWS
IAM Identity Center users. Prisma Cloud does
require additional permissions to support
AWS IAM Identity Center integration. If you
are using a CloudFormation template for AWS
account onboarding no additional action is
required. The required permissions are part
of the CloudFormation onboarding template.
You can also manually add permissions to take
advantage of AWS IAM Identity Center.
Retrieval of Data Storage Size Estimates for Prisma Cloud now retrieves the approximate
Azure Blob Storage storage size of your Azure blob storage
and storage for sensitive data scanning and
provides an estimate credit consumption
required to scan your Azure blob storage. The
size of scannable data is based on file size and
file type. The estimates in Azure leverages
the Azure Inventory policies and creates files
on a daily or weekly basis. You can choose to
follow a few recommendations to lower your
cost.
API Ingestions
Prisma™ Cloud Release Notes 170 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• aps:ListWorkspaces
• Microsoft.EventGrid/topics/pr
ivateLinkResources/read
• Microsoft.Devices/iotHubs/pri
vateLinkResources/Read
Prisma™ Cloud Release Notes 171 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• Microsoft.EventGrid/domains/r
ead
• Microsoft.EventGrid/domains/p
rivateLinkResources/read
• Microsoft.StorageSync/storage
SyncServices/privateLinkResou
rces/read
• Microsoft.Insights/Diagnostic
Settings/Read
• dataplex.lakes.list
• dataplex.tasks.list
• dataplex.tasks.getIamPolicy
Prisma™ Cloud Release Notes 172 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• dataplex.locations.list
• dataplex.lakes.list
• dataplex.content.list
• dataplex.tasks.getIamPolicy
• dataplex.lakes.list
• dataplex.zones.list
• dataplex.entities.list
New Policies
No new policies for 23.1.2.
Policy Updates
Policy Updates-RQL
AWS ALB attached WAFv2 WebACL is not Changes— The policy RQL is updated to
configured with AMR for Log4j Vulnerability ignore alerting resources when firewall
manager ACL rules are configured with
(AWSManagedRulesKnownBadInputsRuleSet
and AWSManagedRulesAnonymousIpList)
Current RQL—
Prisma™ Cloud Release Notes 173 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
AWS API Gateway Rest API attached WAFv2 Changes— The policy RQL is updated to
WebACL is not configured with AMR for ignore alerting resources when firewall
Log4j Vulnerability manager ACL rules are configured with
(AWSManagedRulesKnownBadInputsRuleSet
and AWSManagedRulesAnonymousIpList)
Prisma™ Cloud Release Notes 174 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
AWS AppSync attached WAFv2 WebACL Changes— The policy RQL is updated to
is not configured with AMR for Log4j ignore alerting resources when firewall
Vulnerability manager ACL rules are configured with
Prisma™ Cloud Release Notes 175 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
(AWSManagedRulesKnownBadInputsRuleSet
and AWSManagedRulesAnonymousIpList)
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 176 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
AWS CloudFront attached WAFv2 WebACL Changes— The policy RQL is updated to
is not configured with AMR for Log4j ignore alerting resources when firewall
Vulnerability manager ACL rules are configured with
(AWSManagedRulesKnownBadInputsRuleSet
and AWSManagedRulesAnonymousIpList)
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 177 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
AWS CloudFront viewer protocol policy is Changes— The policy RQL is updated to check
not configured with HTTPS for cacheBehavior viewer protocol policy
along with defaultCacheBehavior viewer
protocol policy for HTTPS configuration.
Current RQL—
Updated RQL—
Azure Storage accounts soft delete is Changes— The policy RQL has been updated
disabled to exclude FileStorage accounts which do not
support blobs. The recommendation steps
have been updated to reflect the changes in
the CSP.
Prisma™ Cloud Release Notes 178 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
Azure Activity log alert for Delete SQL server Changes— The policy RQL is updated to
firewall rule does not exist exclude resource group to report only
subscriptions. The recommendation steps
have been updated according to the CSP
changes.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 179 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
equals Microsoft.Sql/servers/
firewallRules/delete" as X;
count(X) less than 1
Azure Activity log alert for Create or update Changes— The policy RQL is updated to
SQL server firewall rule does not exist exclude resource group to report only
subscriptions. The recommendation steps
have been updated according to the CSP
changes.
Current RQL—
Updated RQL—
Azure Activity log alert for Delete network Changes— The policy RQL is updated to
security group does not exist exclude resource group to report only
subscriptions. The recommendation steps
have been updated according to the CSP
changes.
Prisma™ Cloud Release Notes 180 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
Azure Activity log alert for Create or update Changes— The policy RQL is updated to
network security group does not exist exclude resource group to report only
subscriptions. The recommendation steps
have been updated according to the CSP
changes.
Current RQL—
Prisma™ Cloud Release Notes 181 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Azure Activity log alert for Delete network Changes— The policy RQL is updated to
security group rule does not exist exclude resource group to report only
subscriptions. The recommendation steps
have been updated according to the CSP
changes.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 182 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
securityRules/delete" as X;
count(X) less than 1
Azure Activity log alert for Create or update Changes— The policy RQL is updated to
network security group rule does not exist exclude resource group to report only
subscriptions. The recommendation steps
have been updated according to the CSP
changes.
Current RQL—
Updated RQL—
Azure Activity log alert for Create policy Changes— The policy RQL is updated to
assignment does not exist exclude resource group to report only
subscriptions. The recommendation steps
have been updated according to the CSP
changes.
Prisma™ Cloud Release Notes 183 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
Azure Activity log alert for Create or update Changes— The policy RQL is updated to
security solution does not exist exclude resource group to report only
subscriptions. The recommendation steps
have been updated according to the CSP
changes.
Current RQL—
Prisma™ Cloud Release Notes 184 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Azure Activity log alert for Update security Changes— The policy RQL is updated to
policy does not exist exclude resource group to report only
subscriptions. The recommendation steps
have been updated according to the CSP
changes.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 185 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure Activity log alert for Delete security Changes— The policy RQL is updated to
policy does not exist exclude resource group to report only
subscriptions. The recommendation steps
have been updated according to the CSP
changes.
Current RQL—
Updated RQL—
OCI MFA is disabled for IAM users Changes— The policy RQL has been
updated to exclude alerting for Inactive and
Programmatic users because programmatic
users will not have MFA.
Current RQL—
Prisma™ Cloud Release Notes 186 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Policy Updates-Metadata
Azure Activity log alert for delete policy Changes— The recommendation steps have
assignment does not exist been updated according to the CSP changes.
Impact— Low. Previously generated alerts will
be resolved as Policy_Updated.
Azure SQL Server allow access to any Azure Changes— The policy recommendation steps
internal resources have been updated to reflect the lastest CSP
changes.
Impact— No impact on alerts.
Azure log profile not capturing activity logs Changes— The policy recommendation steps
for all regions have been updated to reflect the lastest CSP
changes.
Impact— No impact on alerts.
Azure subscriptions with custom roles are Changes— The policy description and
overly permissive recommendation steps have been updated to
reflect the lastest CSP changes.
Updated Policy Description— Identifies azure
subscriptions with custom roles are overly
permissive. Least privilege access rule should
be followed and only necessary privileges
should be assigned instead of allowing full
administrative access.
Impact— No impact on alerts.
Azure storage account has a blob container Changes— The policy recommendation steps
with public access have been updated to reflect the lastest CSP
changes.
Impact— No impact on alerts.
Prisma™ Cloud Release Notes 187 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure Storage Account 'Trusted Microsoft Changes— The policy description and
Services' access not enabled recommendation steps have been updated to
reflect the lastest CSP changes.
Updated Policy Description— Identifies
Storage Accounts which have 'Trusted
Microsoft Services' access not enabled.
Some Microsoft services that interact with
storage accounts operate from networks that
can’t be granted access through network
rules. To help this type of service work as
intended, allow the set of trusted Microsoft
services to bypass the network rules. These
services will then use strong authentication
to access the storage account. If the Allow
trusted Microsoft services exception is
enabled, the following services: Azure Backup,
Azure Site Recovery, Azure DevTest Labs,
Azure Event Grid, Azure Event Hubs, Azure
Networking, Azure Monitor and Azure
SQL Data Warehouse (when registered
in the subscription), are granted access to
the storage account. It is recommended to
enable Trusted Microsoft Services on storage
account instead of leveraging network rules.
Impact— No impact on alerts.
Azure storage account logging for queues is Changes— The policy recommendation steps
disabled have been updated to reflect the lastest CSP
changes.
Impact— No impact on alerts.
Storage Accounts without Secure transfer Changes— The policy name, description, and
enabled recommendation steps have been updated to
reflect the lastest CSP changes.
Current Policy Name— Storage Accounts
without Secure transfer enabled Updated
Policy Name— Azure Storage Account
without Secure transfer enabled
Updated Policy Description— identifies
Storage accounts which have Secure transfer
feature disabled. The secure transfer option
enhances the security of your storage account
by only allowing requests to the storage
account by a secure connection. When
'secure transfer required' is enabled, REST
APIs to access your storage accounts connect
using HTTPs any requests using HTTP will be
Prisma™ Cloud Release Notes 188 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure Storage accounts soft delete is Changes— The policy name, description,
disabled and remediation CLI descriptions have been
updated.
Current Policy Name— Azure Storage
accounts soft delete is disabled
Updated Policy Name— Azure Storage
account soft delete is disabled
Updated Policy Description— Identifies
Azure Storage accounts which has soft delete
disabled. Azure Storage contains important
access logs, financial data, personal and other
secret information which is accidentally
deleted by a user or application could
cause data loss or data unavailability. It is
recommended to enable soft delete setting in
Azure Storage accounts.
Updated Remediation CLI Description— This
CLI command requires 'Microsoft.Storage/
storageAccounts/blobServices/write'
permission. Successful execution will enable
soft delete for blobs on Azure Storage
accounts. NOTE: As best practice we are
setting delete retention days to 30 days; it can
be changed based on customer requirement
by cloning the policy.
Impact— No impact on alerts.
Azure Microsoft Defender for Cloud Changes— The policy recommendation steps
automatic provisioning of log Analytics agent have been updated to reflect the lastest CSP
for Azure VMs is set to Off changes.
Impact— No impact on alerts.
Prisma™ Cloud Release Notes 189 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
FEATURE DESCRIPTION
‘Monitor and Protect’ renamed Remediation With the Cloud Account Onboarding changes
for more Security Coverage, the Monitor and
Monitor & Protect modes are revised. For an
existing account that was onboarded with
Monitor & Protect mode, the Remediation
security capability represents the mode.
Update AWS Account Onboarding During onboarding your AWS cloud account
on Prisma Cloud, if you are already logged in
to your AWS management console, you can
either Download IAM Role CFT or Create
IAM Role on the fly.
Prisma™ Cloud Release Notes 190 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 191 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CIS Google Cloud Platform Foundation The Center for Internet Security (CIS) releases
Benchmark v2.0.0 (Level 1 and Level 2) benchmarks for best practice security
recommendations. CIS Google Cloud Platform
Foundation Benchmark v2.0.0 is based on
the CIS Google Cloud Computing Platform
Foundations Benchmark v1.0.0 published
by the Center for Internet Security (CIS).
The CIS benchmark provides guidance to
securing the GCP environment, covering
everything from network to servers to
operating systems. The important sections
covered in the benchmark include IAM,
Logging and monitoring configuration, Virtual
Prisma™ Cloud Release Notes 192 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CIS Google Kubernetes Engine (GKE) v1.3.0 - The Center for Internet Security (CIS) releases
(Level 1 and Level 2) benchmarks for best practice security
recommendations. CIS Google Kubernetes
Engine (GKE) v1.3.0 - (Level 1 and Level 2)
is a set of recommendations for configuring
Kubernetes to support a strong security
posture. Benchmarks are tied to specific
Kubernetes releases. The CIS Kubernetes
Benchmark is written for the open source
Kubernetes distribution and is intended to be
universally applicable. Based on the existing
CIS Benchmark, this standard adds additional
controls that are Google Cloud-specific.
You can review this compliance standard
and its associated policies on Prisma Cloud’s
Compliance > Standard page.
CHANGE DESCRIPTION
Update Critical and The following new properties are added to the response
Informational Severity Alerts objects of both:
Updates
• GET /compliance/posture
• POST /compliance/posture
• summary
• criticalSeverityFailedResources
Prisma™ Cloud Release Notes 193 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• complianceDetails
• criticalSeverityFailedResources
• criticalSeverityFailedResources
• criticalSeverityFailedResources
• groupedAggregates
• criticalSeverityFailedResources
• criticalSeverityFailedResources
Prisma™ Cloud Release Notes 194 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• critical
Update Adoption Advisor API The following new endpoints are available for the
Adoption Advisor API:
• GET /adoptionadvisor/report
• POST /adoptionadvisor/report
• PUT /adoptionadvisor/report/{reportId}
• DELETE /adoptionadvisor/report/{reportI
d}
• DELETE /adoptionadvisor/report/{reportI
d}/download
• GET /adoptionadvisor/report/{reportId}/
{createdOn}/download
• GET /adoptionadvisor/report/generate
New Features
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 195 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Adoption Advisor for Code to Cloud To assist you in the process of monitoring and
securing your cloud resources, the Adoption
Advisor has been updated to provide
guidance on foundational, intermediate, and
advanced tasks throughout the application
lifecycle. The Adoption Advisor includes
three stages of the code to cloud application
lifecycle: Code & Build, Deploy, and Runtime.
You can follow these stages at your own
pace, using the "walk, crawl, run" principles to
gradually adopt various security capabilities.
Critical and Informational Severity Policies To help you categorize and distinguish the
varying degrees of severity of Prisma Cloud
policies and associated alerts, two new levels
of severity are being added. There are no
changes to the severity of any system default
policies. However, you can now modify
policy severity to Critical and Informational as
needed.
Prisma™ Cloud Release Notes 196 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Look for PDF Reports The Compliance reports and the Cloud
Security Assessment report for Alerts
are updated with a new look and better
visualization.
Update Prisma Cloud Data Security-Scan .zip Prisma Cloud can now scan your storage
Files up to 2.5GB resources with .zip file extensions of up to
2.5GB for data classification and malware. The
size of the uncompressed files must be:
• less than 20MB to be supported by DSS
for scanning and
• less than 100MB to be supported by
Wildfire for scanning.
Update Change in Terraform file name for The terraform files you download during
Azure and GCP accounts onboarding Azure and GCP accounts on
Prisma Cloud have new names.
Prisma™ Cloud Release Notes 197 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
azure_template API
prisma-cloud-azure-terraform-
<ts>.tf.json
gcp_template API
prisma-cloud-gcp-terraform-<t
s>.tf.json
API Ingestions
• kendra:ListIndices
• kendra:ListTagsForResource
kendra:ListIndices
Prisma™ Cloud Release Notes 198 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
kendra:DescribeIndex
and
kendra:ListTagsForRes
ource
• events:ListEventBuses
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
Prisma™ Cloud Release Notes 199 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
Prisma™ Cloud Release Notes 200 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
Prisma™ Cloud Release Notes 201 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• Microsoft.Sql/servers/databas
es/read
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
• apigee.datastores.list
• apigee.apiproducts.get
• apigee.apiproducts.list
Prisma™ Cloud Release Notes 202 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• apigee.organizations.list
• apigee.proxies.get
• apigee.proxies.list
• apigee.deployments.list
• apigee.reports.list
• apigee.envgroups.list
• apigee.hostsecurityreports.li
st
• apigee.securityProfiles.list
bigquery.tables.get
Prisma™ Cloud Release Notes 203 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• cloudkms.keyRings.getIamPolic
y
• cloudkms.cryptoKeys.getIamPol
icy
• metastore.services.getIamPoli
cy
• metastore.services.list
• dataplex.zones.list
• dataplex.assets.list
• dataplex.assetActions.list
Prisma™ Cloud Release Notes 204 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• read analytics-instances
• read api-gateways
• inspect api-deployments
• read api-deployments
• read usage-budgets
Prisma™ Cloud Release Notes 205 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• read network-load-balancers
New Policies
No new policies for 23.1.1.
Policy Updates
Policy Updates-RQL
Azure AD Users can consent to apps Changes— The policy RQL and
accessing company data on their behalf is recommendation steps have been updated
enabled according to the CSP changes.
Current RQL—
Updated RQL—
SQL servers which do not have Azure Active Changes— The policy Name, Description, and
Directory admin configured Recommendation steps have been updated to
maintain consistency across policies. The RQL
Prisma™ Cloud Release Notes 206 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Prisma™ Cloud Release Notes 207 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
serverAdmins[*].properties.login
is not empty)
Azure Virtual Network subnet is not Changes— The policy RQL has been updated
configured with a Network Security Group to ignore the case sensitive of the parameter
value.
Current RQL—
Updated RQL—
Policy Updates-Metadata
Prisma™ Cloud Release Notes 208 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure Storage Account default network Changes— The policy description and
access is set to 'Allow' recommendation steps have been updated to
reflect the latest CSP changes.
Updated Policy Description— Identifies
Storage accounts which have default network
access is set to 'Allow'. Restricting default
network access helps to provide a new layer
of security, since storage accounts accept
connections from clients on any network. To
limit access to selected networks, the default
action must be changed.
Impact— No impact on alerts.
GCP Kubernetes Engine Clusters have Changes— The policy name, description, and
Stackdriver Logging disabled recommendation steps have been updated to
reflect the latest CSP changes.
Current Policy Name— GCP Kubernetes
Engine Clusters have Stackdriver Logging
disabled Updated Policy Name— GCP
Kubernetes Engine Clusters have Cloud
Logging disabled
Updated Policy Description— Identifies
Kubernetes Engine Clusters which have
disabled Cloud Logging. Enabling Cloud
Logging will let the Kubernetes Engine to
collect, process, and store your container and
system logs in a dedicated persistent data
store.
Impact— No impact on alerts.
GCP User managed service accounts have Changes— The policy recommendation steps
user managed service account keys have been updated to reflect the latest CSP
changes.
Impact— No impact on alerts.
GCP Kubernetes Engine Clusters have Legacy Changes— The policy recommendation
Authorization enabled steps have been updated to reflect the
latest CSP changes. The remediation CLI has
been removed because there is no single cli
command that can update both Zonal and
Regional GKE clusters.
Impact— Changes to recommendation steps
will have no impact on existing alerts. There is
no remediation support available.
Prisma™ Cloud Release Notes 209 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP Kubernetes Engine Clusters have Cloud Changes— The policy description has been
Monitoring disabled updated to reflect the latest CSP changes.
Updated Policy Description— Identifies
Kubernetes Engine Clusters which have
disabled Cloud monitoring. Enabling Cloud
monitoring will let the Kubernetes Engine to
monitor signals and build operations in the
clusters.
Impact— No impact on alerts.
GCP Kubernetes Engine Clusters not Changes— The policy recommendation steps
configured with network traffic egress have been updated to reflect the latest CSP
metering changes.
Impact— No impact on alerts.
GCP Log metric filter and alert does not exist Changes— The policy recommendation steps
for Project Ownership assignments/changes have been updated to reflect the latest CSP
changes.
Impact— No impact on alerts.
Logging on the Stackdriver exported Bucket Changes— The policy name, description, and
is disabled recommendation steps have been updated to
reflect the latest CSP changes.
Current Policy Name— Logging on the
Stackdriver exported Bucket is disabled
Updated Policy Name— GCP Bucket
containing Operations Suite Logs have bucket
logging disabled
Updated Policy Description— Identifies the
buckets containing Operations Suite Logs for
which logging is disabled. Enabling bucket
logging, logs all the requests made on the
bucket which can be used for debugging and
forensics. It is recommended to enable logging
on the buckets containing Operations Suite
Logs.
Impact— No impact on alerts.
Policy Deletions
Prisma™ Cloud Release Notes 210 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
AWS EC2 instance is not configured with Changes— AWS has deprecated the AWS
VPC classic network service. As a result, this policy
is now obsolete and is deleted.
Impact— No impact on alerts. The compliance
mapping for the above policy is removed
due to which the compliance score can get
affected. The affected compliance standards
are:
NIST SP 800-171 Revision 2, PCI DSS
v3.2.1, Copy of APRA (CPS 234) Information
Security, NIST SP 800-172, Copy of 1Copy
of Brazilian Data Protection Law (LGPD),
HITRUST v.9.4.2, ACSC Information Security
Manual (ISM), NIST CSF, TestCompliance,
Copy of Brazilian Data Protection Law
(LGPD), MAS TRM 2021, ISO/IEC
27002:2013, ISO/IEC 27017:2015, MLPS
2.0 (Level 2), CIS Controls v8, CIS Controls
v7.1, HITRUST CSF v.9.6.0, Secure Controls
Framework (SCF) - 2022.2.1, APRA (CPS
234) Information Security, Cybersecurity
Maturity Model Certification (CMMC) v.1.02,
Prisma™ Cloud Release Notes 211 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
FEATURE DESCRIPTION
Monitor and Protect renamed Remediation With the Cloud Account Onboarding changes
for more Security Coverage, the Monitor and
Monitor & Protect modes are revised. For
an existing account that was onboarded with
Monitor & Protect mode, the Remediation
security capability represents the mode.
Update AWS Account Onboarding During onboarding your AWS cloud account
on Prsima Cloud, if you are already logged in
to your AWS management console, you can
either Download IAM Role CFT or Create
IAM Role on the fly.
Prisma™ Cloud Release Notes 212 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Google BigQuery API Resource ID Update The resource ID for the gcloud-bigquery-
dataset-list in Prisma Cloud is updated in the
backend. As a result, all resources for gcloud-
bigquery-dataset-list API will be deleted
and then regenerated on the management
console.
Existing alerts corresponding to these
resources is resolved as Resource_Updated,
and new alerts will be generated against
policy violations.
Impact—You may notice a reduced count
for the number of alerts. However, once the
resources for the gcloud-bigquery-dataset-
list API resumes ingesting data, the alert count
will return to the original numbers.
Near Zero Rate Limit Exception for GCP APIs You must enable the following GCP APIs for
each project that the Prisma Cloud service
account accesses to monitor and protect your
GCP resources. If you have onboarded your
GCP account at the Organization level, this
configuration ensures that the API rate limit
quota is applied to each GCP project that is
part of the onboarded GCP Organization,
and not counted entirely towards the project
where the service account is created.
• bigtableadmin.googleapis.com
Prisma™ Cloud Release Notes 213 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• container.googleapis.com
• logging.googleapis.com
• monitoring.googleapis.com
• pubsub.googleapis.com
• serviceusage.googleapis.com
• firebaserules.googleapis.com
CHANGE DESCRIPTION
Update Asset Explorer API The following new query parameters are added to the
existing GET/resource/scan_info endpoint:
• asset.severity
• vulnerability.severity
• includeEventForeignEntities
• resourceDetailsAvailable
• unifiedAssetId
• vulnerabilityStatus
• assetType
Update Asset Inventory API The following new query parameters are added to the
existing GET/v2/inventory endpoint:
• asset.severity
Prisma™ Cloud Release Notes 214 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• vulnerability.severity
Changes to the Get Asset The structure of the Get Asset (POST /uai/v1/asset)
Endpoint Response Object response object has been modified. All the properties of
the data object are now included under a new asset object.
The asset object is included in the data object.
Prisma™ Cloud Release Notes 215 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 216 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
Improvement to Flow Logs Ingestion Time Prisma Cloud now provides hourly partition
for your AWS S3 Flow Logs. By switching to
hourly partition, Prisma Cloud makes fewer
calls to your S3 bucket thereby reducing cost,
solving lag, and provides better ingestion
performance over the existing 24-hour
partition.
Create a new flow log setting with the
hourly partition and enable the additional
fields required on the AWS console. Some
additional fields such as, tcp-flags and flow-
direction configured on the AWS console
are used to ensure accuracy of the Internet
exposure calculation in network policies.
Prisma™ Cloud Release Notes 217 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
External ID update for AWS Cloud Account While onboarding AWS standalone or
Onboarding organization accounts in Prisma Cloud
Console, you cannot provide the External ID.
This change was first announced in the look
Instead, Prisma Cloud generates an External
ahead that was published with the 22.4.1
ID and includes it in the IAM Role CFT. You
release.
can use this External ID and complete the
onboarding process within 30 days. If you do
not complete the onboarding within this 30-
day period, you must restart the onboarding
workflow.
This change is currently limited to the Prisma
Cloud Console and does not impact already
onboarded AWS accounts.
You can continue to use the existing cloud
account onboarding APIs until the new APIs
that use the External ID generated by Prisma
Cloud are available (expected in February
2023). After the new APIs are available, you
have 90 days to update your automation
scripts for onboarding new cloud accounts.
Similarly, the CFTs in the S3 bucket that
allow custom External IDs will continue to
be available until the end of March 2023 for
backward compatibility.
API Ingestions
• codepipeline:GetPipeline
• codepipeline:ListTagsForResou
rce
Prisma™ Cloud Release Notes 218 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
codepipeline:ListTagsForResource
codepipeline:ListTags
ForResource
permission.
• forecast:DescribeAutoPredicto
r
• forecast:ListTagsForResource
• forecast:ListPredictors
• forecast:DescribeDataset
• forecast:ListTagsForResource
forecast:ListDatasets
permission.
Prisma™ Cloud Release Notes 219 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
forecast:DescribeData
set
and
forecast:ListTagsForR
esource
permissions.
• databrew:ListJobs
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Compute/cloudServic
es/roleInstances/read
• Microsoft.Compute/virtualMach
ineScaleSets/virtualMachines/
Prisma™ Cloud Release Notes 220 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
networkInterfaces/ipConfigura
tions/publicIPAddresses/read
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.Insights/Diagnostic
Settings/Read
• Microsoft.KeyVault/vaults/pri
vateLinkResources/read
• Microsoft.Insights/Diagnostic
Settings/Read
Prisma™ Cloud Release Notes 221 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• Microsoft.Insights/Diagnostic
Settings/Read
Microsoft.Resources/subscription
s/read
Microsoft.Network/privateEndpoin
ts/read
• apigee.sharedflows.list
• apigee.sharedflows.get
• apigee.deployments.list
Prisma™ Cloud Release Notes 222 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• apigee.datacollectors.list
• apigee.instanceattachments.li
st
• apigee.organizations.list
• apigee.environments.get
• apigee.environments.getIamPol
icy
• apigee.organizations.get
• apigee.organizations.get
• dataplex.lakes.list
• dataplex.zones.list
Prisma™ Cloud Release Notes 223 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• dataplex.assets.list
• dataplex.assets.getIamPolicy
Prisma™ Cloud Release Notes 224 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 225 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Policies
Azure Cosmos DB (PaaS) instance reachable Identifies Azure Cosmos DB (PaaS) instances
from untrust internet source that are internet reachable from untrust
internet source. Cosmos DB (PaaS) instances
with untrusted access to the internet may
enable bad actors to use brute force on a
system to gain unauthorised access to the
entire network. As a best practice, restrict
traffic from untrusted IP addresses and
limit the access to known hosts, services, or
specific entities.
Instance affected by Spring Cloud Function Identifies instances installed with the Spring
SpringShell vulnerability is exposed Cloud Function version that are vulnerable to
to network traffic from the internet arbitrary code execution CVE-2022-22963,
(CVE-2022-22963) and exposed to network traffic from the
internet. As a best practice, upgrade to the
Requires the Compute subscription to
latest Spring Cloud Function version and limit
generate alerts on Prisma Cloud.
internet exposure.
Prisma™ Cloud Release Notes 226 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 227 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Instance affected by Apache Log4j Thread Identifies instances installed with Apache
Context Map remote code execution Log4j Thread Context Map version vulnerable
vulnerability is exposed to network traffic for CVE-2021-45046 and exposed to network
from the internet (CVE-2021-45046) traffic from the internet. As a best practice,
upgrade the Apache Log4j Thread Context
Requires the Compute subscription to
Map version to the latest version and limit
generate alerts on Prisma Cloud.
exposure to the internet.
Prisma™ Cloud Release Notes 228 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
where finding.type IN
( 'Host Vulnerability' ) AND
finding.source IN ( 'Prisma
Cloud' ) AND finding.name
IN ('CVE-2022-24348')) AND
source.publicnetwork IN
('Internet IPs', 'Suspicious
IPs')
Instance affected by Linux kernel Dirty Pipe Identifies instances installed with Dirty Pipe
vulnerability is exposed to network traffic vulnerability for CVE-2022-0847 and exposed
from the internet (CVE-2022-0847) to network traffic from the internet. As a best
practice, upgrade to the latest version of Dirty
Requires the Compute subscription to
Pipe Linux kernel and limit exposure to the
generate alerts on Prisma Cloud.
internet.
Instance affected by Java Psychic Signatures Identifies instances installed with with
vulnerability is exposed to network traffic Oracle Java SE versions vulnerable for
from the internet (CVE-2022-21449) CVE-2022-21449 and exposed to network
traffic from the internet. As a best practice,
Requires the Compute subscription to
upgrade to the latest Java Psychic Signatures
generate alerts on Prisma Cloud.
Oracle Java SE version and limit exposure to
the internet.
Instance affected by Linux kernel container Identifies instances installed with with Linux
escape vulnerability is exposed to network kernel container escape version vulnerable
traffic from the internet (CVE-2022-0185) for CVE-2022-0185 and exposed to network
traffic from the internet. As a best practice,
Prisma™ Cloud Release Notes 229 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Requires the Compute subscription to upgrade to the latest Oracle Java SE version
generate alerts on Prisma Cloud. and limit exposure to the internet.
Instance affected by DCE/RPC remote code Identifies instances installed with SMB
execution vulnerability is exposed to network DCE/RPC remote code execution version
traffic from the internet (CVE-2022-26809) vulnerability for CVE-2022-26809 and
exposed to network traffic from the internet.
Requires the Compute subscription to
As a best practice, upgrade to the latest SMB
generate alerts on Prisma Cloud.
DCE/RPC remote code execution version and
limit exposure to the internet.
Instance affected by Samba vfs_fruit module Identifies network facing instances installed
remote code execution vulnerability is with Samba vfs_fruit module remote
exposed to network traffic from the internet code execution version vulnerability for
(CVE-2021-44142) CVE-2022-44142 and exposed to network
traffic from the internet. As a best practice,
Requires the Compute subscription to
upgrade to the latest Samba vfs_fruit module
generate alerts on Prisma Cloud.
remote code execution version and limit
exposure to the internet.
Prisma™ Cloud Release Notes 230 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
If you have enabled the Code Security subscription on Prisma Cloud, see Code Security-
Features Introduced in December 2022 for details on new Configuration Build policies.
Policy Updates
See Prisma Cloud Known Issues for a policy status change issue that may affect you.
Policy Updates-RQL
Instance affected by Apache Log4j Changes— The policy RQL has been updated
vulnerability is exposed to network traffic to enhance the scope of network traffic
from the internet (CVE-2021-44228) direction.
Current RQL—
Updated RQL—
Instance affected by OMIGOD vulnerability is Changes— The policy name and RQL have
exposed to network traffic from the internet been updated to enhance the scope of
network traffic direction.
Prisma™ Cloud Release Notes 231 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Instance affected by SpringShell vulnerability Changes- The policy name, description, and
is exposed to network traffic from the RQL are updated to enhance the scope of
internet network traffic direction.
Requires the Compute subscription to Current Policy Name— Instance affected
generate alerts on Prisma Cloud. by SpringShell vulnerability is exposed to
network traffic from the internet
Updated Policy Name— Instance affected by
Spring Framework SpringShell vulnerability is
exposed to network traffic from the internet
[CVE-2022-22965]
Updated Policy Description— Identifies
Instances installed with the Java Spring
Framework version vulnerable to arbitrary
Prisma™ Cloud Release Notes 232 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
AWS Customer Master Key (CMK) rotation is Changes— The policy RQL has been updated
not enabled to only report custom keys generated by KMS
that have the automatic key rotation feature.
Current RQL—
Prisma™ Cloud Release Notes 233 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
rotation_status.keyRotationEnabled
equals "null") and
keyMetadata.customerMasterKeySpec
equals SYMMETRIC_DEFAULT
Updated RQL—
Azure App Service Web app doesn’t use Changes— The policy RQL has been updated
latest Java version to check the updated Java version supported
by the vendor.
Current RQL—
Prisma™ Cloud Release Notes 234 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Prisma™ Cloud Release Notes 235 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
config.linuxFxVersion does
not end with 9.0-java11 and
config.linuxFxVersion does
not end with 8.5-java11 and
config.linuxFxVersion does
not end with 10.0-java17 and
config.linuxFxVersion does
not end with 9.0-java17 and
config.linuxFxVersion does not
end with 8.5-java17))'
Policy Updates—Metadata
GCP Log metric filter and alert does not exist Changes— The policy recommendation
for VPC network changes steps have been updated to reflect the CSP
changes.
Impact— No impact on alerts.
GCP Log metric filter and alert does not exist Changes— The policy recommendation
for IAM custom role changes steps have been updated to reflect the CSP
changes.
Impact— No impact on alerts.
GCP Log metric filter and alert does not exist Changes— The policy recommendation
for VPC network route changes steps have been updated to reflect the CSP
changes.
Impact— No impact on alerts.
GCP Log metric filter and alert does not exist Changes— The policy recommendation
for Cloud Storage IAM permission changes steps have been updated to reflect the CSP
changes.
Impact— No impact on alerts.
GCP Log metric filter and alert does not exist Changes— The policy recommendation
for Audit Configuration changes steps have been updated to reflect the CSP
changes.
Impact— No impact on alerts.
GCP Log metric filter and alert does not exist Changes— The policy recommendation
for SQL instance configuration changes steps have been updated to reflect the CSP
changes.
Impact— No impact on alerts.
Prisma™ Cloud Release Notes 236 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP Log metric filter and alert does not exist Changes— The policy recommendation
for VPC Network Firewall rule changes steps have been updated to reflect the CSP
changes.
Impact— No impact on alerts.
FEATURE DESCRIPTION
Global Region Support for Google Compute Prisma Cloud now provides global region
Engine support for
gcloud-compute-instance-template
gcloud-compute-instance-template
Region Support for Google Cloud Load Prisma Cloud can now store regional
Balancing APIs resources as well as global resources for
gcloud-compute-target-http-prox
ies
and
gcloud-compute-target-https-pro
xies
Prisma™ Cloud Release Notes 237 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
gcloud-compute-target-http-prox
ies
and
gcloud-compute-target-https-pro
xies
APIs.
Alerts for Audit Events To make your experience with audit event
alerts consistent with configuration alerts
for custom policies, the policy evaluation
for audit events is updated to use the alert
rule configuration. The targets for the cloud
accounts and cloud regions for which you
want to trigger alerts are now only inherited
from the alert rule.
Earlier, when you run an audit event query
on the Investigate page, and save the query
as a saved search and then use this saved
search query as match criteria in a policy, the
matched issues that trigger alerts used inputs
from both the alert rule configuration and
saved search.
As an example, if you had created a
saved search that includes the RQL for
cloud.account, cloud.accountgroup,
or cloud.region, such as event
from cloud.audit_logs where
cloud.account = 'Developer
Sandbox' AND cloud.region =
'AWS Canada' AND operation IN
('DeleteAccessKey') the cloud.account,
and cloud.region attributes will now be
ignored for custom and existing policies and
their associated alerts.
Only, the target cloud accounts and cloud
regions that you specify in the alert rule
configuration will be used to scope when
alerts are generated for the custom Audit
Event policy.
Impact— The change in how the targets for
generating alerts scoped may result in a larger
number of alerts than before. This change will
be rolled out gradually over multiple phases.
Prisma™ Cloud Release Notes 238 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Multi-Level Protection Scheme 2.0 (Level 2) Prisma Cloud now supports the Multi-Level
Protection Scheme 2.0 (Level 2) compliance
standard. This level of information security is
based on the compliance standard that nearly
all domestic and foreign companies operating
in China must follow.
With this support, you can now view this
built-in standard and the related policies On
Prisma Cloud’s Compliance > Standard page.
Additionally, you can generate reports for
immediate viewing or download, or you can
schedule recurring reports to keep track of
this compliance over time.
Secure Controls Framework (SCF) - 2022.2.1 Prisma Cloud now supports the Secure
standards Controls Framework (SCF) - 2022.2.1
standards. The Secure Controls Framework
(SCF) is a meta-framework that corresponds
to more than 100 industry frameworks and
laws related to cybersecurity and privacy.
The SCF is concerned with internal controls.
These are the cybersecurity and privacy
policies, standards, procedures, and other
processes designed to provide assurance that
business objectives will be met and unwanted
events will be prevented, detected, and
corrected.
With this support, you can now view this
built-in standard and the related policies On
Prisma Cloud’s Compliance > Standard page.
Additionally, you can generate reports for
immediate viewing or download, or you can
schedule recurring reports to keep track of
this compliance over time.
CHANGE DESCRIPTION
Asset Explorer API The following new endpoint returns detailed information
for the asset with the given id:
Prisma™ Cloud Release Notes 239 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• POST /uai/v1/asset
New Features
FEATURE DESCRIPTION
Prisma Cloud launches new Home Page As a system administrator, you have a new
Home page when you log in to Prisma
Cloud. This page provides instant access to
the critical issues, latest information, and
recommendations for next steps. Use this
page as a launch pad to:
• See the latest summary of what happened
in the last 24 hours.
• Identify where to resume on your
operationalization journey. You have a
central context to:
• Review the recommended workflows.
• Get started with connecting the
providers - repositories, registries and
cloud accounts - to scan artifacts and
secure resources that are used and
deployed through your code to cloud
journey.
• Take the next steps in adopting the
suite of security capabilities from the
Adoption Advisor
• Stay informed on what’s new on Prisma
Cloud with easy access to the release
information and cloud security blogs from
Unit 42.
Prisma™ Cloud Release Notes 240 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Anomaly Policies for AWS DNS Activity On Policies and Alerts > Overview, a new
Policy Subtype for DNS displays.
Prisma™ Cloud Release Notes 241 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Ingestion of AWS DNS Logs from Amazon DNS logs provide critical data in detecting
Kinesis Data Firehose threats such as, Cryptomining pools, domain
generation algorithms (DGAs), and DNS
rebinding. Prisma Cloud fetches DNS logs
for accounts that are streamed on Amazon
Kinesis Data Firehose in a logging account on
AWS.
After you enable DNS log ingestion on Prisma
Cloud, all requests made to AWS default
DNS resolvers are logged while DNS queries
made to external servers or DNS servers not
managed by AWS are not logged. Logging is
enabled per VPC.
IAM Access Control for Service Principals Ensure applications, hosted services, and
automated tools securely access your Azure
Update
cloud resources with IAM access control
for service principals. Assign permissions
to the external service or service principal
and enforce the appropriate level of access
control. Like access control for individual
users, service principals can be queried
and alerts can be created for application
registration and remediation.
Use the App Registration value
for source.cloud.resource.type
and Service Principal in the
grantedby.cloud.entity.type in your
IAM queries to query service principals.
Support for Azure Tenant You can now enable Data Security on your
Azure tenant and configure data security for
Prisma Cloud Data Security
all the subscriptions under that tenant. You
can set up Forward and Backward scan to
scan your Azure resources for data security
issues and also choose custom scan or choose
to scan all objects in your tenants.
Prisma™ Cloud Release Notes 242 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Timestamp based on Resource Ingestion for On the Data Dashboard and Inventory pages,
Time Range Filters when you used the Time Range filter the
timestamp displayed was based on when the
Update
resource was created in the cloud account.
For improved accuracy, the timestamp
displayed is now based on when the resource
was ingested.
API Ingestions
• cloud9:ListTagsForResource
• cloud9:DescribeEnvironments
• cloud9:DescribeEnvironmentMem
berships
cloud9:ListTagsForResource
Prisma™ Cloud Release Notes 243 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
cloud9:ListTagsForRes
ource
permission.
• workspaces:DescribeWorkspaceB
undles
• workspaces:DescribeIpGroups
Microsoft.Attestation/attestatio
nProviders/read
Prisma™ Cloud Release Notes 244 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.Blueprint/blueprints/
read
Microsoft.Confluent/organization
s/Read
Microsoft.Datadog/monitors/read
Microsoft.DevCenter/devcenters/
read
Microsoft.Elastic/monitors/read
Microsoft.EventGrid/topics/read
Prisma™ Cloud Release Notes 245 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.ManagedServices/regist
rationAssignments/read
Microsoft.Storage/storageAccount
s/fileServices/shares/read
Microsoft.StorageMover/storageMo
vers/read
Microsoft.Workloads/monitors/re
ad
• Microsoft.Network/serviceEndp
ointPolicies/serviceEndpointP
olicyDefinitions/read
• Microsoft.Network/privateEndp
oints/read
Prisma™ Cloud Release Notes 246 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• datastream.connectionProfiles
.list
• datastream.privateConnections
.list
• datastream.streams.list
compute.firewallPolicies.list
New Policies
GCP Identity-Aware Proxy (IAP) not enabled Identifies GCP External HTTP(s) Load
for External HTTP(s) Load Balancer Balancers for which Identity-Aware Proxy
(IAP) is disabled. IAP is used to enforce access
control policies for applications and resources.
It works with signed headers or the App
Engine standard environment Use API to
secure connections to External HTTP(s) Load
Balancers. Enabling Identity-Aware Proxy for
Prisma™ Cloud Release Notes 247 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP API key is created for a project Identifies GCP projects where API keys are
created. Keys are insecure because they can
be viewed publicly, such as from within a
browser, or they can be accessed on a device
where the key resides. To avoid this API
related security risk, we recommended using
standard authentication flow.
Policy Updates
Policy Updates—RQL
AWS VPC endpoint policy is overly Changes— The policy RQL has been updated
permissive to check for only VPC Gateway Endpoints.
Also, the policy name, description, and
recommendation steps have been updated.
Current Name— AWS VPC endpoint policy is
overly permissive disabled
Updated Name— AWS VPC gateway
endpoint policy is overly permissive
Updated Description— Identifies VPC
gateway endpoints that have a VPC endpoint
(VPCE) policy that is overly permissive. When
the Principal element value is set to '*' within
the access policy, the VPC gateway endpoint
allows full access to any IAM user or service
within the VPC using credentials from any
AWS accounts. It is highly recommended
to have the least privileged VPCE policy to
protect the data leakage and unauthorized
access.
Prisma™ Cloud Release Notes 248 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
AWS RDS minor upgrades not enabled Changes— The policy RQL has been updated
to check if the RDS DB instances are in the
“available” state.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 249 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure AKS cluster pool profile count contains Changes— The policy RQL has been updated
less than 3 nodes with new syntax to increase accuracy and the
remediation details are updated to reflect the
CSP UI changes.
Updated Description— Identifies AKS clusters
that are configured with node pool profile less
than 3 nodes. It is recommended to have at
least 3 or more than 3 nodes in a node pool
for a more resilient cluster. (Clusters smaller
than 3 may experience downtime during
upgrades.)
Current RQL—
Updated RQL—
Azure Front Door does not have the Azure Changes— The policy RQL has been updated
Web application firewall (WAF) enabled to provide more accuracy in alert results.
Prisma™ Cloud Release Notes 250 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
Azure SQL Database with Auditing Retention Changes— The policy RQL and
less than 90 days recommendation steps have been updated
to exclude Log Analytics and Event Hubs, as
retention periods are not configurable.
Current RQL—
Prisma™ Cloud Release Notes 251 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
(serverBlobAuditingPolicy.properties.state
equals Enabled and
serverBlobAuditingPolicy.properties.retent
does not equal 0 and
serverBlobAuditingPolicy.properties.retent
less than 90))' as X; config
from cloud.resource where
api.name = 'azure-sql-
db-list' AND json.rule =
'blobAuditPolicy does not exist
or blobAuditPolicy is empty or
blobAuditPolicy.properties.retentionDays
does not exist or
(blobAuditPolicy.properties.state
equals Enabled and
blobAuditPolicy.properties.retentionDays
does not equal 0 and
blobAuditPolicy.properties.retentionDays
less than 90)' as Y; filter
'$.Y.blobAuditPolicy.id
contains $.X.sqlServer.name';
show Y;
Updated RQL—
Prisma™ Cloud Release Notes 252 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
blobAuditPolicy.properties.retentionDays
does not equal 0 and
blobAuditPolicy.properties.retentionDays
less than 90))' as Y; filter
'$.Y.blobAuditPolicy.id
contains $.X.sqlServer.name';
show Y;
GCP PostgreSQL instance database flag Changes— The policy RQL has been enhanced
log_statement is not set appropriately to resolve false alerts by changing the
contain operator to equals. Due to this,
collision with similar flag names such as
log_statement_stats will be avoided.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 253 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP Kubernetes Engine Clusters have binary Changes— The policy RQL has been
authorization disabled updated to match CSP data. The datapoint
binaryAuthorization.enabled
is deprecated and replaced by
binaryAuthorization.evaluationMode
and the remediation CLI is removed since no
single CLI command is available to update
both Zonal and Regional GKE clusters.
Current RQL—
Updated RQL—
Policy Updates—Metadata
Azure AKS cluster Azure CNI networking not Changes— The policy recommendation steps
enabled have been updated.
Impact— No impact on alerts.
Prisma™ Cloud Release Notes 254 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure AKS cluster monitoring not enabled Changes— The policy recommendation steps
have been updated.
Impact— No impact on alerts.
Azure AKS cluster HTTP application routing Changes— The policy recommendation steps
enabled have been updated.
Impact— No impact on alerts.
Azure AKS enable role-based access control Changes— The policy recommendation steps
(RBAC) not enforced have been updated.
Impact— No impact on alerts.
GCP Kubernetes Engine Clusters have Changes— The policy name and
Stackdriver Monitoring disabled recommendation steps have been updated to
reflect the CSP changes.
Current Name— GCP Kubernetes Engine
Clusters have Stackdriver Monitoring disabled
Updated Name— GCP Kubernetes Engine
Clusters have Cloud Monitoring disabled
Impact— No impact on alerts.
GCP Storage log buckets have object Changes— The policy recommendation
versioning disabled steps have been updated to reflect the CSP
changes.
Impact— No impact on alerts.
Storage Buckets with publicly accessible Changes— The policy name and
Stackdriver logs recommendation steps have been updated to
reflect the CSP changes.
Current Name— Storage Buckets with publicly
accessible Stackdriver logs
Updated Name— GCP Storage Buckets with
publicly accessible GCP logs
Impact— No impact on alerts.
FEATURE DESCRIPTION
Global Region Support for Google Compute Prisma Cloud now provides global region
Engine support for
Prisma™ Cloud Release Notes 255 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
gcloud-compute-instance-template
gcloud-compute-instance-template
Region Support for Google Cloud Load Prisma Cloud can now store regional
Balancing APIs resources as well as global resources for
gcloud-compute-target-http-prox
ies
and
gcloud-compute-target-https-pro
xies
gcloud-compute-target-http-proxi
es and gcloud-compute-target-htt
ps-proxies
APIs.
Alerts for Audit Events To make your experience with audit event
alerts consistent with configuration alerts
for custom policies, the policy evaluation
for audit events is updated to use the alert
rule configuration. The targets for the cloud
accounts and cloud regions for which you
Prisma™ Cloud Release Notes 256 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 257 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
Unified Policy and Alerts for Compute Incident policies and alerts for hosts and
Workloads on the Platform containers are now accessible from the
Policies and Alerts pages on the Prisma
Cloud console. This provides a single-pane
to configure alert rules and view compute
workload alerts so that you can contextualize
and prioritize remediation.
The Host and Container policies for detecting
vulnerabilities and runtime incidents are
visible on the Policies page. As a start,
there are 4 new policies categorized as
policy subtype Workload Vulnerability and
Workload Incident.
Alert rules support the use of these policies
along with Compute Access Groups, which
is a resource list where you can specify
the scope of compute workloads that
want to scan against these policies. On the
Alerts > Overview, the alert details surface
vulnerabilities detected on both hosts and
containers that violate these policies and
directly link to the Vulnerability Explorer
on Compute. The alerts are generated
for Agentless scanning or scanning with
Defenders.
Enable Resolved Alert State in Jira In addition to Open alert state notifications
Notification Template configured in the notification template, Prisma
Cloud integration with Jira now allows you to
configure and send notifications for Resolved
alert states through Jira tickets.
For more details, refer to Integrate Prisma
Cloud with Jira.
Prisma™ Cloud Release Notes 258 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Granular Role Based Access Control Enhancements to Prisma Cloud roles now
allow you to create custom roles leveraging
Granular Role Based Access Control (GRBAC).
Easily create, edit, or update existing roles
to enforce least-access privileges to Prisma
Cloud features, limiting access to only
those functions that align with a user’s job
responsibilities.
GRBAC creates a dynamic experience for
Prisma Cloud users, with a customizable
console that displays only the features
assigned to any given user, providing an
additional layer of security.
CWP Widgets in Adoption Advisor The Adoption Advisor includes two new
widgets for Cloud Workload Protection
(CWP).
• Discovered Vs Secured Resources— With
this widget you can now gain visibility
into the protection coverage of your
cloud environment. You can now review
the resources discovered through Cloud
Discovery and compare them with the
defenders that have been deployed.
• Vulnerability Trends— With this widget
you can now track the impacted resources
for vulnerabilities discovered and resolved
Prisma™ Cloud Release Notes 259 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
API Ingestions
devops-guru:DescribeServiceInteg
ration
• kinesisanalytics:ListApplicat
ions
• kinesisanalytics:DescribeAppl
ication
Prisma™ Cloud Release Notes 260 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
kinesisanalytics:List
Applications
permission.
You must add the permissions
manually or use CFT template to
update the following permissions:
• kinesisanalytics:Li
stApplications
• kinesisanalytics:De
scribeApplication
account:GetAlternateContact
• Microsoft.Web/serverfarms/sit
es/read
Microsoft.VisualStudio/Account/
Read
Prisma™ Cloud Release Notes 261 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.BotService/botServices
/read
Microsoft.Chaos/experiments/read
Microsoft.ConfidentialLedger/led
gers/read
Microsoft.Security/iotSecuritySo
lutions/read
Microsoft.Kusto/Clusters/read
Microsoft.LabServices/labs/read
Prisma™ Cloud Release Notes 262 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.Logic/integrationAccou
nts/read
• Microsoft.Storage/storageAcco
unts/listKeys/action
Microsoft.Synapse/workspaces/re
ad
Microsoft.Network/virtualWans/r
ead
Microsoft.VideoIndexer/accounts/
read
Microsoft.Web/staticSites/Read
Prisma™ Cloud Release Notes 263 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• notebooks.instances.list
• notebooks.instances.checkUpgr
adability
• notebooks.instances.getHealth
• notebooks.instances.getIamPol
icy
• workflows.workflows.list
New Policies
No new policies in 22.10.2.
Policy Updates
See Prisma Cloud Known Issues for a policy status change issue that may affect you.
Prisma™ Cloud Release Notes 264 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
FEATURE DESCRIPTION
Resource ID Update for Google Cloud Armor The resource ID is updated in the backend
for gcloud-armor-security-policy API in
Prisma Cloud. Due to this, all the resources
for gcloud-armor-security-policy will be
deleted once and then regenerated on the
management console.
Existing alerts corresponding to this resource
is resolved as Resource_Updated, and
new alerts will be generated against policy
violations.
Impact— You may notice a reduced count
for the number of alerts. However, the alert
count will return to the original numbers once
the resources for gcloud-armor-security-
policy start ingesting data again
CHANGE DESCRIPTION
Prisma™ Cloud Release Notes 265 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Permission Group APIs The following new endpoints are available for
Permission Group APIs:
• Get an existing Permission
Group By ID -https://prisma.pan.dev/
api/cloud/cspm/permission-
groups#operation/get_1[GET /authz/v1/
permission_group/{id}]
• Update an existing Permission
Group - PUT /authz/v1/
permission_group/{id}
• Delete an existing Permission
Group by ID - DELETE /authz/v1/
permission_group/{id}
• Get all existing Permission
Groups - GET /authz/v1/
permission_group
• Add a new Custom Permission
Group - POST /authz/v1/
permission_group
• Get a list of active features -
GET /authz/v1/feature
New Features
FEATURE DESCRIPTION
Update Default Alert Rule To reduce Alert fatigue, the default alert
rule now includes only the Prisma Cloud
Recommended OOTB policies, for Prisma
Prisma™ Cloud Release Notes 266 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma_Cloud
label.
API Ingestions
• macie2:GetMacieSession
• macie2:GetRevealConfiguration
• macie2:GetFindingsPublication
Configuration
• memorydb:DescribeParameterGro
ups
• memorydb:ListTags
• memorydb:ListTags
Prisma™ Cloud Release Notes 267 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• CatalogId
• RegionId
Microsoft.DocumentDB/cassandraCl
usters/read
Microsoft.DevTestLab/schedules/
read
Microsoft.DigitalTwins/digitalTw
insInstances/read
Microsoft.EventGrid/domains/read
Microsoft.HealthcareApis/workspa
ces/read
Prisma™ Cloud Release Notes 268 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.HealthBot/healthBots/
Read
Microsoft.IoTCentral/IoTApps/re
ad
Microsoft.Devices/iotHubs/Read
Microsoft.LoadTestService/loadTe
sts/read
Microsoft.Solutions/applications
/read
Microsoft.Maps/accounts/read
Prisma™ Cloud Release Notes 269 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.MixedReality/ObjectAnc
horsAccounts/read
Microsoft.NetworkFunction/azureT
rafficCollectors/read
Microsoft.Orbital/spacecrafts/r
ead
Microsoft.Migrate/moveCollection
s/read
Microsoft.StorSimple/managers/r
ead
Prisma™ Cloud Release Notes 270 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.StreamAnalytics/cluste
rs/Read
Microsoft.TestBase/testBaseAccou
nts/read
Microsoft.TimeSeriesInsights/env
ironments/read
Microsoft.SignalRService/WebPubS
ub/read
compute.autoscalers.list
• dataplex.lakes.list
• dataplex.environments.list
Prisma™ Cloud Release Notes 271 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• dataplex.environments.getIamP
olicy
• dataplex.lakes.list
• dataplex.zones.list
• dataplex.zones.getIamPolicy
New Policies
No new policies for 22.10.1.
Policy Updates
No policy updates for 22.10.1.
Support for CIS Microsoft Azure Foundations Support is now available for CIS Azure
Benchmark v1.5.0 - Level 1 and Level 2 Foundations Benchmark version 1.5.0. It is a
compliance standard for securing Microsoft
Azure resources. This benchmark provides
prescriptive guidelines for configuring Azure
services in accordance with industry best
practices.
Support for CIS Amazon Web Services Support is now available for CIS Amazon Web
Foundations Benchmark v1.5.0 - Level 1 and Services Foundations Benchmark version
Level 2 1.5.0. This benchmark provides prescriptive
guidance for configuring security options
for a subset of Amazon Web Services on
foundational, testable, and architecture-
agnostic settings.
Support for Fedramp Moderate and Low Support is now available for Federal Risk
Control Standards and Authorization Management Program
Prisma™ Cloud Release Notes 272 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
FEATURE DESCRIPTION
Global Region Support for Google API Keys Prisma Cloud now provides global region
support for gcloud-api-key. Due to this, all
the resources will be deleted once, and then
regenerated on the management console.
Existing alerts corresponding to these
resources are resolved as Resource_Updated,
and new alerts will be generated against
policy violations.
Impact—*You may notice a reduced count
for the number of alerts. However, the alert
count will return to the original numbers
once theresources for *gcloud-api-key start
ingesting data again.
Prisma™ Cloud Release Notes 273 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
GA Prisma Cloud Data Security—Support for Prisma Cloud now supports data security
Azure Subscription for your Azure Subscription accounts. After
configuring Prisma Cloud Data Security for
Azure, you can discover and classify data
stored in Azure Blob Storage and protect
accidental exposure, misuse, or sharing of
sensitive data.
You can set up Forward and Backward scan
to scan your Azure resources for data security
issues. You can also set up a custom scan or
choose to scan all objects.
Prisma Cloud supports the following file types
and size for Azure:
• For data classification scanning the file size
must be less than 20MB
• For malware scanning the file size must be
less than 20MB
• Exposure evaluation for all file types.
Prisma Cloud provides out-of-the-box policies
to detect sensitive blobs exposed in public
storage accounts and malware blobs in Azure
Blob storage accounts.
Prisma™ Cloud Release Notes 274 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Update Prisma Cloud Data Security for AWS Prisma Cloud can now scan .tsv types of file
—New File Extension Supported for Data extensions on your storage buckets for data
Classification Scanning classification.
Update Prisma Cloud Data Security for AWS Prisma Cloud displays s3:GetObject missing
—New Missing Permission permission on the Data Security Settings page
when your AWS bucket has KMS encryption
enabled and Prisma Cloud does not have
access to the bucket. You can resolve the
issue and then configure data security for that
bucket.
API Ingestions
• datasync:ListLocations
• datasync:DescribeLocationSmb
• datasync:DescribeLocationSmb
• datasync:DescribeLocationFsxO
penZfs
Prisma™ Cloud Release Notes 275 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• datasync:DescribeLocationFsxW
indows
• datasync:DescribeLocationS3
• datasync:DescribeLocationObje
ctStorage
• datasync:DescribeLocationFsxO
ntap
• datasync:ListTagsForResource
• datasync:ListTasks
• datasync:DescribeLocationHdfs
• datasync:DescribeLocationFsxL
ustre
• datasync:DescribeLocationNfs
• qldb:DescribeLedger
• qldb:ListTagsForResource
• translate:GetTerminology
Prisma™ Cloud Release Notes 276 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
translate:ListTerminologies
Microsoft.Advisor/configurations
/read
Microsoft.AnalysisServices/serve
rs/read
Microsoft.AppConfiguration/confi
gurationStores/read
Microsoft.Automanage/configurati
onProfiles/Read
microsoft.app/containerapps/read
Prisma™ Cloud Release Notes 277 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.Communication/Communic
ationServices/Read
Microsoft.Compute/cloudServices/
read
• Microsoft.Compute/cloudServic
es/roleInstances/read
• Microsoft.Compute/virtualMach
ineScaleSets/virtualMachines/
networkInterfaces/ipConfigura
tions/publicIPAddresses/read
Microsoft.Compute/hostGroups/re
ad
Microsoft.HybridCompute/machines
/read
Prisma™ Cloud Release Notes 278 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.Dashboard/grafana/read
Microsoft.AzureStackHCI/Clusters
/Read
Microsoft.Network/publicIPPrefix
es/read
• dataproc.autoscalingPolicies.
getIamPolicy
• dataplex.lakes.list
• dataplex.lakes.getIamPolicy
Prisma™ Cloud Release Notes 279 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
recommender.iamPolicyLateralMove
mentInsights.list
New Policies
See the look ahead updates for planned features and policy updates for 22.10.1
AWS ElastiCache Memcached cluster with in- Identifies AWS ElastiCache Memcached
transit encryption disabled clusters that have in-transit encryption
disabled. It is highly recommended to
implement in-transit encryption in order to
protect data from unauthorized access as it
travels through the network, between clients
and cache servers. Enabling data encryption
in-transit helps to prevent unauthorized
users from reading sensitive data between
your Memcached and their associated cache
storage systems.
Azure SQL server Transparent Data Identifies SQL servers in which Transparent
Encryption (TDE) encryption disabled Data Encryption (TDE) is disabled. TDE
encryption performs real-time encryption
and decryption of the server, related
reinforcements, and exchange log records
without requiring any changes to the
application. It is recommended to have TDE
encryption on your SQL servers to protect the
server from malicious activity.
Prisma™ Cloud Release Notes 280 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
json.rule = ['sqlServer'].
['properties.state'] equal
ignore case Ready and
sqlEncryptionProtectors[*].kind
does not exist
Azure VM OS disk is not configured with any Identifies VM OS disks that are not configured
encryption with any encryption. Azure offers Server-
Side Encryption (SSE) with platform-managed
keys [SSE with PMK] by default for managed
disks. It is recommended to enable default
encryption or you may optionally choose to
use a customer-managed key to protect from
malicious activity.
Azure data disk is not configured with any Identifies VM data disks that are not
encryption configured with any encryption. Azure offers
Server-Side Encryption (SSE) with platform-
managed keys [SSE with PMK] by default for
managed disks. It is recommended to enable
default encryption or you may optionally
choose to use a customer-managed key to
protect from malicious activity.
GCP KMS crypto key is anonymously Identifies GCP KMS crypto keys that are
accessible anonymously accessible. Granting permissions
to 'allUsers' or 'allAuthenticatedUsers' allows
Prisma™ Cloud Release Notes 281 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP Cloud Run service is publicly accessible Identifies GCP Cloud Run services that
are publicly accessible. Granting Cloud
Run Invoker permission to 'allUsers' or
'allAuthenticatedUsers' allows anyone to
access the Cloud Run service over internet.
Such access might not be desirable if sensitive
data is stored at the location. As security
best practice it is recommended to remove
public access and assign the least privileges
to the GCP Cloud Run service according to
requirements.
GCP Log metric filter and alert does not exist Identifies GCP accounts which do not
for VPC network route patch and insert have a log metric filter and alert for VPC
network route patch and insert events.
Monitoring network routes patching and
insertion activities will help in identifying VPC
traffic flows through an expected path. It is
recommended to create a metric filter and
Prisma™ Cloud Release Notes 282 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP Log metric filter and alert does not exist Identifies GCP accounts which do not
for VPC network route delete and insert have a log metric filter and alert for VPC
network route delete and insert events.
Monitoring network routes deletion and
insertion activities will help in identifying
VPC traffic flows through an expected path.
It is recommended to create a metric filter
and alarm to detect activities related to the
deletion and insertion of VPC network routes.
Prisma™ Cloud Release Notes 283 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
contain "resource.type
=" or $.X.filter does not
contain "resource.type=" )
and ( $.X.filter does not
contain "resource.type !
=" and $.X.filter does not
contain "resource.type!=" ) and
$.X.filter contains "gce_route"
and ( $.X.filter contains
"protoPayload.methodName:"
or $.X.filter contains
"protoPayload.methodName :" )
and ( $.X.filter
does not contain
"protoPayload.methodName!:"
and $.X.filter does not contain
"protoPayload.methodName !:" )
and $.X.filter contains
"compute.routes.delete"
and $.X.filter contains
"compute.routes.insert"'; show
X; count(X) less than 1
Policy Updates
Policy Updates—RQL
Azure Function App doesn’t redirect HTTP to Changes— The policy RQL is enhanced to
HTTPS check for apps that are in the Running state
and to increase accuracy of alerts.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 284 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure Function App doesn’t use HTTP 2.0 Changes— The policy RQL is enhanced to
check for apps that are in the Running state
and to increase accuracy of alerts.
Current RQL—
Updated RQL—
Azure Function App authentication is off Changes— The RQL has been updated to
check apps with status 'RUNNING'. The
recommendation steps have also been
updated to match the latest UI changes.
Current RQL—
Prisma™ Cloud Release Notes 285 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Azure Function App client certificate is Changes— The RQL has been updated to
disabled check apps with status 'RUNNING'.
Current RQL—
Updated RQL—
Azure Function App doesn’t use latest TLS Changes— The RQL has been updated to
version check apps with status 'RUNNING'.
Current RQL—
Prisma™ Cloud Release Notes 286 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Azure Function App doesn’t have a Managed Changes— The RQL has been updated to
Service Identity check apps with status 'RUNNING'. The
recommendation steps have also been
updated to match the latest UI changes.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 287 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure SQL Server audit log retention is less Changes— The policy RQL and
than 91 days recommendation steps have been updated to
check for only storage account log retention
because log retention cannot be set for other
log destinations.
Current RQL—
Updated RQL—
Policy Updates—Metadata
Azure App Service Web app client certificate Changes— The policy recommendation steps
is disable have been updated to include precise steps.
Impact— No impact on alerts.
Azure SQL server TDE protector is not Changes— The policy recommendation steps
encrypted with BYOK (Use your own key) have been updated.
Impact— No impact on alerts.
Azure App Service Web app doesn’t use Changes— The policy description and
latest Python version recommendation steps have been updated to
reflect the CSP UI changes.
Prisma™ Cloud Release Notes 288 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure App Service Web app doesn’t use Changes— The policy description and
latest PHP version recommendation steps have been updated to
reflect the CSP UI changes.
Updated Description— Identifies App Service
Web apps that are not configured with latest
PHP version. Periodically, newer versions
are released for PHP software either due
to security flaws or to include additional
functionality. It is recommended to use the
latest PHP version for web apps in order to
take advantage of security fixes, if any.
Impact— No impact on alerts.
Azure App Service Web app doesn’t use Changes— The policy description and
latest .Net Core version recommendation steps have been updated to
reflect the CSP UI changes.
Updated Description— Identifies App Service
Web apps that are not configured with
latest .Net Core version. Periodically, newer
versions are released for .Net Core software
either due to security flaws or to include
additional functionality. It is recommended
to use the latest .Net version for web apps in
order to take advantage of security fixes, if
any.
Impact— No impact on alerts.
Azure Resource Group does not have a Changes— The policy recommendation steps
resource lock have been updated.
Impact— No impact on alerts.
If you have enabled the Code Security subscription on Prisma Cloud, see Code Security -
Features Introduced in September 2022 for details on new Configuration Build policies and
updates to add build rules for existing Configuration Run policies.
Prisma™ Cloud Release Notes 289 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
FEATURE DESCRIPTION
Access to Data for Deleted Assets The ability to view and investigate data
for assets that have been deleted in cloud
First announced in 22.4.1 and updated in
accounts which are onboarded to Prisma
22.8.1 to list the new API.
Cloud will be available for up to 90 days
after asset deletion. This is a change from the
current behavior where you had access to
the historical data for deleted assets, starting
from the time you onboarded the account on
Prisma Cloud.
To align with this change, Prisma Cloud will
limit the time range filters to 90 days of
history. To support use cases where further
retention is required, a new API end point
is available to Prisma Cloud users with the
System Admin role to retrieve deleted asset
records. For API details, see GET/config/api/
v1/tenant/{prisma_id}/archiveList.
Prisma™ Cloud Release Notes 290 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
Top Priority Security Risks View with The Command Center Dashboard provides
Command Center you with a unified view of the top cloud
security incidents and risks discovered across
all the assets monitored by Prisma Cloud,
grouped by the following threat vectors:
• Incidents
• Misconfigurations
• Exposures
• Identity Risks
• Data Risks
Customizable filters allow you to isolate
threat activity by time range, asset and
account groups for further investigation. Now
your security team has the actionable insight
you need to resolve the highest priority
incidents, and risks across all your cloud
resources.
Prisma™ Cloud Release Notes 291 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
IAM Security Supports AWS Permission Prisma Cloud’s IAM security module algorithm
Boundaries now supports AWS Permission Boundaries in
the Net Effective Permissions calculations, to
help you better identify when a permission
was last used.
Cloud Network Analyzer Support for Azure Prisma Cloud now supports network exposure
queries on Azure cloud environments.
You can now calculate the net effective
reachability for virtual machines or PaaS
service in Azure.
Update Azure Onboarding Permission If you are using Custom role while onboarding
your Azure account, as per Microsoft’s
recommendation, you need to add
Microsoft.Network/networkWatchers/
queryFlowLogStatus/* in order to provide
read-only permission to query flow log status
in Network Watcher.
API Ingestions
amplify:ListApps
• globalaccelerator:ListAcceler
ators
Prisma™ Cloud Release Notes 292 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• globalaccelerator:DescribeAcc
eleratorAttributes
route53:ListQueryLoggingConfigs
• Microsoft.HDInsight/clusters/
applications/read
Microsoft.Subscription/Policies/
default/read
dlp.storedInfoTypes.list
Prisma™ Cloud Release Notes 293 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
recommender.iamPolicyLateralMove
mentInsights.list
• dataproc.workflowTemplates.ge
tIamPolicy
• inspect mysql-instances
New Policies
See the look ahead updates for planned features and policy updates for 22.9.2.
AWS SQS Queue not configured with server Identifies AWS SQS queues which are not
side encryption configured with server side encryption.
Enabling server side encryption would encrypt
all messages that are sent to the queue
and the messages are stored in encrypted
form. Amazon SQS decrypts a message only
when it is sent to an authorized consumer.
It is recommended to enable server side
encryption for AWS SQS queues in order to
protect sensitive data in the event of a data
breach or malicious users gaining access to
the data.
Prisma™ Cloud Release Notes 294 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
attributes.KmsMasterKeyId
does not exist and
attributes.SqsManagedSseEnabled
is false
Azure MySQL (PaaS) instance reachable from Identifies Azure MySQL (PaaS) instances
untrust internet source on TCP port 3306 that are internet reachable from an untrust
internet source on TCP port 3306. MySQL
(PaaS) instances with untrusted access to the
internet may enable bad actors to use brute
force on a system to gain unauthorized access
to the entire network. As a best practice,
restrict traffic from untrusted IP addresses
and limit access to known hosts, services, or
specific entities.
Azure VM instance in running state that is Identifies Azure VM instances in running state
internet reachable with unrestricted access that is internet reachable with unrestricted
(0.0.0.0/0) other than HTTP/HTTPS port access (0.0.0.0/0) other than HTTP/HTTPS
port. VM instances with unrestricted access
Prisma™ Cloud Release Notes 295 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP BigQuery Dataset not configured with Identifies BigQuery Datasets that are not
default CMEK configured with default CMEK. Setting a
Default Customer-Managed Encryption
Key (CMEK) for a data set ensures any
tables created in the future will use the
specified CMEK if none other is provided. It
is recommended to configure all BigQuery
Datasets with default CMEK.
GCP Cloud Function is publicly accessible Identifies GCP Cloud Functions that are
publicly accessible. Allowing 'allusers' /
'allAuthenticatedUsers' to cloud functions
can lead to unauthorized invocation of the
functions or unwanted access to sensitive
information. It is recommended to follow the
least privileged access policy and grant access
restrictively.
Prisma™ Cloud Release Notes 296 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 297 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 298 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 299 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 300 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Policy Updates
Policy Updates—RQL
AWS ElastiCache Redis with in-transit Changes— The policy RQL has been updated
encryption disabled (Non-replication group) to report only AWS Redis resources. Due
to the ingestion of Memcached clusters,
the policy was listing Memcached resources
along with AWS ElastiCache Redis, which did
not have in-transit encryption enabled and
resulted in false positive alerts.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 301 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
AWS RDS minor upgrades not enabled *Changes—*The policy RQL has been updated
to ignore false positive alerts for AWS
DocumentDB and NeptuneDB.
Current RQL—
Updated RQL—
AWS SNS topic policy overly permissive for Changes— The policy RQL has been updated
publishing to ignore condition statement check in the
RQL.
Current RQL—
Prisma™ Cloud Release Notes 302 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
AWS CloudFront web distribution that allow Changes— The policy name, description,
TLS versions 1.0 or lower and RQL are updated to match latest
recommended TLS version.
Current Policy Name— AWS CloudFront web
distribution that allow TLS versions 1.0 or
lower
Updated Policy Name— AWS CloudFront
web distribution using insecure TLS version
Updated Description— Identifies AWS
CloudFront web distributions which
are configured with TLS versions for
HTTPS communication between viewers
and CloudFront. As a best practice, use
recommended TLSv1.2_2021 as the
minimum protocol version in your CloudFront
distribution security policies.
Current RQL—
Prisma™ Cloud Release Notes 303 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
viewerCertificate.minimumProtocolVersion
equals TLSv1_2016)'
Updated RQL—
AWS ElastiCache Redis with in-transit Changes— The policy RQL has been updated
encryption disabled (Non-replication group) to report only AWS Redis resources. Due
to the ingestion of Memcached clusters,
the policy was listing Memcached resources
along with AWS ElastiCache Redis, which did
not have in-transit encryption enabled and
resulted in false positive alerts.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 304 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
AWS RDS minor upgrades not enabled Changes— The policy RQL has been updated
to ignore false positive alerts for AWS
DocumentDB and NeptuneDB.
Current RQL—
Updated RQL—
AWS SNS topic policy overly permissive for Changes— The policy RQL has been updated
publishing to ignore condition statement check in the
RQL.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 305 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
json.rule = Policy.Statement[?
any(Effect equals Allow and
(Principal.AWS equals * or
Principal equals *) and (Action
contains SNS:Publish or Action
contains sns:Publish) and
(Condition does not exist or
Condition all empty))] exists
AWS CloudFront web distribution that allow Changes— The policy name, description,
TLS versions 1.0 or lower and RQL are updated to match latest
recommended TLS version.
Current Policy Name— AWS CloudFront web
distribution that allow TLS versions 1.0 or
lower
Updated Policy Name— AWS CloudFront
web distribution using insecure TLS version
Updated Description— Identifies AWS
CloudFront web distributions which
are configured with TLS versions for
HTTPS communication between viewers
and CloudFront. As a best practice, use
recommended TLSv1.2_2021 as the
minimum protocol version in your CloudFront
distribution security policies.
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 306 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
viewerCertificate.minimumProtocolVersion
does not equal TLSv1.2_2021
AWS ElastiCache Redis with in-transit Changes— The policy RQL has been updated
encryption disabled (Non-replication group) to report only AWS Redis resources. Due
to the ingestion of Memcached clusters,
the policy was listing Memcached resources
along with AWS ElastiCache Redis, which did
not have in-transit encryption enabled and
resulted in false positive alerts.
Current RQL—
Updated RQL—
AWS RDS minor upgrades not enabled Changes— The policy RQL has been updated
to ignore false positive alerts for AWS
DocumentDB and NeptuneDB.
Current RQL—
Prisma™ Cloud Release Notes 307 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Policy Updates—Metadata
GCP PostgreSQL instance database flag Changes— The policy recommendation steps
log_connections is disabled have been updated to reflect the latest CSP
changes.
Impact— No impact on existing alerts.
GCP Kubernetes Engine Clusters have Binary Changes— Updated policy recommendation
authorization disabled steps to reflect the latest CSP changes.
Impact— No impact on existing alerts.
GCP Log bucket retention policy is not Changes— Updated policy recommendation
configured using bucket lock steps to reflect the latest CSP changes.
Impact— No impact on existing alerts.
FEATURE DESCRIPTION
Region Support for Google Compute Engine Region support for gcp-compute-disk-list API
is enabled on Prisma Cloud.
Due to this, all the resources for gcp-
compute-disk-list are deleted once and then
regenerated on the management console.
Existing alerts corresponding to these
resources are resolved as Resource_Updated,
and new alerts are generated against policy
violations.
Impact— You may notice a reduced count
for the number of alerts. However, the alert
Prisma™ Cloud Release Notes 308 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CHANGE DESCRIPTION
Licensing APIs The following new endpoints are available for Licensing
APIs:
• Usage Count By Cloud Type V2 - POST /license/
api/v2/usage - This is a new Licensing API that allows
you to get paginated usage data in the response object
for the selected cloud types.
• Resource Usage Over Time V2 - POST /license/
api/v2/time_series - This is a new Licensing API that
allows you to get a breakdown of resource usage over
time.
Alert Rules APIs The following Alert Rules APIs are updated with a new
filter called Alert Rule Policy Filter , which allows
you to filter alerts based on policy severity, policy label,
cloud type, and compliance standard:
• List Alert Rules V2 - GET /v2/alert/rule
• Add an Alert Rule - POST /alert/rule
• Get Alert Rule by ID - GET /alert/rule/{id}
• Update Alert Rule - PUT /alert/rule/{id}
Prisma™ Cloud Release Notes 309 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
Customized Views for Alert Prioritization Saved views on Prisma Cloud simplifies the
challenge of prioritizing alerts. With Saved
Views, alerts are organized into appropriate
threat vector categories so that your teams
can focus on what matters the most. The
8 default views are Overview, Incidents,
Exposure, Vulnerabilities, Misconfigurations,
CIEM, Malware, and Data, and you can
choose to enable or disable these.
Each view includes preset filters that display
the most relevant alerts for the category.
As an example, the Exposure saved view
provides a look at all of the internet exposure
alerts. In addition, you can filter on the most
important alert criteria to create your own
Saved Views, and choose the visualizations
and the default sort order of the tabular data.
Alert Rules Policies Filter The new Add Filter option helps you select
policies easily based on Policy Severity, Cloud
Prisma™ Cloud Release Notes 310 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Update Prisma Cloud Data Security—New Prisma Cloud can now scan the following
File Extensions Supported for Malware types of file extensions on your storage
Scanning buckets for malware:
• .rar
• .zip
• .7z
Prisma™ Cloud Release Notes 311 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• appmesh:DescribeMesh
• appmesh:ListTagsForResource
• appmesh:DescribeVirtualGatewa
y
• appmesh:ListMeshes
• appmesh:ListTagsForResource
• states:DescribeStateMachine
• states:ListTagsForResource
Azure HDInsight
azure-hdinsight-cluster
Additional permission required:
Prisma™ Cloud Release Notes 312 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.HDInsight/clusters/re
ad
• Microsoft.Management/manageme
ntGroups/descendants/read2 (S
cope: Tenancy / Root Manageme
nt level)
"Microsoft.Resources/
subscriptions/read"
• Microsoft.PowerBIDedicated/ca
pacities/read
Prisma™ Cloud Release Notes 313 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• Microsoft.Synapse/workspaces/
read
• Microsoft.Synapse/workspaces/
sparkConfigurations/read
dlp.inspectTemplates.list
dlp.deidentifyTemplates.list
dlp.jobTriggers.list
api.name = gcloud-storage-bucket
s-list
Prisma™ Cloud Release Notes 314 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Prisma™ Cloud Release Notes 315 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
If you have enabled the Code Security subscription on Prisma Cloud, see Code Security-
Features Introduced in August 2022 for details on new Configuration Build policies.
Support for CIS GKE version 1.2.0 Support is now available for Center for Internet
Security (CIS) benchmark for Google Kubernetes
Engine (GKE) version 1.2.0. This benchmark includes
a set of recommendations for configuring GKE
version 1.2 to support a strong security posture.
CHANGE DESCRIPTION
Add Entries to Anomaly Trusted A new Anomaly Trusted List API endpoint is now
List available. It enables you to add one or more entries to
the Anomaly Trusted List.
POST /anomalies/trusted_list
Prisma™ Cloud Release Notes 316 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
• appflow:ListFlows
Amazon Grafana
aws-grafana-workspace
Additional permissions required:
• grafana:DescribeWorkspace
• grafana:DescribeWorkspaceAuth
entication
Prisma™ Cloud Release Notes 317 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• grafana:ListWorkspaces
Amazon Transcribe
aws-transcribe-language-model
Additional permissions required:
• transcribe:ListLanguageModels
• transcribe:ListTagsForResourc
e
Application.Read.All
dlp.inspectTemplates.list
dlp.deidentifyTemplates.list
cloudconfig.configs.get
Prisma™ Cloud Release Notes 318 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• identity{}
Change in Existing Behaviour Support for If you have custom policies on Prisma
SES Identities Attached with a Single Identity Cloud using aws-ses-identities API where
Policy policies is used in its RQL, new alerts are
generated for the SES identity resources that
have only a single identity policy attached.
Impact— Medium. New alerts are generated
based on the resource configuration.
Change in Existing Behavior Region Names on You can now see the correct Region Names
Investigate Page for gcloud-container-describe-clusters and
gcloud-redis-instances-list resources on the
Investigate page.
Impact— The existing alerts for these policies
are resolved as Resource_Updated and new
alerts will be generated based on the resource
configuration.
Prisma™ Cloud Release Notes 319 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 320 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 321 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 322 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 323 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
['uefiSettings'].['vTpmEnabled']
is false
Prisma™ Cloud Release Notes 324 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 325 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for HITRUST CSF v9.6.0 HITRUST CSF is a framework designed and
built to streamline regulatory compliance
through a common set of security controls
mapped to various standards such as
HIPAA, NIST, HITECH, and others, to enable
organizations, particularly healthcare, to
achieve and maintain full compliance. The
Prisma™ Cloud Release Notes 326 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for DFS 23 NYCRR 500 The New York DFS Cybersecurity Regulations
(23 NYCRR 500) are a new set of regulations
by the New York Department of Financial
Services (NYDFS) that imposes new
cybersecurity requirements on all covered
financial institutions.
These regulations are designed to ensure
your organization can effectively protect
your customers' confidential information
from cyberattacks. These include conducting
regular security risk assessments, keeping
audit trails of asset use, providing defensive
infrastructures, maintaining policies and
procedures for cyber security, and creating an
incident response plan.
Violation of these regulations can result in
fines of up to US$250,000 or one percent of
total bank assets.
CHANGE DESCRIPTION
Alert Response Count Updates The alert count limit (maximum number of items that
will be returned) in one response is 10,000 for the
following Alerts APIs:
• POST - /v2/alert
• GET - /v2/alert
Prisma™ Cloud Release Notes 327 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• POST - /alert
• GET - /alert
Bulk Export Resource Archives The new Data Service API endpoint is now available. It
allows you to retrieve resource archives from AWS S3
for the required time period.
GET /config/api/v1/tenant/{prisma_id}/archiveList
New Features
Feature Description
Prisma™ Cloud Release Notes 328 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
IAM Graph View IAM graph view helps you visualize the
relationships between the source, granter,
Applies only if you have activated the IAM
and destination so that you can answer the
Security subscription on Prisma Cloud
questions such as who has access to your
resource and how was the access granted?
This view enables you to review the
permissions and fix any excessive access
privileges. The interactive graph view also
enables you to update the relationships using
the visualization, and the corresponding RQL
is updated automatically.
Prisma™ Cloud Release Notes 329 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for GCP on IAM Security IAM Security on Prisma Cloud now supports
enhanced capabilities to calculate effective
Applies only if you have activated the IAM
permissions, detect overly permissive
Security subscription on Prisma Cloud
access, and suggest corrections to reach
the least privilege entitlements in your GCP
environments. It includes out-of-the-box
policies that govern IAM best practices to
help you identify risky permissions and get to
the ideal set of privileges for your deployment
in GCP.
After you use the cloud account onboarding
Terraform template to onboard your GCP
cloud account on Prisma Cloud and activate
the IAM Security subscription, complete the
instructions in Grant permissions for Ingesting
Google Workspace Groups.
Prisma™ Cloud Release Notes 330 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Top Alerts View by MITRE ATT&CK Tactics You can now quickly identify the most critical
issues that you need to address, by leveraging
the MITRE ATT&CK framework in the Top
Incidents and Risks widget on the Alerts
Overview. Prisma Cloud detects cloud risks (a
misconfiguration with potential future impact)
and incidents (an undesirable event which has
happened) in real time and automatically maps
every alert to the appropriate MITRE ATT&CK
Tactic. Toggle View by MITRE ATT&CK to
prioritize your incident response based on
tactics instead of the default view of alerts
listed with policy names.
Prisma™ Cloud Release Notes 331 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• "apprunner:ListServices""apprunner:DescribeCustomDom
• apprunner:DescribeService"
To the PrismaCloud-Remediation-Compute-
Policy-AgentlessScanning, the following
statement is added:
{ "Sid":
"PCCAgentlessServiceLinkedRole",
"Effect": "Allow", "Action":
"iam:CreateServiceLinkedRole",
"Resource":
"arn:aws:iam::*:role/aws-
service-role/spot.amazonaws.com/
*", "Condition": {"StringLike":
{"iam:AWSServiceName":
"spot.amazonaws.com"}}}
GCP
Artifact Registry Scanning permissions
are added to both the Monitor mode, and
Monitor and Protect mode Terraform
templates.
And the compute_role_permissions_org has
these additional actions
• "iam.serviceAccounts.list"
• "compute.instances.setLabels"
• "compute.snapshots.create"
• "compute.snapshots.delete"
• "compute.snapshots.setLabels"
Change in Existing Behavior Last Access The number of results for last access
Results destinations, to show when a permission was
Prisma™ Cloud Release Notes 332 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Change in Existing Behavior Region Support Prisma Cloud enables region support for
for Google App Engine gcloud-app-engine-application.
Due to this, all the resources for gcloud-app-
engine-application are deleted once, and then
regenerated on the management console.
Existing alerts corresponding to these
resources are resolved as Resource_Updated,
and new alerts will be generated against
policy violations.
Impact— You may notice a reduced count
for the number of alerts. However, the alert
Prisma™ Cloud Release Notes 333 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Change in Existing Behavior Update Custom If you have created custom policies that use
Policies RQL to Include Crypto Keys the gcloud-kms-keyring-list API in
Metadata from the New API RQL to include Crypto Keys metadata, you
must perform the following steps to ensure
This change was part of the 22.7.1 Hotfix the accuracy of alerts:
release.
• Clone the affected custom policy to create
a new custom policy.
• Update the RQL of the cloned custom
policy to use the new gcloud-kms-
crypto-keys-list API by replacing the
existing gcloud-kms-keyring-list
API.
• Add the new custom policy with the
updated RQL to the alert rule.
• Delete the original custom policy that
was affected by the change.If you
had mapped the custom policy to any
compliance standards on Prisma Cloud, this
workflow ensures that the new policy is
automatically mapped.
Impact— No impact on alerts.
• apprunner:ListAutoScalingConf
igurations
• appstream:ListTagsForResource
Amazon AppRunner
aws-apprunner-service
Prisma™ Cloud Release Notes 334 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• apprunner:DescribeCustomDomai
ns
• apprunner:DescribeService
• apprunner:ListTagsForResource
Amazon IoT
aws-iot-account-audit-configuration
Additional permission required:
iot:DescribeAccountAuditConfigur
ation
Amazon IoT
aws-iot-domain-configuration
Additional permissions required:
• iot:DescribeDomainConfigurati
on
• iot:ListDomainConfigurations
• iot:ListTagsForResource
Azure Purview
azure-purview-default-account
Additional permissions required:
• Microsoft.Purview/accounts/re
ad
• Microsoft.Purview/getDefaultA
ccount/read
Prisma™ Cloud Release Notes 335 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• Microsoft.Resources/subscript
ions/read
Azure Storage
azure-storage-account-blob-diagnostic-
settings
Additional permissions required:
• Microsoft.Storage/storageAcco
unts/read
• Microsoft.Storage/storageAcco
unts/blobServices/read
• Microsoft.Storage/storageAcco
unts/providers/Microsoft.Insi
ghts/diagnosticSettings/read
Azure Storage
azure-storage-account-file-diagnostic-
settings
Additional permissions required:
• Microsoft.Storage/storageAcco
unts/read
• Microsoft.Storage/storageAcco
unts/fileServices/read
• Microsoft.Storage/storageAcco
unts/providers/Microsoft.Insi
ghts/diagnosticSettings/read
Azure Storage
azure-storage-account-queue-diagnostic-
settings
Additional permissions required:
• Microsoft.Storage/storageAcco
unts/read
Prisma™ Cloud Release Notes 336 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• Microsoft.Storage/storageAcco
unts/queueServices/read
• Microsoft.Storage/storageAcco
unts/providers/Microsoft.Insi
ghts/diagnosticSettings/read
Azure Storage
azure-storage-account-table-diagnostic-
settings
Additional permissions required:
• Microsoft.Storage/storageAcco
unts/read
• Microsoft.Storage/storageAcco
unts/tableServices/read
• Microsoft.Storage/storageAcco
unts/providers/Microsoft.Insi
ghts/diagnosticSettings/read
• networksecurity.authorization
Policies.getIamPolicy
• networksecurity.serverTlsPoli
cies.getIamPolicy
Prisma™ Cloud Release Notes 337 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• networksecurity.clientTlsPoli
cies.getIamPolicy
Prisma™ Cloud Release Notes 338 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 339 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
ionConfiguration.status equals D
ISABLED
Prisma™ Cloud Release Notes 340 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 341 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
automation-account' AND
json.rule = variable[?
any(properties.isEncrypted is
false)] exists
Prisma™ Cloud Release Notes 342 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 343 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 344 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 345 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
If you have enabled the Code Security subscription on Prisma Cloud, see Code Security-
Features Introduced in July 2022 for details on new Configuration Build policies, updates to
add build rules for existing Configuration Run policies, and policy deletions.
Support for CIS Google Cloud Platform The CIS Benchmarks provide a foundation for
Foundation Benchmark v1.3.0 establishing a strong security posture. The CIS
Benchmarks are a set of recommendations
and best practices to provide your
organization with a baseline of configurations
and policies to protect your applications,
infrastructure, and data.
The Center for Internet Security (CIS) has
released version 1.3.0 of Google Cloud
Platform Foundation Benchmarks. The
update adds 21 new benchmarks covering
best practices for securing Google Cloud
environments. The updates are broad in
scope, with recommendations covering
configurations and policies ranging from
Prisma™ Cloud Release Notes 346 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for CIS Oracle Cloud Infrastructure The Center for Internet Security (CIS) has
Foundations Benchmark v1.2.0 released version 1.2.0 of Oracle Cloud
Infrastructure Foundation Benchmarks.
CIS Oracle Cloud Infrastructure Foundations
Benchmark provides prescriptive guidance for
establishing a secure baseline configuration
for the Oracle Cloud Infrastructure
environment. The scope of this benchmark is
to establish a base level of security for anyone
utilizing the Oracle Cloud Infrastructure
services.
New Features
Feature Description
GA Cloud Asset Inventory (CAI) Support Prisma Cloud has adopted Google’s Cloud
Asset Inventory (CAI) service for a few GCP
services. The CAI service reduces the number
of API calls to GCP and helps speed the time
to report on assets on Prisma Cloud. CAI is
enabled by default on Prisma Cloud.
The following GCP services/APIs have CAI
support on Prisma Cloud:
• KMS (Get IAM policy, List Keyrings &
Cryptokeys)
• Pub-Sub (Get IAM policy)
• Dataproc (Get IAM policy)
• Cloud Function (Get IAM policy)
• Cloud Run (Get IAM policy)
Prisma™ Cloud Release Notes 347 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Change in Crypto Key Ingestions when CAI is There is a change with the ingestion of Crypto
Enabled Keys metadata in Google Cloud KMS when
CAI is enabled.
The gcloud-kms-keyring-list API no longer
includes the Crypto Keys metadata. This
metadata is now available as a part of the
gcloud-kms-crypto-keys-list API.
Impact— All the resources that were
ingested as a part of the gcloud-kms-
keyring-list API will no longer include the
Crypto Keys metadata, and all existing alerts
associated with this API are resolved as
Resource_Updated.
Anomaly Trusted List Support for IP-based When creating a trusted list for anomaly
Protocols policies, you can now suppress anomaly alerts
depending on IP-based protocols.
From the Settings > Anomalies > Anomaly
Settings, you can create a trusted list where
you can add one or more IP-based protocol
entries. You can choose the following
anomaly policy types to apply to the trusted
list:
Prisma™ Cloud Release Notes 348 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Update in JSON Metadata for Google Cloud Earlier, all the project resources for a gcloud-
Resource Manager organization-project-info API were stored
under a single json.
Now, all the project resources for gcloud-
organization-project-info API are stored as
separate json resources. For example, if your
organization has ten GCP projects, those
projects are stored as ten different resources
in json instead of a single resource.
There are no changes to the permissions of
this API.
Impact— The existing alerts for these
resources are resolved as Resource_Deleted.
Prisma Cloud Data Security—Support for Prisma Cloud now supports data classification
Large File Size scanning of .csv, .json, and .txt files of up to
2.5GB file size.
Prisma™ Cloud Release Notes 349 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• appstream:DescribeFleets
• appstream:ListTagsForResource
• appstream:ListTagsForResource
appstream:DescribeUsageReportSub
scriptions
Azure Purview
azure-purview-account
Additional permissions required:
• Microsoft.Purview/accounts/re
ad
• Microsoft.Purview/getDefaultA
ccount/read
• Microsoft.Purview/accounts/pr
ivateEndpointConnections/read
Azure Purview
azure-purview-privatelinkresource
Additional permission required:
Prisma™ Cloud Release Notes 350 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.Purview/accounts/priva
telinkresources/read
• artifactregistry.repositories
.list
• artifactregistry.repositories
.getIamPolicy
cloudasset.assets.searchAllIamPo
licies
cloudasset.assets.searchAllIamPo
licies
Prisma™ Cloud Release Notes 351 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
cloudasset.assets.searchAllIamPo
licies
Google Datastore
gcloud-datastore-index
Additional permission required:
datastore.indexes.list
cloudasset.assets.searchAllIamPo
licies
Google Pubsub
gcloud-pubsub-subscription
Additional permission required:
cloudasset.assets.searchAllIamPo
licies
Google Pubsub
gcloud-pubsub-topic
Additional permission required:
cloudasset.assets.searchAllIamPo
licies
Google Pubsub
Prisma™ Cloud Release Notes 352 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
gcloud-pubsub-snapshot
Additional permission required:
cloudasset.assets.searchAllIamPo
licies
Google Vertex AI
gcloud-vertex-ai-notebook-environment
Additional permissions required:
• notebooks.locations.list
• notebooks.environments.list
• read repos
OCI Certificate
oci-certificate-certificateauthorities
Additional permissions required:
• inspect certificate-authoriti
es
• read certificate-authorities
OCI Functions
Prisma™ Cloud Release Notes 353 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
oci-functions
Additional permissions required:
• inspect fn-function
• read fn-function
• read waas-address-list
Update API Ingestion—Amazon Route53 The following API is updated with additional
attributes; domain details and domain tags.
Amazon Route53
aws-route53-domain
Additional permissions required:
• route53domains:ListDomains
• route53domains:ListTagsForDom
ain
• route53domains:GetDomainDetai
l
Prisma™ Cloud Release Notes 354 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• cloudasset.assets.searchAllRe
sources
• cloudasset.assets.searchAllIa
mPolicies
• cloudasset.assets.searchAllIa
mPolicies
Prisma™ Cloud Release Notes 355 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 356 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 357 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
Updated RQL—
Prisma™ Cloud Release Notes 358 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
properties.publicNetworkAccess
equal ignore case Enabled and
firewallRules.value[*].properties.startIpA
equals "0.0.0.0" and
firewallRules.value[*].properties.endIpAdd
equals "0.0.0.0"
Updated RQL—
Prisma™ Cloud Release Notes 359 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Updated RQL—
Prisma™ Cloud Release Notes 360 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
empty or securityContacts[?
any(properties.email is
empty)] exists) and pricings[?
any(properties.pricingTier equal
ignore case Standard)] exists
Updated RQL—
Prisma™ Cloud Release Notes 361 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 362 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Support for PCI DSS v4.0 Payment Card Industry Data Security
Standard (PCI DSS) is a global standard
that provides a baseline of technical and
operational requirements designed to protect
account data.
PCI DSS v4.0 replaces version 3.2.1 to
address emerging threats and technologies,
and enable innovative methods to combat
new threats.
Support for PCI DSS v4.0 is available on
Alibaba, AWS, Azure, GCP, and OCI.
Support for Federal Financial Institutions The Federal Financial Institutions Examination
Examination Council (FFIEC) Council (FFIEC) is an interagency body of the
U.S. government made up of several financial
regulatory agencies that is responsible
for establishing consistent guidelines,
uniform practices, and principles for financial
institutions.
Prisma™ Cloud Release Notes 363 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for CIS CSC v7.1 The Center for Internet Security (CIS)
publishes the CIS Critical Security Controls
(CSC) to help your organization better defend
against known attacks by refining key security
concepts into actionable controls to achieve
significant overall cybersecurity defense.
There are 20 CIS controls in v7.1. CIS
separates these controls into three categories
as follows:
• basic controls
• foundational controls
• organizational controls
You can use the CIS Controls to quickly
establish the protections through
cybersecurity actions where you can eliminate
the most common attacks.
Support for CIS CSC v7.1 is available on
Alibaba, AWS, Azure, GCP, and OCI.
Prisma™ Cloud Release Notes 364 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CHANGE DESCRIPTION
New API Endpoints for AWS S3 New API endpoints are available for AWS S3
Flow Logs onboarding for organization and standalone accounts
on all supported stacks as follows:
• GET /cloud-accounts-manager/v1/cloud-
accounts/aws/{accountId}/features/aws-
flow-logs/s3
Fetches AWS S3 Flow Log feature details of the
monitored account.
• PATCH /cloud-accounts-manager/v1/
cloud-accounts/aws/{accountId}/
features/aws-flow-logs/s3
Saves AWS S3 Flow Log feature details of the
monitored account.
• POST /cloud-accounts-manager/v1/cloud-
accounts/aws/{accountId}/features/aws-
flow-logs/s3/status
Checks AWS S3 Flow Log status of the monitored
account.
New Features
Feature Description
Prisma™ Cloud Release Notes 365 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
aws-connect-instance
Additional permissions required:
• connect:ListInstances
• connect:ListInstanceStorageCo
nfigs
Amazon EventBridge
aws-events-rule
Additional permissions required:
• events:ListRules
• events:ListTargetsByRule
• events:ListTagsForResource
Amazon Pinpoint
aws-pinpoint-email-channel
Additional permissions required:
• mobiletargeting:GetEmailChann
el
• mobiletargeting:GetApps
Amazon Pinpoint
aws-pinpoint-sms-channel
Additional permissions required:
• mobiletargeting:GetSmsChannel
• mobiletargeting:GetApps
Prisma™ Cloud Release Notes 366 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.Synapse/privateLinkHub
s/privateLinkResources/read
Microsoft.Synapse/privateLinkHub
s/read
• Microsoft.Synapse/workspaces/
privateLinkResources/read
• iam.denypolicies.list
• iam.denypolicies.list
Prisma™ Cloud Release Notes 367 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
securitycenter.organizationsetti
ngs.get
securitycenter.notificationconfi
g.list
securitycenter.muteconfigs.list
• read waf-network-address-list
Prisma™ Cloud Release Notes 368 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• read waas-policy
• selfManaged.certificate
Prisma™ Cloud Release Notes 369 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 370 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 371 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 372 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy
or $.Y.sslPolicies[?
(@.profile=='CUSTOM' &&
'TLS_RSA_WITH_AES_256_CBC_SHA'
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy
or $.Y.sslPolicies[?
(@.profile=='CUSTOM' &&
'TLS_RSA_WITH_3DES_EDE_CBC_SHA'
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy))"; show
X;
Prisma™ Cloud Release Notes 373 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
or ($.Y.sslPolicies[?
(@.profile=='CUSTOM' &&
'TLS_RSA_WITH_AES_128_GCM_SHA256'
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy
or $.Y.sslPolicies[?
(@.profile=='CUSTOM' &&
'TLS_RSA_WITH_AES_256_GCM_SHA384'
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy
or $.Y.sslPolicies[?
(@.profile=='CUSTOM' &&
'TLS_RSA_WITH_AES_128_CBC_SHA'
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy
or $.Y.sslPolicies[?
(@.profile=='CUSTOM' &&
'TLS_RSA_WITH_AES_256_CBC_SHA'
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy
or $.Y.sslPolicies[?
(@.profile=='CUSTOM' &&
'TLS_RSA_WITH_3DES_EDE_CBC_SHA'
in @.enabledFeatures)].selfLink
contains $.X.sslPolicy))"; show
X;
Prisma™ Cloud Release Notes 374 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 375 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 376 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 377 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
is empty or
securityContacts[*].properties.alertsToAdm
equals Off'
Updated RQL—
Prisma™ Cloud Release Notes 378 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Updated RQL—
Prisma™ Cloud Release Notes 379 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CHANGE DESCRIPTION
Removal of Update Access Key The following endpoint has been removed:
API Endpoint
PUT /access_keys/{id}
New Features
Feature Description
Change in Existing Behavior Alert Count on Earlier on Prisma Cloud, when an asset
Policy Violations generated an alert for a policy violation, the
alert was counted towards the most severe
This change was first announced in the look
violation. For example, for an asset that had
ahead that was published with the 22.5.2
violations for low, medium, and high severity
release.
policies, the alert was only counted in the
high category although it was also violating
medium and low severity policies. In this
method of counting alerts, when you view
the total count of failed checks it adds up to
the sum of all low, medium, and high severity
failures.
The above method of counting alerts is
modified to display the total count of policy
violations for each severity. So, using the
same example, if an asset has violations for
Prisma™ Cloud Release Notes 380 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Skips API Ingestion when Cloud Billing on When the Cloud Asset Inventory (CAI) service
GCP is Disabled is enabled and if Cloud Billing is disabled for
a project by default, Prisma Cloud skips the
ingestion of GCP APIs. This is true when the
project is onboarded as a standalone or a
child project of an organization, but not for a
master service account (MSA).
Impact— If you do not enable CAI, Prisma
Cloud will ingest all the GCP APIs even if
Cloud Billing is disabled for a project.
Prisma™ Cloud Release Notes 381 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma Cloud Data Security Download and The file size for malware scanning is now
Scan Files up to 100MB for Malware increased from 20MB to 100MB. The
uncompressed file size must be less than
100MB.
Prisma Cloud Data Security Support for Big Prisma Cloud supports the following file types
Data File Types for data profile and data patterns:
• .avro
• .ORC
• .parquet
The size of the .avro, .ORC, or .parquet files
must be less than 2.5GB.
• airflow:ListEnvironments
• ssm:DescribeAssociation
Prisma™ Cloud Release Notes 382 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.Batch/batchAccounts/r
ead
Microsoft.DataShare/accounts/re
ad
Microsoft.RedHatOpenShift/openSh
iftClusters/read
• datacatalog.taxonomies.getIam
Policy
• datacatalog.taxonomies.get
Prisma™ Cloud Release Notes 383 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• datacatalog.entryGroups.getIa
mPolicy
• datacatalog.entryGroups.get
• securitycenter.sources.getIam
Policy
OCI Compute
oci-compute-vnics
Additional permissions required:
• inspect vnic-attachments
• inspect vnics
OCI Compute
oci-compute-vnicattachments
Additional permission required:
Prisma™ Cloud Release Notes 384 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
inspect vnic-attachments
OCI Networking
oci-networking-dns-tsigkeys
Additional permissions required:
• inspect dns-tsig-keys
• read dns-tsig-keys
Update API Ingestion—Amazon VPC The following API is updated with a new
Attribute attribute authorizationRules which
contains the authorization rules for Client
VPN endpoint.
aws-ec2-client-vpn-endpoint
Additional permissions required:
• ec2:DescribeClientVpnEndpoint
s
• ec2:DescribeClientVpnAuthoriz
ationRules
Prisma™ Cloud Release Notes 385 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 386 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
acm:UpdateCertificateOptions
Prisma™ Cloud Release Notes 387 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
Remediation CLI—
Prisma™ Cloud Release Notes 388 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
keyMetadata.keyManager
equals CUSTOMER and
(rotation_status.keyRotationEnabled
is false or
rotation_status.keyRotationEnabled
equals null)'
Updated RQL—
Prisma™ Cloud Release Notes 389 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 390 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Updated RQL—
Prisma™ Cloud Release Notes 391 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• compute.networks.updatePolicy
Current RQL—
Prisma™ Cloud Release Notes 392 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Updated CLI—
• compute.networks.updatePolicy
Current RQL—
Prisma™ Cloud Release Notes 393 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Updated CLI—
• compute.networks.updatePolicy
Current RQL—
Prisma™ Cloud Release Notes 394 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
firewall-rules-list' AND
json.rule= 'sourceRanges[*]
contains 0.0.0.0/0 and
allowed[?any(ports contains
_Port.inRange(1521,1521) or
(ports does not exist and
(IPProtocol contains tcp or
IPProtocol contains udp)) )]
exists'
Updated RQL—
Updated CLI—
• compute.networks.updatePolicy
Prisma™ Cloud Release Notes 395 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated RQL—
Updated CLI—
Prisma™ Cloud Release Notes 396 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• compute.firewalls.update
• compute.networks.updatePolicy
Current RQL—
Updated RQL—
Updated CLI—
Prisma™ Cloud Release Notes 397 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• compute.networks.updatePolicy
Current RQL—
Updated RQL—
Updated CLI—
Prisma™ Cloud Release Notes 398 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• compute.networks.updatePolicy
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 399 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated CLI—
Updated RQL—
Prisma™ Cloud Release Notes 400 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Prisma™ Cloud Release Notes 401 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
contains 0.0.0.0/0 or
sourceRanges[*] contains ::/0)
and allowed[?any(ports contains
_Port.inRange(22,22) or (ports
does not exist and (IPProtocol
contains tcp or IPProtocol
contains udp)))] exists'
Updated RQL—
Prisma™ Cloud Release Notes 402 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
• compute.networks.updatePolicy
Current RQL—
Prisma™ Cloud Release Notes 403 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Updated CLI—
• compute.networks.updatePolicy
Current RQL—
Prisma™ Cloud Release Notes 404 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
allowed[*].IPProtocol equals
all'
Updated RQL—
Updated CLI—
Prisma™ Cloud Release Notes 405 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
If you have enabled the Code Security subscription on Prisma Cloud, see Code Security-
Features Introduced in June 2022 for details on new Configuration Build policies, updates to
add build rules for existing Configuration Run policies, and policy deletions.
New Features
FEATURE DESCRIPTION
• iam:GetOpenIDConnectProvider
Prisma™ Cloud Release Notes 406 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
AWS Lambda
aws-lambda-code-signing-config
Additional permission required:
lambda:ListCodeSigningConfigs
AWS Lambda
aws-lambda-list-functions
Additional permission required:
lambda:GetFunctionUrlConfig
route53resolver:ListResolverQuer
yLogConfigAssociations
• route53resolver:ListTagsForRe
source
• Microsoft.StorageCache/Subscr
iption/caches/read
Prisma™ Cloud Release Notes 407 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.Media/mediaservices/r
ead
Microsoft.ServiceFabric/clusters
/read
Microsoft.Network/networkInterfa
ces/effectiveNetworkSecurityGrou
ps/action
Microsoft.Network/networkInterfa
ces/effectiveRouteTable/action
Prisma™ Cloud Release Notes 408 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• privateca.certificateRevocati
onLists.getIamPolicy
compute.backendBuckets.list
compute.backendServices.list
• read bds-instances
• read dis-workspaces
Prisma™ Cloud Release Notes 409 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• inspect data-science-projects
• read data-science-projects
Update Support for Azure Virtual Network To support ingestion for these Azure Virtual
API Ingestions Network APIs:
azure-network-effective-nsg
azure-network-effective-route-t
able
• Microsoft.Network/networkInte
rfaces/effectiveRouteTable/ac
tion
Permissions in the Azure Terraform Template The Azure Terraform template in Monitor
and Monitor & Protect modes, used for
onboarding Azure Subscriptions and Azure
Tenant with Management Groups on Prisma
Cloud includes the following permission:
Microsoft.ContainerRegistry/regi
stries/listCredentials/action
Change in Existing Behavior Support for When you onboard using granular permission,
Google Cloud API Ingestions you must provide additional permissions for
the following GCP APIs:
Prisma™ Cloud Release Notes 410 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• Google PubSub
gcloud-pubsub-subscription
Additional permission required:
pubsub.subscriptions.get
gcloud-pubsub-topic
Additional permission required:
pubsub.topics.get
dataproc.clusters.get
Support for Australian Energy Sector Cyber The Australian Energy Sector Cyber Security
Security Framework (AESCSF) Framework (AESCSF) provides a set of
cybersecurity guidelines specifically tailored
to the Australian Energy sector. This
framework enables the owners and operators
of energy infrastructure in Australia to
assess, evaluate, prioritize, and improve their
cybersecurity posture.
The framework involves the analysis of two
aspects:
• Criticality assessment
• Cyber security capability and maturity self-
assessment
Prisma™ Cloud Release Notes 411 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for Australian Cyber Security Centre The Australian Cyber Security Centre
(ACSC) Information Security Manual (ISM) (ACSC) produces the Information Security
Manual (ISM). ISM outlines a cyber security
framework that you can apply by using the
risk management framework to protect
information and systems from cyber threats.
The ISM is intended for Chief Information
Security Officers, Chief Information Officers,
cyber security professionals, and information
technology managers.
Support for Australian Cyber Security Centre The Australian Cyber Security Centre’s
(ACSC) Essential Eight (ACSC) Essential Eight is a risk management
framework that prioritizes eight mitigation
strategies taken from the recommended
ACSC’s Strategies to Mitigate Cyber Security
Incidents:
The essential eight security controls are:
• Application Control — to control the
execution of unauthorized software
• Configure Macros — to block untrusted
macros
• Patch Application — to remediate known
security vulnerabilities
• Application Hardening — to protect against
vulnerable functionality
• Restrict Admin Permissions — to limit
powerful access to systems
• Patch Operating Systems — to remediate
known security vulnerabilities
• Multi-Factor Authentication — to protect
against risk activities
• Daily Backups — to maintain the availability
of critical data
Update New Zealand Information Security Prisma Cloud has extended the compliance
Manual (NZISM v3.4) support for other cloud accounts including
Azure, Alibaba, GCP, OCI, along with AWS.
Prisma™ Cloud Release Notes 412 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Features
FEATURE DESCRIPTION
Burndown Widgets in Adoption Advisor The Adoption Advisor now includes two new
widgets for risk and incident burndown.
These widgets show you the number of
high severity misconfigurations or risks and
incidents detected in your cloud environment,
and your team’s progress on remediating
these issues. The count of remediated risks
and incidents includes alerts that are in the
resolve, dismiss, or snoozed states.
• eks:DescribeNodegroup
• eks:ListNodegroups
Prisma™ Cloud Release Notes 413 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Amazon Batch
aws-batch-compute-environment
Additional permission required:
batch:DescribeComputeEnvironmen
ts
lakeformation:GetDataLakeSettin
gs
Microsoft.DomainRegistration/dom
ains/Read
Microsoft.Web/hostingEnvironment
s/Read
Microsoft.Web/serverfarms/Read
Azure Compute
azure-vm-start-time
No new permissions, the Reader role includes
the required permissions.
Prisma™ Cloud Release Notes 414 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
logging.buckets.list
recommender.computeFirewallInsig
hts.list
• managedidentities.domains.get
• managedidentities.domains.get
IamPolicy
• managedidentities.sqlintegrat
ions.list
• read dataflow-application
OCI Streaming
Prisma™ Cloud Release Notes 415 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
oci-streaming-streampools
Additional permissions required:
• inspect stream-pools
• read stream-pools
OCI Streaming
oci-streaming-streams
Additional permissions required:
• inspect streams
• read streams
advancedThreatProtectionSettings
Update gcloud-storage-buckets-list API For new ingestion of this API, the metadata
ingestion will no longer include the timeCreated
attribute for the bucket. In RQL, the key will
not be available in the json.rule attribute
for auto completion and you cannot define
custom policies based on this key. If you have
any saved searches including the timeCreated
attribute, they will now not return resources.
Prisma™ Cloud Release Notes 416 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 417 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 418 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• compute.networks.updatePolicy
Current RQL—
Updated RQL—
Updated CLI—
Impact— Low.
Prisma™ Cloud Release Notes 419 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• compute.networks.updatePolicy
Current RQL—
Updated RQL—
Updated CLI—
Prisma™ Cloud Release Notes 420 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CHANGE DESCRIPTION
Last Updated Timestamps for List Alert V2 The lastUpdated attribute is now added to the
API List Alerts V2 response for the POST /v2/
alert endpoint.
This attribute contains a timestamp to indicate
when an alert was last updated. It also
includes a timestamp for resource updates,
policy updates, alert rule updates, alert status
changes, and so on.
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 421 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
resource.state RQL Attribute You can now use the optional source/
dest.resource.state RQL attribute to find
resources that are active, for example an EC2
instance that has state as running or inactive
or an EC2 instance that has state as stopped
on Prisma Cloud. The available values are
Active or Inactive.
For example:
ecr:GetRegistryScanningConfigura
tion
• acm-pca:GetPolicy
Prisma™ Cloud Release Notes 422 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• acm-pca:ListCertificateAuthor
ities
Microsoft.DataBoxEdge/dataBoxEdg
eDevices/read
Microsoft.Compute/availabilitySe
ts/read
Microsoft.NotificationHubs/Names
paces/read
Microsoft.NotificationHubs/Names
paces/NotificationHubs/read
Microsoft.Network/localnetworkga
teways/read
Prisma™ Cloud Release Notes 423 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.NetApp/netAppAccounts/
read
• Microsoft.DBforPostgreSQL/fle
xibleServers/firewallRules/re
ad
• Microsoft.DBforPostgreSQL/fle
xibleServers/configurations/r
ead
• Microsoft.DBforMySQL/flexible
Servers/firewallRules/read
• Microsoft.DBforMySQL/flexible
Servers/configurations/read
OCI IAM
oci-iam-identityproviders
Additional permission required:
inspect identity-providers
Prisma™ Cloud Release Notes 424 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
essentialcontacts.contacts.list
• servicedirectory.namespaces.g
etIamPolicy
• orgpolicy.policy.get
accessapproval.settings.get
Prisma™ Cloud Release Notes 425 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 426 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
contains ::/0 or
Condition.ForAnyValue:IpAddress.aws:Source
contains ::/0) and Effect
equals Allow and Action
anyStartWith lambda:)] exists
Prisma™ Cloud Release Notes 427 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
engineVersion is member of
('13.2','13.1','12.6','12.5','12.4','12.3'
Prisma™ Cloud Release Notes 428 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• compute.networks.updatePolicy
Prisma™ Cloud Release Notes 429 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Prisma™ Cloud Release Notes 430 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
TLS13-1-0-2021-06 and
sslPolicy does not contain
ELBSecurityPolicy-2016-08)]
exists
Current RQL—
Prisma™ Cloud Release Notes 431 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated RQL—
Azure Policies
Prisma™ Cloud Release Notes 432 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 433 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
FEATURE DESCRIPTION
Prisma Cloud Data Security—Scan Resources When scanning files for data security, files are
By True File Type now identified based on the True File Type as
determined by file metadata, regardless of the
file extension for all supported file types.
Prisma™ Cloud Release Notes 434 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 435 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Auto Completion Updates for Amazon VPC On the Investigate page, the RQL config
API RQL Query query for aws-describe-vpc-endpoints
API displays the appropriate fields under
policyDocument.Statement[] during auto-
completion. For example, if you want
to construct the following RQL query
config from cloud.resource where api.name
= 'aws-describe-vpc-endpoints' AND
json.rule = serviceName ends with ".s3" and
policyDocument.Statement[].Condition.StringEquals.aws:Princi
is not member of (o-0hc9vcq8o1,
o-slnhz39n91), you can see
`policyDocument.Statement[].Condition.StringEquals.aws:Pr
appear in the list automatically.
Change in Existing Behavior Prisma Cloud The feature which shows the objects that
Data Security—Object Scan for Glacier Deep belong to Glacier Deep Archive and Glacier
Archive and Glacier Flexible Retrieval Storage Flexible Retrieval (formerly Glacier) as Un-
Classes supported storage class in Inventory is
disabled and objects that belong to these two
storage classes will display as Not Supported.
Update Permissions in the GCP Terraform The GCP Terraform template in Monitor
Template & Protect mode, used for onboarding GCP
accounts on Prisma Cloud, now includes the
Prisma™ Cloud Release Notes 436 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
compute.disks.create
compute.images.get
compute.images.list
compute.images.useReadOnlycompute.instances
compute.instances.delete
compute.instances.get
compute.instances.list
compute.instances.setTagscompute.networks.g
compute.networks.use
compute.networks.useExternalIp
compute.subnetworks.use
compute.subnetworks.useExternalIp
Update AWS CFT Permissions and API Token If you are using the Code Security module on
Duration Prisma Cloud, the AWS CFTs for onboarding
commercial, Gov and China accounts have
been updated to include permissions for
detecting when resources that are managed
using IaC templates, like Terraform or
CloudFormation, are modified manually using
CLI or Console.
Prisma™ Cloud Release Notes 437 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
lambda:GetLayerVersion
lambda:GetEventSourceMapping
lambda:GetFunction
s3:ListBucket
sns:GetSubscriptionAttributes
AWSCloudFormationReadOnlyAccess
• lex:ListBotVersions
• lex:ListBots
• lex:DescribeBotVersion
• lex:DescribeBot
Amazon Lex
aws-lex-bot
Additional permissions required:
• lex:GetBot
• lex:GetBots
• lex:GetBotVersions
Prisma™ Cloud Release Notes 438 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• lex:ListTagsForResource
Amazon DocumentDB
aws-docdb-db-cluster
Additional permissions required:
• rds:DescribeDBClusters
• rds:ListTagsForResource
Microsoft.Web/sites/config/list/
action
• Microsoft.Compute/virtualMach
ineScaleSets/publicIPAddresse
s/read
• Microsoft.Compute/virtualMach
ineScaleSets/networkInterface
s/read
Prisma™ Cloud Release Notes 439 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
azure-virtual-desktop-workspace
Additional permissions required:
• Microsoft.DesktopVirtualizati
on/workspaces/read
• Microsoft.DesktopVirtualizati
on/workspaces/providers/Micro
soft.Insights/diagnosticSetti
ngs/read
• Microsoft.DesktopVirtualizati
on/hostpools/sessionhosts/rea
d
• Microsoft.DesktopVirtualizati
on/hostpools/sessionhostconfi
gurations/read
recommender.iamPolicyInsights.l
ist
• orgpolicy.policy.get
Prisma™ Cloud Release Notes 440 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• privateca.certificates.list
• read data-catalogs
• read repos
OCI Functions
oci-functions-applications
Additional permissions required:
• inspect fn-app
• read fn-app
Prisma™ Cloud Release Notes 441 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• read serviceconnectors
OCI Database
oci-oracledatabase-databases
Additional permissions required:
• inspect db-systems
• inspect db-homes
• inspect databases
• imageName
Prisma™ Cloud Release Notes 442 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 443 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 444 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
container.clusters.update
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 445 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CHANGE DESCRIPTION
List User Role Types API for Permission To view the list of roles associated with
Groups Assignments administrators/users who have access to
Prisma Cloud, the following new API endpoint
is available:
GET /user/role/type
[ "SYSTEM_ADMIN",
"ACCOUNT_ADMIN",
"ACCOUNT_READ_ONLY",
"SSO_ADMIN",
"CLOUD_PROVISIONING_ADMIN",
"TENANT_PROVISIONING_ADMIN",
"PRISMA_SERVICE_USER",
"ACCOUNT_AND_CLOUD_PROVISIONING_ADMIN",
"BUILD_AND_DEPLOY_SECURITY",
"BUILD_AND_DEPLOY_SECURITY_CI",
"COMPUTE_ADMIN",
"NETWORK_SECURITY_OPERATOR",
"NETWORK_SECURITY_OPERATOR_READ_ONLY",
"COMPUTE_ACCOUNT_ADMIN",
"DEVELOPER",
"COMPUTE_ACCOUNT_READ_ONLY" ]
FEATURE DESCRIPTION
• rds:ListTagsForResource
Prisma™ Cloud Release Notes 446 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Amazon Neptune
aws-neptune-db-cluster
Additional permissions required:
• rds:DescribeDBClusters
• rds:ListTagsForResource
AWS MediaStore*aws-mediastore-container*
Additional permissions required:
• mediastore:ListTagsForResourc
e
• mediastore:ListContainers
• mediastore:GetCorsPolicy
• mediastore:GetContainerPolicy
accessapproval.settings.get
essentialcontacts.contacts.list
Prisma™ Cloud Release Notes 447 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• servicedirectory.endpoints.li
st
• servicedirectory.namespaces.l
ist
• servicedirectory.services.get
IamPolicy
• servicedirectory.services.lis
t
OCI Bastion
oci-bastion
Additional permissions required:
• inspect bastion-family
• read bastion-family
"Microsoft.Web/sites/config/list
/action"
Prisma™ Cloud Release Notes 448 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 449 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Configuration Policies for Build-Time The following new policies are being available
Checks to scan your environments monitored by the
Code Security module on Prisma Cloud.
• Deletion protection disabled for load
balancer
• Deletion protection disabled for load
balancer
• RDS instances do not have Multi-AZ
enabled
• AWS QLDB ledger has deletion protection
is disabled
• AWS WAF does not have associated rules
• AWS WAF Web Access Control Lists
logging is disabled
• AWS Kinesis Video Stream not encrypted
using Customer Managed Key
Prisma™ Cloud Release Notes 450 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 451 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 452 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 453 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Configuration Policies for Run-Time and • Verify CloudFront Distribution Viewer
Build-Time Checks Certificate is using TLS v1.2
• Ensure cosmosdb does not allow
privileged escalation by restricting
management plane changes
• Ensure Front Door WAF prevents message
lookup in Log4j2
• Ensure Application Gateway WAF
prevents message lookup in Log4j2
• Ensure that 'Send email notification for
high severity alerts' is set to 'On'
Prisma™ Cloud Release Notes 454 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 455 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated to—
Prisma™ Cloud Release Notes 456 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated to—
Updated to—
Prisma™ Cloud Release Notes 457 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
16 New Anomaly Policies that Map to MITRE There are 16 new UEBA Anomaly policies to
ATT&CK v10.0 detect user activity from the TOR anonymity
network. Each policy corresponds to one of
the different service groups available in AWS,
Azure, and GCP—for example—analytics,
containers, compute, security, storage, and
web. All the policies are classified as high
severity and identify defense evasion and
impact attack tactics listed in the MITRE
ATT&CK framework. The policies are disabled
by default, but customers can manually enable
them according to their security needs and
the cloud services used in their environments.
Here’s the list of UEBA policies:
• Suspicious activity in Security services
• Suspicious activity in Networking services
• Suspicious activity in Analytics services
• Suspicious activity in Monitoring /
Management services
• Suspicious activity in Database services
• Suspicious activity in Compute services
• Suspicious activity in Storage services
• Suspicious activity in Application
Integration services
• Suspicious activity in Containers services
• Suspicious activity in AI / ML services
• Suspicious activity in Migration services
• Suspicious activity in Dev Tools services
• Suspicious activity in Web services
• Suspicious activity in IoT services
• Suspicious activity in Media services
• Suspicious login activity
Prisma™ Cloud Release Notes 458 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
FEATURE DESCRIPTION
Azure Custom Roles Prisma Cloud now gives you the ability to
create custom roles which enable you to
onboard your cloud accounts with a granular
set of permissions and enforce the principle of
least privilege.
When you view the status of Cloud Accounts,
you can now review the details on missing
permissions.
Prisma™ Cloud Release Notes 459 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Automatically Receive Detailed Reports With When you configure your alert rules to
Email Alerts instantly send emails, a detailed report is
automatically included as an attachment.
• storagegateway:DescribeCached
iSCSIVolumes
Prisma™ Cloud Release Notes 460 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• storagegateway:DescribeTapes
AWS XRAY
aws-xray-encryption-config
Additional permission required:
xray:GetEncryptionConfig
Microsoft.Network/natGateways/r
ead
Microsoft.DataCatalog/catalogs/
read
• bigtable.backups.getIamPolicy
Prisma™ Cloud Release Notes 461 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
secretmanager.versions.list
Google VPC
gcloud-compute-org-firewall-policy
Additional permission required:
compute.firewallPolicies.list
• privateca.certificateAuthorit
ies.list
• read api-gateways
Prisma™ Cloud Release Notes 462 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 463 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 464 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
any(allowedReferrers[*]
equals "*")] exists or
restrictions.browserKeyRestrictions[?
any(allowedReferrers[*]
equals "*.[TLD]")] exists or
restrictions.browserKeyRestrictions[?
any(allowedReferrers[*] equals
"*.[TLD]/*")] exists)) or
(restrictions.serverKeyRestrictions
exists and
(restrictions.serverKeyRestrictions[?
any(allowedIps[*] equals
0.0.0.0)] exists or
restrictions.serverKeyRestrictions[?
any(allowedIps[*] equals
0.0.0.0/0)] exists or
restrictions.serverKeyRestrictions[?
any(allowedIps[*]
equals ::/0)] exists or
restrictions.serverKeyRestrictions[?
any(allowedIps[*] equals ::0)]
exists))
Prisma™ Cloud Release Notes 465 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated to—
Prisma™ Cloud Release Notes 466 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
FEATURE CHANGE
CSPM Alert API Rate Limits Prisma Cloud continues to enable rate
limiting on the API endpoints, in order to
ensure availability and scalability of Prisma
Cloud APIs. The following API rate limits are
implemented for the Alerts API endpoints
starting in 22.3.2:
• GET /v2/alert
• Request rate limit: 2/sec
• Burst limit: 10/sec
• POST /v2/alert
• Request rate limit: 2/sec
• Burst limit: 10/sec
• GET /alert/count/{status}
• Request rate limit: 2/sec
• Burst limit: 10/sec
• GET /alert
• Request rate limit: 2/sec
• Burst limit: 10/sec
• POST /alert
• Request rate limit: 2/sec
• Burst limit: 10/sec
• GET /alert/policy
• Request rate limit: 1/sec
• Burst limit: 5/sec
• POST /alert/policy
• Request rate limit: 1/sec
• Burst limit: 5/sec
Prisma™ Cloud Release Notes 467 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• GET /alert/{id}
• Request rate limit: 5/sec
• Burst limit: 10/sec
• POST /alert/jobs
• Request rate limit: 2/sec
• Burst limit: 10/sec
• POST /alert/policy/jobs
• Request rate limit: 1/sec
• Burst limit: 5/sec
s3:GetBucketOwnershipControls
CHANGE DESCRIPTION
CSPM Alert API Rate Limits See Changes in Existing Behavior for a
description of new CSPM Alert API rate limits.
Removal of Deprecated IaC Scan API V2 The deprecated IaC Scan API V2 has been
removed. A new Code Security API is
available for Infrastructure-as-Code security
checks.
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 468 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
License Support in Alarm Center Prisma Cloud includes a new License Alarm
Type, which raises an alarm based on the
following cases:
• License Usage— An alarm is raised on
the last day of the month if your monthly
usage is >80% (configurable limit) of the
credits purchased.
• License Expiry— An alarm is raised 1
month before your license expires (for non-
POC tenants).
• Module Activation Failure— An alarm is
raised for any module provisioning failures.
Update Prisma Cloud Data Security—New Prisma Cloud can now scan the following
File Extensions Supported for Malware types of file extensions on your storage
Scanning buckets for malware:
• .pdf
• .doc
• .docx
• .xls
• .xlsx
• .ppt
• .pptx
• .docm
• .dotm
• .xlm
Prisma™ Cloud Release Notes 469 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• .xlsm
• .xltm
• .pptm
• .potm
• .ppsm
Support for New Regions on OCI Prisma Cloud now ingests data for resources
deployed in the Jerusalem, Marseille, and
Singapore cloud regions on OCI.
To review a list of supported regions, select
Inventory > Assets, and choose Cloud Region
from the filter drop-down.
rds:DescribeDBClusterParameters
rds:DescribeDBClusterParameterGr
oups
rds:ListTagsForResource
Amazon QuickSight
aws-quicksight-account-setting
Prisma™ Cloud Release Notes 470 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
quicksight:DescribeAccountSetti
ngs
Amazon VPC
aws-ec2-client-vpn-endpoint
Additional permission required:
ec2:DescribeClientVpnEndpoints
privateca.caPools.getIamPolicy
privateca.caPools.list
compute.instances.getIamPolicy
compute.disks.getIamPolicy
Prisma™ Cloud Release Notes 471 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
iam.workloadIdentityPoolProvider
s.list
iam.workloadIdentityPools.list
publicNetworkAccess
disableLocalAuth
Prisma™ Cloud Release Notes 472 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 473 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated to—
Prisma™ Cloud Release Notes 474 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated to—
Prisma™ Cloud Release Notes 475 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated to—
Update AWS CIS v1.3.0 and v1.4.0 The AWS S3 CloudTrail buckets for which
access logging is disabled policy has been
mapped to AWSCIS v1.3.0 and v1.4.0, section
3.6.
Impact— The compliance report score will be
impacted because a new mapping has been
added.
CHANGE DESCRIPTION
Prisma™ Cloud Release Notes 476 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CSPM Policy API Endpoints If you specify an RQL statement rather than
a search ID for the rule.criteria request body
This change was first announced in the look
parameter, the value of the rule.criteria
ahead that was published with the 22.2.2
attribute in the resulting response object will
release.
be a UUID and not the RQL itself. This change
affects the following API requests:
• POST /policy
• PUT /policy/{id}
You can use the UUID with the following
requests to determine the corresponding RQL
statement:
• GET /search/history
where the response object includes both
the UUID and RQL
• GET /search/history/{UUID}
FEATURE DESCRIPTION
GA
Knowledge Center Knowledge Center provides in-product and
in-context guidance based on your current
workflow without taking you away from the
Prisma Cloud app.
Access the Knowledge Center on the lower
left navigation to see content relevant to
what you are trying to accomplish at that
particular moment. The topics listed under the
Knowledge Center get auto-refreshed when
you move to a different page.
Prisma™ Cloud Release Notes 477 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Improved Alert Rule Workflow The improved and intuitive Add Alert Rule
modal with a faster loading UI provides
a better user experience. You can select
the optional Alert Notifications, Auto-
Remediation, or Auto-Actions ^Limited GA^
settings up front while creating an alert rule.
Prisma™ Cloud Release Notes 478 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• storagegateway:DescribeNFSFil
eShares
• storagegateway:DescribeSMBFil
eShares
• storagegateway:DescribeGatewa
yInformation
• storagegateway:DescribeSMBSet
tings
Amazon Lightsail
aws-lightsail-instance
Additional permission required:
lightsail:GetInstances
Prisma™ Cloud Release Notes 479 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.OperationalInsights/wo
rkspaces/read
"master": {
"accountId": "375187248419",
"relationshipStatus":
"Enabled"
}
Update Permission in the AWS CFT The AWS CFT for Monitor now includes
additional permissions for EKS Auditing for
onboarded cloud accounts. The AWS CFT
for Monitor and Protect includes additional
permissions for Agentless scanning on EC2 for
onboarded cloud accounts.
Removal of Support for Deprecated RQL The config where , event where , and
Query Format network where query formats are no longer
supported.
• Replace config where <rest of
the query> with config from
cloud.resource where <rest of
the query>
• Replace event where <rest of
the query> with event from
cloud.audit_logs where <rest of
the query>
• Replace network where <rest of
the query> with network from
vpc.flow_records where <rest of
the query>
Prisma™ Cloud Release Notes 480 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CHANGE DESCRIPTION
New Policy API Endpoint to Validate a Policy The following new Policy API endpoint is
Rule available. It enables you to validate a policy
rule without creating a policy:
• POST /policy/rule/validate
Host Findings Count in Network Anomaly The response object of the following API
Alerts request no longer includes the host findings
count:
• GET /alert/{id}
Specifically:
• For a network anomaly alert where
the source host is the reported
vulnerability, the response object
no longer includes attribute
metadata.anomalyDetail.srcHost.hostFindingCount.
• For a network anomaly alert where the
target host is the reported vulnerability:**
The response object no longer includes
attribute targetHostFinding.
• Response object attribute
metadata.anomalyDetail.features[.targetHost.details[].h
is null.
You can still access host findings data
through:
• GET /resource/external_finding
Prisma™ Cloud Release Notes 481 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
FEATURE DESCRIPTION
Network Exposure of Cloud Resources Prisma Cloud Network Security helps enhance
your network security posture within public
cloud environments. Its Network Analyzer
engine automatically calculates net effective
reachability of your cloud resources such as
EC2, RDS, and Redshift ENIs. In addition, it
helps detect unrestricted network access from
the Internet or external network domains.
Using the RQL query
Prisma™ Cloud Release Notes 482 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GA
Adoption Advisor Tracking and measuring your adoption of new
features and existing capabilities on Prisma
Cloud just got easier!
The Adoption Advisor is generally available
to all and gives visibility into your adoption
journey, identifies your unexplored features,
helps you make the most of your investment,
and provides guidance on where to take
action.
Prisma™ Cloud Release Notes 483 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Change in Existing Behavior VM Count on The Asset Inventory page double counts the
Asset Inventory number of Azure VMs in your deployment.
To address this issue, the 22.2.1 release
includes a fix that will reduce the Azure VM
count in half (drop of around 50%) in the
Asset Inventory.
With this change, there is no impact on RQL
or licensing.
• codeartifact:DescribeReposito
ry
• codeartifact:GetRepositoryPer
missionsPolicy
• codeartifact:ListTagsForResou
rce
AWS CodeArtifact
aws-code-artifact-domain
Additional permissions required:
• codeartifact:ListDomains
• codeartifact:DescribeDomain
• codeartifact:GetDomainPermiss
ionsPolicy
• codeartifact:ListTagsForResou
rce
Prisma™ Cloud Release Notes 484 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.Network/trafficManager
Profiles/read
Azure Quantum
azure-quantum-workspace
Additional permission required:
Microsoft.Quantum/Workspaces/Re
ad
• clientauthconfig.clients.list
WithSecrets
OCI Networking
oci-networking-routetable
The permission required is:
inspect subnets
OCI Networking
oci-networking-internetgateway
The permission required is:
INTERNET_GATEWAY_READ
OCI Networking
oci-networking-drgattachment
The permission required is:
DRG_ATTACHMENT_READ
Prisma™ Cloud Release Notes 485 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
OCI Networking
oci-networking-drg
The permission required is:
DRG_READ
OCI Networking
oci-networking-localpeeringgateway
The permission required is:
LOCAL_PEERING_GATEWAY_READ
OCI Networking
oci-networking-natgateway
The permission required is:
NAT_GATEWAY_READ
OCI Networking
oci-networking-servicegateway
The permission required is:
SERVICE_GATEWAY_READ
OCI Networking
oci-networking-dns-zone
The permission required is:
DNS_ZONE_INSPECT
Update API Ingestion—SNS Subscription The following API will no longer be ingested
Attributes due to a high number of alerts generated:
aws-sns-get-subscription-attrib
utes
Prisma™ Cloud Release Notes 486 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 487 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 488 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Reduction of Alerts for Anomaly Policies The following anomaly policies have a
reduction from high to medium:
• Account hijacking attempts
• Excessive login failures
• Port scan activity (Internal)
• Port sweep activity (Internal)
• Spambot activity
• Unusual protocol activity (External)
• Unusual protocol activity (Internal)
• Unusual server port activity (External)
• Unusual server port activity (Internal)
• Unusual user activity
The following anomaly policies have a
reduction from high to low:
• Port scan activity (External)
• Port sweep activity (External)
Prisma™ Cloud Release Notes 489 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Delete AWS Security Group Related Policies Changes– The following config policies are
deleted because Cloud Network Analyzer
provides you alerts for resources which are
truly exposed to the Internet. You can create
custom policies to alert on specific ports:
Prisma™ Cloud Release Notes 490 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 491 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Delete Policies to Reduce Alert Fatigue The following policies are deleted to reduce
the number of alerts you receive:
• AWS EBS snapshot is not encrypted
Prisma™ Cloud Release Notes 492 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 493 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 494 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Update Azure CIS v1.4.0 The Azure Storage Account using insecure
TLS version policy has been mapped to Azure
CIS v1.4.0, section 3.12.
Impact— No impact on existing alerts. The
compliance score may be impacted because a
new mapping has been added.
Change Anomaly Policies No Longer Mapped Anomaly policies are no longer mapped
to Compliance Standards to any compliance standard supported on
Prisma Cloud, except for the MITRE ATT&CK
framework.
CHANGE DESCRIPTION
CSPM API for Adoption Advisor A new Adoption Advisor API enables you to
explore data about the security capabilities
you’ve adopted. It also uncovers unused
capabilities that might optimize your security
hygiene.
Prisma™ Cloud Release Notes 495 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
FEATURE DESCRIPTION
Alert Details Updates The drill-downs for alerts have a new look and the navigation
in the console is updated. You can easily edit the policy that
triggered the alert, view the details on the resources and
the policy recommendations in separate tabs, and when you
select the Alert ID, the slide-out panel provides a better view
of the alert details.
In addition, the page load time is much faster.
Prisma™ Cloud Release Notes 496 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Length Limit for Field Names The number of characters in user role name, access keys,
and IP allow list names for Administrative users and Service
Account names on Prisma Cloud is now set to a maximum of
300 characters for each field.
Display Cloud Account Owner The account owner information of AWS Organization and
Details for AWS Organizations member accounts are now fetched from the AWS account
and Member Accounts and displayed on Settings > Cloud Accounts.
datapipeline:DescribePipelines
datapipeline:GetPipelineDefinition
datapipeline:ListPipelines
Amazon S3
aws-s3api-get-bucket-acl
Additional permission required:
s3:GetBucketCORS
Microsoft.Insights/Components/Read
Prisma™ Cloud Release Notes 497 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
microsoft.storagesync/storageSyncServices/
read
Prisma™ Cloud Release Notes 498 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 499 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP API key not restricting any specific API Identifies GCP
API keys that are not restricting any specific APIs. API keys
that are insecure can be viewed publicly such as from a
browser, or accessed on a device where the key resides. As a
best practice, restrict API keys to use only APIs required by
an application.
Policy Updates—Metadata GCP VPC Flow logs for the subnet is set to off
Changes— The CLI command now requires the following
permission to enable GCP Flow logs to capture information
about the IP traffic going to-and-from networks in VPC
Subnets:
compute.subnetworks.update
Prisma™ Cloud Release Notes 500 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated to—
Prisma™ Cloud Release Notes 501 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 502 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated to—
Policy{Unhandled element The AWS entities with risky permissions policy is deleted to
parmname} Deletions avoid duplicate alert after releasing the new OOTB policies
for AWS. It can be replaced by the following new AWS
policies for specific entity types:
• AWS EC2 instance with IAM write access level
• AWS Lambda Function with IAM write access level
• Elasticbeanstalk Platform with IAM write access level
• ECS Task Definition with IAM write access level
• Okta User with IAM write access level
• IAM User with IAM write access level
• AWS EC2 instance with IAM permissions management
access level
• AWS Lambda Function with IAM permissions
management access leve
• Elasticbeanstalk Platform with IAM permissions
management access level
• ECS Task Definition with IAM permissions management
access level
• Okta User with IAM permissions management access
level
• IAM User with IAM permissions management access
level
• AWS EC2 instance with org write access level
• AWS Lambda Function with org write access level
• Elasticbeanstalk Platform with org write access level
• ECS Task Definition with org write access level
• Okta User with org write access level
• IAM User with org write access level
Prisma™ Cloud Release Notes 503 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Support for Azure Security The Azure Security Benchmark (ASB) is a set of best
Benchmark (V3) practices for improving the security of workloads, data, and
services on Azure. ASB is part of a set of holistic security
guidelines that includes:
• Cloud Adoption Framework
• Azure Well-Architected Framework
• Microsoft Security Best Practices
• Microsoft Cybersecurity Reference Architectures (MCRA)
Updates for Azure Key Vault The following Azure Key Vaults related policies have been
Policies updated to include mappings for RBAC and Non-RBAC user
roles:
• Azure Key Vault secret has no expiration date (Non-
RBAC Key vault)
• Azure Key Vault Key has no expiration date (Non-RBAC
Key vault)
Impact— No impact on alerts.
CHANGE DESCRIPTION
Prisma™ Cloud Release Notes 504 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 505 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• GET /template/fields/jira/{integrationId}/
{project}/{issueType}/users/{searchKey}
• GET /template/fields/jira/{integrationId}/
{project}/{issueType}/{jiraEndpoint}/
{fieldType}/{field}
Removal of Access Key API The following endpoint no longer supports the ability to
Ability to Update Expiration update the access key expiration timestamp:
Timestamp
• PUT /access_keys/{id}
Removal of Deprecated Alert The following deprecated alert rules API endpoint has been
Rules Endpoint to List Alert removed:
Rules
• GET /alert/rules
The following alert rules API endpoint provides similar
functionality:
• GET /v2/alert/rule
Role Info in Login Refresh The response object for the following endpoint now includes
Session Endpoint Response a roles attribute, which contains a list of permissions based
on the user role type:
• GET /auth_token/extend
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 506 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Limited GA Adoption Advisor Tracking and measuring your adoption of new features and
existing capabilities on Prisma Cloud just got easier!
The Adoption Advisor gives visibility into your adoption
journey, identifies your unexplored features, helps you make
the most of your investment, and provides guidance on
where to take action.
Code Security The all new Code Security module is here for Prisma Cloud
Enterprise Edition! To proactively improve the security
posture of cloud infrastructure as you create, deploy
and maintain your business impacting resources using
IaC templates and automation pipelines, use the Code
Security module to identify and protect from vulnerabilities,
misconfigurations and compliance violations in IaC templates
such as Terraform, CloudFormation, Helm.
These capabilities enable you to be tightly embedded in
DevOps workflows and tooling to provide fast feedback and
enforce guardrails in code during the development lifecycle.
Armed with a centralized view of all misconfigurations across
scanned repositories on the Prisma Cloud administrative
console that provides filtering and searching to find
code blocks and owners, you can review and address
misconfigurations or violations very quickly. See Features
Introduced in January 2022 for more.
Prisma™ Cloud Release Notes 507 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Refreshed Enterprise Settings The Enterprise Settings page is refreshed to provide a better
UI user experience.
Length Limit for User Profile The number of characters in username, first name, and last
Name Fields name for Administrative users and Service Account names
on Prisma Cloud is now set to a maximum of 300 characters
for each field.
Prisma™ Cloud Release Notes 508 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Operator for Wildcard The like operator is added to enable wildcard (*) support
Support in RQL Attributes so that all available permissions in your cloud accounts are
displayed.
The following example uses the like operator:
Automatic Time Zone The time zone is now set automatically for Prisma Cloud
Detection— Change in administrators. It is derived from the user’s web browser and
Behavior is based on the operating system that is used to access the
Prisma Cloud administrative console.
The Time Zone field that allowed you to select the timezone
is removed from the User Profile, Settings > Users > Service
Account, and Settings > SSO pages.
aws-waf-classic-global-web-acl-resource
and
aws-waf-v2-global-web-acl-resource
wafv2:ListResourcesForWebACL
AWS AppSync
aws-appsync-graphql-api
Additional permissions required:
appsync:ListGraphqlApis
Prisma™ Cloud Release Notes 509 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Amazon DAX
aws-dax-cluster
Additional permissions required:
• dax:DescribeClusters
• dax:ListTags
Amazon DocumentDB
aws-docdb-db-cluster-parameter-group
Additional permissions required:
• rds:DescribeDBClusterParameters
• rds:DescribeDBClusterParameterGroups
• rds:ListTagsForResource
Amazon FSx
aws-fsx-file-system
Additional permissions required:
fsx:DescribeFileSystems
Amazon RDS
aws-rds-db-cluster-parameter-group
Additional permissions required:
• rds:DescribeDBClusterParameters
• rds:DescribeDBClusterParameterGroups
• rds:ListTagsForResource
Amazon QuickSight
aws-quicksight-dataset
Additional permissions required:
• quicksight:ListDataSets
Prisma™ Cloud Release Notes 510 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• quicksight:ListTagsForResource
Amazon QuickSight
aws-quicksight-datasource
Additional permissions required:
• quicksight:ListDataSources
• quicksight:ListTagsForResource
aws-ecr-public-repositories
• ecr-public:GetRepositoryCatalogData
• ecr-public:GetRepositoryPolicy
• ecr-public:ListTagsForResource
cognito-identity:DescribeIdentityPool
ec2:DescribeInstanceAttribute
Prisma™ Cloud Release Notes 511 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
aws-ses-identities
Additional permissions required:
• ses:GetIdentityDkimAttributes
• ses:GetIdentityPolicies
• ses:ListIdentityPolicies
• ses:ListIdentities
Microsoft.CognitiveServices/accounts/read
Microsoft.Network/virtualNetworkGateways/r
ead
Microsoft.Network/privateLinkServices/read
Prisma™ Cloud Release Notes 512 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Microsoft.Network/bastionHosts/read
Microsoft.MachineLearningServices/workspac
es/read
Microsoft.RecoveryServices/Vaults/backupPr
otectedItems/read
Microsoft.RecoveryServices/Vaults/read
Microsoft.Network/ApplicationGatewayWebApp
licationFirewallPolicies/read
apikeys.keys.list
Prisma™ Cloud Release Notes 513 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
gcloud-datafusion-instance
Additional permission required:
• datafusion.instances.list
• datafusion.instances.getIamPolicy
• datafusion.instances.getIamPolicy
compute.sslCertificates.list
dns.policies.list
Prisma™ Cloud Release Notes 514 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
compute.securityPolicies.list
resourcemanager.projects.list
monitoring.notificationChannels.list
inspect cluster-node-pools
OCI Networking
oci-networking-subnet
Additional permission required:
inspect subnets
Prisma™ Cloud Release Notes 515 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 516 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 517 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 518 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 519 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure Front Door does not have the Azure Web application
firewall (WAF) enabled This policy identifies Azure
Front Doors that do not have Azure WAF enabled. It is
recommended to configure the Azure WAF service on the
Front Doors to protect against application-layer attacks. To
block malicious requests to your Front Doors, define the
block criteria in the WAF rules.
Prisma™ Cloud Release Notes 520 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Policy Updates—Metadata AWS CloudFront origin protocol policy does not enforce
HTTPS-only
Changes— The RQL has been updated to report only custom
origins that supports HTTPS communication; it ignores
website endpoints from S3 buckets, EC2 instances, and
custom websites. The policy description has been updated
with newer standards.
Current—
Updated to—
Prisma™ Cloud Release Notes 521 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
'aws-cloudfront-list-distributions'
AND json.rule = enabled is true
and origins.items[*] contains
customOriginConfig and origins.items[?
any(customOriginConfig.originProtocolPolicy
does not contain https-only and
( domainName contains ".data.mediastore."
or domainName contains ".mediapackage."
or domainName contains ".elb." ))] exists
Updated to—
Prisma™ Cloud Release Notes 522 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure App Service Web app doesn’t use latest Java version
Changes— The RQL has been updated to consider Java
8 and Windows web app service for Java. The policy
description and recommendation steps have been updated
accordingly.
Updated to—
Prisma™ Cloud Release Notes 523 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 524 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Updated to—
Prisma™ Cloud Release Notes 525 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
compute.firewalls.update
compute.networks.updatePolicy
Updated to—
Prisma™ Cloud Release Notes 526 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Current RQL—
Updated to—
Policy Deletions AWS entities with risky permissions This policy is being
deprecated and we are adding policies that identify write
permissions for different services on AWS that are risky.
Impact— All existing alerts related to this policy will be
removed. To activate all the new policies verify your global
policy defaults for automatically enabling policies based on
severity by selecting Settings > Enterprise Settings > Auto
enable default policies of the type.
Prisma™ Cloud Release Notes 527 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New IAM Policies Learn about the new IAM out-of-the-box (OOTB) policies.
Prisma™ Cloud Release Notes 528 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 529 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 530 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 531 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 532 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 533 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
CIS Azure v1.4.0 Prisma Cloud provides compliance support for CIS Microsoft
Azure Foundations Benchmark v1.4.0. The CIS Azure v1.4.0
has 9 sections with 115 requirements and Prisma Cloud
supports 86 requirements across all sections.
CHANGE DESCRIPTION
Length Limit for Some User A 300-character limit now applies to request parameters
Profile API Request Body for user and account service names. This limit affects the
Parameters request body parameters for the User Profile API endpoints
shown below. The affected request body parameters are
listed after each endpoint:
• PUT /user/me
• firstName
• lastName
• POST /v3/user
• firstName
• lastName
• username
• PUT /v3/user
• firstName
• lastName
• username
• POST /v2/user
• firstName
• lastName
• PUT /v2/user
• firstName
• lastName
Prisma™ Cloud Release Notes 534 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Integration and New Integration API endpoints are available to replace the
Notification Template API endpoints that have been deprecated for all integrations
Endpoints except Okta, Qualys, and Tenable.
New Notification Template API endpoints are also available
to replace some of the deprecated Notification Template
endpoints.
Prisma™ Cloud Release Notes 535 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
The LGA features are not available on all stacks and are subject to change by the general
availability (GA) release.
LGA Features
FEATURE DESCRIPTION
Support for Onboarding IBM Cloud Prisma Cloud allows you to onboard and
protect your resources deployed on the
IBM cloud infrastructure from a single
console. Gain complete visibility and control
over potential risks within your IBM cloud
infrastructure across all the Multi-Zone
Regions (MZR).
You can now manage vulnerabilities, ensure
compliance, and provide runtime defense for
your resources in the IBM cloud.
Resource Tag Filter in Asset Inventory A new Resource Tag filter is now available
in the Prisma Cloud Asset Inventory, which
allows you to focus on assets based on the
resource tags present. Once you filter based
on the Resource Tag, the Asset Inventory
will display only the assets that contain the
Resource Tags you specified.
Prisma™ Cloud Release Notes 536 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
New Policies
Learn about the new policies and upcoming policy changes for new and existing Prisma Cloud
System policies.
Prisma™ Cloud Release Notes 537 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Policy Updates
Updates to Attack Path Policy Names All Attack Path policy names are being revised
to use a new format to help you identify the
risks and impact better.
Impact— No impact since only the policy
names will be updated.
Policy Updates—RQL
AWS Elastic Load Balancer v2 (ELBv2) with Changes— The policy RQL will updated to
listener TLS/SSL is not configured not trigger an alert when the HTTP listener
requests are redirected to HTTPS URL.
Severity— Low
Policy Type— Config
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 538 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
GCP VM instance configured with default Changes— The policy RQL will updated to
service account check for Default Service Accounts with
editor role.
Severity— Informational
Policy Type— Config
Current RQL—
Updated RQL—
Prisma™ Cloud Release Notes 539 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 540 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Azure AD users with Providing Key Vault config from config from
broad Key Vault access lets users iam where iam where
management access manage key vaults. source.cloud.type source.cloud.type
The least privilege = 'Azure' AND = 'Azure' AND
model should be source.cloud.resource.type
source.cloud.resource.ty
enforced and unused = 'user' AND = 'user' AND
sensitive permissions dest.cloud.service.name
dest.cloud.service.name
= =
should be revoked
'Microsoft.KeyVault'
'Microsoft.KeyVault'
AND AND
dest.cloud.resource.name
dest.cloud.resource.name
= '*' = '*' AND
action.name
DOES NOT END
WITH 'read'
Prisma™ Cloud Release Notes 541 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
API Ingestions
• ssm:GetInventorySchema
• ssm:ListInventoryEntries
ssm:ListInventoryEntries
.
You must manually add or update the CFT
template to enable the following permissions:
• ssm:GetInventory
• ssm:GetInventorySchema
Prisma™ Cloud Release Notes 542 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• binaryauthorization.attestors
.list
• binaryauthorization.attestors
.getIamPolicy
Deprecation Notices
Prisma™ Cloud Release Notes 543 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 544 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 545 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
ISSUE ID DESCRIPTION
RLP-90184 The behavior of filters on the Alerts Overview page is slightly different
from that on the Asset Inventory and Asset Explorer pages. On the
Alerts Overview page when you select the Asset Class, Resource
Type, and Service Name filters, the alerts displayed are a combination
of those three selected filters. Whereas on the Asset Inventory and
Asset Explorer pages, the preference is given to Resource Type over
Service Name when both those filters are selected due to which the
assets for which alerts are displayed on the Asset Inventory and Asset
Explorer pages do not match those displayed on the Alerts Overview
page.
RLP-78777 The AWS Global Accelerator service returns an Access Denied error
with the error assumed-role/PrismaCloudReadOnlyRole/redlock is not
authorized to perform: iam:CreateServiceLinkedRole on resource. The
issue occurs because the aws-global-accelerator-accelerator
API requires you to enable the service-linked IAM role to ingest
metadata. To resolve the error, add the role to include the required
permissions.
Workaround: If you do not want to enable the service-linked role, create
a support ticket with Palo Alto Networks Technical Support to disable
the AWS Global Accelerator service API.
RLP-73807 In Unified Asset Inventory, Compute alerts are not displayed in the
Resource Explorer audit trail.
RLP-72605 The list of alert counts that correspond to a policy are inaccurate when
you select more than one alert rule name. This issue is seen on:
Prisma™ Cloud Release Notes 546 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
• The Alerts > Overview, when you select multiple Alert Rule Names
in the filter, the results for the number of alerts that correspond to a
policy is not accurate. The Alert Rule Filter works as expected when
you select only one Alert Rule Name.
• When you use the POST/alerts/policy API, make sure to include
only one Alert Rule Name for the filters attribute in the request
body schema.
RLP-75376 PCDS Azure only— If you have enabled public access from selected IP
addresses on storage account with Prisma Cloud NAT IPs and Azure
outbound IPs added to the allow list, ingestion fails with 403 error
(permission denied).
RLP-65612 PCDS Azure only— The Inventory page may display 400 error if data is
not available.
RLP-65602 PCDS Azure only— During onboarding when you enter the Client ID and
Secret, if the Secret exceeds the specified length, a bad request error
displays.
RLP-65286 When integrating Prisma Cloud with Jira, if the Jira issueType field
uses space as a separator between the words, such as Service
Request or New Feature , a 500 Internal Server error occurs
while configuring Typeahead fields such as Reporter or Assignee, in
a Notification Template. You will be unable to create a Notification
Template for Jira with the Typeahead fields.
Workaround: Rename the field to remove the space or add an
underscore. For example, ServiceRequest or New_Feature. You can
then add Typeahead fields in a Notification Template.
RLP-65216 If you have configured multiple flow logs for a VPC and if any of the flow
logs are incorrectly configured, the flow log status on Prisma Cloud is
reported as a warning (Amber). This status does not impact ingestion for
all the correctly configured flow logs.
RLP-62558 The resource name displayed on the Alerts L2 page does not match the
name displayed for the same resource on the Asset Explorer page.
RLP-60005 Prisma Cloud may not process some of the delete bucket events, due
to which the buckets that you have deleted in the AWS console will be
visible in the Prisma Cloud Inventory page.
RLP-55036 When changing the Maximum time before access keys expire value for
access keys, it may take up to 15 minutes for the updates to take effect.
Prisma™ Cloud Release Notes 547 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
RLP-40248 When you create an alert rule and specify target resource tags, Prisma
Cloud processes only a single resource tag key/value pair properly.
Proper processing of multiple resource tags or resource tags with
multiple values is not guaranteed. This behavior exists whether you
create the alert rule through the Prisma Cloud console or through the
CSPM API.
RLP-25117 Applies to Prisma Cloud Data Security only The Dashboard displays
an error when you select an account group that does not contain any
accounts.
RLP-19480 The Business Unit Report does not support multi-byte characters used in
languages such as Japanese.
RLP-19470 The Business Unit Report csv file lists all enabled policies even when
there are no open alerts, because there are no resources to scan.
RLP-14469 When you enable Dataflow compression for a cloud account, the
subnetwork creation status may display a failure message on the
onboarding status page. This error displays because the time threshold
to create the subnetwork and report completion exceeds the response
time threshold on Prisma Cloud.
Workaround— Click to the previous page and click next to load the
status page again.
RLP-13485 If you have the maximum number of VPCs (5) already created in the
project and you then enable flowlog compression, the onboarding fails
because Prisma Cloud is unable to add the network needed to enable
Dataflow compression. When this happens the remediation steps in the
message that displays is incorrect.
RLP-9723 The integration status check for Jira displays as yellow instead of red
even if the integration is misconfigured.
— Dashboard widgets don’t load for a large data set where the time
window is also large.
— The configuration build policies are displayed even if you have not
enabled Code Security module.
Prisma™ Cloud Release Notes 548 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
— Currently when you edit default policies in the Code Security module,
the policy is duplicated with the updated metadata. Both the unedited
policy and the edited policy are then visible on Projects when the
Status- Suppressed (for the original policy) and Errors (for the edited
policy) are enabled.
Prisma™ Cloud Release Notes 549 ©2023 Palo Alto Networks, Inc.
Prisma™ Cloud Release Information
Prisma™ Cloud Release Notes 550 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release
Information
Edit on GitHub
Review this section to learn about all the exciting new features in the Prisma Cloud Compute
module.
Prisma™ Cloud is an API-based integration that provides security at all stages of the software
delivery process. It provides visibility in to your resources deployed across different environments,
and checks your adherence to compliance standards and security best practices for your assets at
runtime, and IaC templates and images even before the resources are deployed.
On Prisma Cloud Enterprise Edition, the Compute tab comprises the Cloud Workload Protection
(CWP) capabilities that help you secure your host, containers, and serverless deployments across
public cloud, private cloud and on-premises environments, throughout the application lifecycle.
It combines runtime protection with vulnerability management and compliance to secure cloud
native workloads across build, deploy and run stages of the lifecycle.
This release only includes fixes that are listed in Prisma Cloud Compute Known Issues. The
current Compute version is 31.00.xxx.
To review the current operational status and stay informed of any maintenance notifications, see
https://status.paloaltonetworks.com/.
To stay informed on the Compute capabilities added on Prisma Cloud Enterprise Edition, make
sure you review the following information:
• Features Introduced in August 2023
• Features Introduced in July 2023
• Features Introduced in June 2023
• Features Introduced in May 2023
• Features Introduced in April 2023
• Features Introduced in March 2023
• Features Introduced in February 2023
• Features Introduced in January 2023
• Features Introduced in December 2022
• Features Introduced in November 2022
• Features Introduced in September 2022
• Features Introduced in July 2022
• Features Introduced in June 2022
• Features Introduced in March 2022
• Features Introduced in February 2022
551
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 552 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Defender Upgrade
Plan to Upgrade Defender Versions 22.06 With the v31.00.129 (Newton) release,
and Earlier Defender versions supported (n, n-1, and n-2)
are v31.xx.xxx, v30.xx.xxx, and v22.12.xxx.
To prepare for this update, you must upgrade
your Defenders from version v22.06.xx.xxx
(Kepler) or earlier to a later version. Failure to
upgrade Defenders will result in disconnection
of any Defender version below 22.12 such as
22.06.
Expanded Support for Red Hat’s Non-RPM The Prisma Cloud Intelligence Stream now
Content includes vulnerability data on non-RPM
content from Red Hat, including binaries,
Python scripts, JavaScript files, and Java JAR
files within layered products like OpenShift.
Rather than just flagging these as vulnerable,
Prisma Cloud can now leverage Red Hat’s
own detailed image analysis, enhancing
precision in threat detection.
Prisma™ Cloud Release Notes 553 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Support of Registry Tags directly in Compute Added support for registry labels under
Collections collections to enable role-based access
control (RBAC). The scan results for deployed
images are now segregated with a Custom
label within collections. This enhancement
facilitates the association between the
registry and the scanned images pertaining to
that registry, along with registry-based role-
based access control (RBAC) for improved
security and management.
Support for Continuous Integration Added the ability for users to run CI scans
(CI) Scanning of Images on Linux Using on Linux using the containerd runtime. This
Containerd change benefits customers using Kubernetes
environments, which no longer support
Docker as they need to perform CI scans
without Docker.
GKE CIS Compliance Checks for Worker CIS Benchmark for Google Kubernetes Engine
Nodes (GKE) version 1.4.0 is now supported. This
update includes compliance checks for worker
nodes.
Deprecation Notice
End of Support for Docker Access Control The Docker Access Control at Defend >
Access > Docker and Access User role at
Manage > Authentication > Roles were
Prisma™ Cloud Release Notes 554 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Support for Cloud Native Network The ability to create CNNS policies that
Segmentation (CNNS) Defenders use to limit traffic from containers
and hosts was planned for End of Support
in this release v31.00.129. The deprecation
notice is now extended until the next major
release code named O’Neal (v32.0.xxx).
The configuration settings on the console
(Compute > Defend > CNNS) and the
corresponding APIs for CNNS will be dropped
in v32.0.xxx.
Radar has a container and a host view, where
you can view the network topology for your
containerized apps and hosts respectively, and
this will continue to be available.
List of API endpoints that are no longer
supported:
• PUT, {{/api/v<VERSION>/policies/firewall/
network/container}}
• GET, {{/api/v<VERSION>/policies/firewall/
network}}
• GET, {{/api/v<VERSION>/audits/firewall/
network/container/download}}
• GET, {{/api/v<VERSION>/audits/firewall/
network/container}}
• GET, {{/api/v<VERSION>/audits/firewall/
network/host/download}}
• GET, {{/api/v<VERSION>/audits/firewall/
network/host}}
Support for Code Repo Scanning Scanning your code repositories from the
Prisma Cloud Compute Console at Compute >
Monitor> Vulnerabilities > Code repositories
and use of Twistcli for code repo scanning
was planned for End of Support in this release
v31.00.129. The deprecation notice is now
extended until the next major release code
named O’Neal (v32.0.xxx), when the support
will be dropped.
Prisma™ Cloud Release Notes 555 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
API Changes
Support and Identification of Registry Asset Starting with 31.00, the value in the field type
in Registry Scan for an object returned in the API endpoint
response GET, api/vVERSION/registry is now
registry instead of image.
31.00 and onwards: type
shared.ScanType Possible values:
[registry,ciImage,container,host,agentlessHost,registry,serve
30.03 and earlier: type
shared.ScanType Possible values:
[image,ciImage,container,host,agentlessHost,registry,serverl
Prisma™ Cloud Release Notes 556 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
Enhancements
Package URL (pURL) Format Support for Prisma Cloud now adds package URLs
Vulnerabilities (pURL) for packages and vulnerabilities while
scanning the images using twistcli. This helps
to reliably reference the same software
package using a simple and expressive syntax
and conventions based on familiar URLs.
As you scan images with twistcli, you can filter
the CVEs based on the pURL format in the
CVE viewer.
Prisma™ Cloud Release Notes 557 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Registry Scan Scale Support Increased to Registry image scan limit has been increased
100k Images to 1,000,000 from 100,000 for all image
types.
Support for GitLab Container Registry Added support for scanning GitLab Container
Registry without using admin credentials
to manage and get a full list of all container
registries/images.
Scan Errors Visibility Improvements in To get the most out of agentless scanning,
Agentless Scanning this update categorizes issues during the
agentless scan process, provides detailed
Prisma™ Cloud Release Notes 558 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Added Support for Parallel Agentless Scans of Added the ability for agentless scanning
Accounts/Regions to scan accounts and regions within those
accounts in parallel.
The changes include the following
enhancements.
• The UI shows the status of an ongoing scan
for specific accounts. For example scanning
or completed.
• You can see the general progress of an
ongoing scan on the Compute Cloud
Accounts page instead of in the progress
bar.
• Your hub account is treated as an account
dedicated for agentless scanning, which is
used only to scan other accounts, and no
longer scans itself.
• You can manage the agentless scanning
configuration centrally for all target
accounts in the hub account configuration.
You aren’t required to duplicate the
configuration across all target accounts.
For example, you can set custom
networking configuration only on the hub
account.
Enhanced the Syslog to include the same Added fields to enhance the syslog output in
fields as the API alignment with the API call responses. Fields
were added for container runtime audits, host
runtime audits, container incidents, and host
incidents.
Prisma™ Cloud Release Notes 559 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
API Changes
CHANGE DESCRIPTION
Registry Settings API supports GitLab Starting with 30.03, you no longer need to
Container Registry add GitLab Container Registry through Docker
V2 registry which required administrative
permissions to scan all images.
You can now directly add GitLab Container
Registry in the POST, settings/registry endpoint
by using the new schema gitlabRegistrySpec in
the request body.
To add, you must specify the following
parameters:
• version: Specify the value gitlab for GitLab
Container Registry.
• registry: Specify the GitLab registry URL
address. Example, for native registries,
you can specify the address as "https://
registry.gitlab.com"
• credentialID: Specify the GitLab credential
that you added in the credential store in
Prisma Cloud Compute. For example, an API
token that has atleast the read_api scope.
• gitlabRegistrySpec: Specify at least one of
the following fields:
• userID: Specify your GitLab user ID to add
all registries associated with it.
• projectIDs: Specify the project IDs to add all
registries associated with a GitLab project.
• groupIDs: Specify the group ID to add all
registries associated with a GitLab group.
• excludedGroupIDs: Specify the top-level
group IDs that you don’t want to add.
Old (30.02 and earlier releases)
Example request body schema:
{
"version": "2",
"registry": "",
"credentialID": "<GitLab
Token>",
"repository": "library/
ubuntu",
Prisma™ Cloud Release Notes 560 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
"tag": "16.04",
"os": "linux",
"cap": 5,
"scanners": 2,
"collections": ["All"]
}
{
"version":"gitlab",
"registry":"https://
registry.gitlab.com",
"namespace":"",
"repository":"",
"tag":"",
"credentialID":"<GitLab
Token>",
"os":"linux",
"harborDeploymentSecurity":false,
"collections":["All"],
"cap":5,
"scanners":2,
"versionPattern":"",
"gitlabRegistrySpec":
{"userID":"14631394"}
}
Prisma™ Cloud Release Notes 561 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
Enhancements
Prisma™ Cloud Release Notes 562 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Support custom compliance checks Added support for custom compliance checks
on clusters running containerd runtime.
Added Support for Managed Identities in Added support for Azure Managed Identities
Azure to authenticate any Azure resources
that support AD authentication without
adding keys in Prisma Console. To use
this authentication method, add an Azure
role with required permissions to scan the
resources under Manage > Cloud accounts.
Added new NAT gateway IP addresses Prisma Cloud is adding new NAT IP addresses
for the Compute SaaS Console Region in
GCP. The egress IPs for connections from The
Compute SaaS Console to the internet in us-
east 1 (South Carolina) are: 34.139.64.150
and 34.139.249.192.
Make sure to add these IP addresses to your
allow list. These IP addresses will be added to
the documentation.
Encrypted volumes support in GCP with hub This feature adds the capability to scan
mode encrypted volumes in GCP with agentless
scanning when using hub mode.
Prisma™ Cloud Release Notes 563 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Change in the format of runtime events Replaced the aggregated and rest macros with
information used in notification webhooks the following macros:
• aggregatedAlerts: Returns the aggregated
audit events in JSON format. It represents
the same data as the old aggregated macro
but in JSON format instead of text.
• dropped: Returns the number of alerts that
were dropped after the aggregation buffer
has reached its limit.
This change fixes an issue where some of
the aggregated alerts were missing fields like
ContainerID, Namespace, and User.
The aggregated and rest macros are still
available but are being deprecated after
the two upcoming releases following our
deprecation notice policy. For existing
settings of alert providers, you must edit the
alert structure and use the new macros.
API Changes
CHANGE DESCRIPTION
Monitor the status of an OnDemand and The new API endpoint api/vVERSION/
Regular registry scan registry/progress is available to view the
progress of onDemand and regular ongoing
registry scans. Set the request parameter
onDemand to true to view progress of
an ongoing on-demand scan. By default,
onDemand is set to false and shows the
progress of a regular scan.
CHANGE DESCRIPTION
Defender APIs modified to support the The following APIs have been enhanced to
containerd runtime include support for the containerd runtime
Prisma™ Cloud Release Notes 564 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
{
"consoleAddr":"171.23.0.1",
"namespace":"twistlock",
"orchestration":"kubernetes",
"selinux":false,
"cri":true,
"privileged":false,
"serviceAccounts":true,
"istio":false,
"collectPodLabels":false,
"proxy":null,
"taskName":null,
"gkeAutopilot":false
}
{
"consoleAddr":"171.23.0.1",
"namespace":"twistlock",
"orchestration":"kubernetes",
"selinux":false,
"containerRuntime":"containerd",
Prisma™ Cloud Release Notes 565 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
"privileged":false,
"serviceAccounts":true,
"istio":false,
"collectPodLabels":false,
"proxy":null,
"taskName":null,
"gkeAutopilot":false
}
Deprecation Notice
Macros for Runtime Events Webhooks The aggregated and rest macros will be
deprecated. For the existing webhook
alerts, you can edit the custom JSON
body and replace #aggregated macro with
Prisma™ Cloud Release Notes 566 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 567 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
Enhancements
Support for Third-Party Packages on This feature adds support for scanning
Windows vulnerabilities on third-party packages on
Windows machines: Node-Node.js, Python,
Ruby-Gems, Java-JAR, and NuGet.
Selective Scanning of Hosts with Include Tags The new Include hosts by tag option allows
you to select a subset of your hosts for
scanning based on their tags. The tags
interface is enhanced to help you view and
manage your tags more easily. Additionally,
you can now use wildcards to exclude or
include hosts that match a certain tag pattern.
For example, you can use web-* to include all
hosts that have a tag starting with web-.
Agentless scanning in AWS: Specify a subnet You can now specify a subnet name and use
and use a private IP a private IP from that subnet to report the
Prisma™ Cloud Release Notes 568 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Discovery Date for Host Vulnerability Scan Add Discovery date for the vulnerabilities
Results discovered on the host.
API Changes
CHANGE DESCRIPTION
API URLs versioned as 30.01 Following the versioning number format for
30.xx, all the supported API endpoints will be
versioned as 30.01 in this release. If you are
using the 30.00 endpoints in your automation
workflows and scripts, they will continue to be
supported.
Prisma™ Cloud Release Notes 569 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
• settings/proxy, GET
• settings/proxy, POST
• settings/saml, GET
• settings/scan, GET
• settings/scan, POST
TLS Cipher Support Update Ends the support for the following TLS ciphers
for WAAS:
• TLS_RSA_WITH_AES_128_GCM_SHA256
• TLS_RSA_WITH_AES_256_GCM_SHA384
• TLS_RSA_WITH_AES_128_CBC_SHA
• TLS_RSA_WITH_AES_256_CBC_SHA
AWS Announcement for Phase 1 AWS Lambda runtimes entered .NET Core
Deprecation of.NET Core 3.1 3.1 into phase 1 of deprecation on April 3
2023, and Prisma Cloud has updated the
supported AWS Lambda runtimes in the
system requirements.
See the AWS Lamba runtimes documentation
for more details.
Prisma™ Cloud Release Notes 570 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
Prisma™ Cloud Release Notes 571 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Enhancements
Prisma™ Cloud Release Notes 572 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Agentless Scanning Support for Windows You can now use agentless scanning to
Hosts scan Windows hosts for vulnerabilities and
compliance issues on Amazon Web Services,
Google Cloud Platform, and Microsoft Azure.
Agentless scanning supports the following
versions of Windows.
• Windows Server 2016
• Windows Server 2019
• Windows Server 2022
Agentless scanning is not supported for
containers running on Windows hosts.
Support for Encrypted Volume Agentless You can now use agentless scanning with
Scanning with AWS Hub Accounts your AWS hub accounts to scan encrypted
volumes.
Support for Shared VPC in GCP Agentless scanning in GCP now supports
specifying a shared subnet to communicate
back to Prisma Cloud. Using a shared VPC
requires you to grant Prisma Cloud additional
permissions to create and manage the VPC. If
you are not using a shared VPC, you can use
the existing permission template to configure
agentless scanning.
New Release Numbering Format Starting from this release, that is named
30.00.140, the Prisma Cloud versions have
Prisma™ Cloud Release Notes 573 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Runtime Protection Support for Photon OS Added runtime protection using Defenders for
4.0 Hosts your Photon OS 4.0 hosts.
Support Vulnerability Management for Added support for CentOS Stream 9 for
CentOS Stream 9 vulnerability scanning.
Host VM Tags Collection Update VM tags are now identified during the
platform cloud discovery. You can create new
host collections using the tag metadata of
the cloud hosts. The tags propagate to your
images and containers belonging to the host.
Additional tags captured during Defender
deployment are appended to the existing
tag list and are also available to you when
creating new host collections.
Prisma™ Cloud Release Notes 574 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Customizable CAPTCHA for WAAS Bot You can now embed a custom reCAPTCHA
Protection page branded to fit your application and
protect your website from spam and abuse.
The WAAS Bot Protection is available on
Defend > WAAS > Active Bot Detection.
Prisma™ Cloud Release Notes 575 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Amazon EC2 Auto Scaling Support for WAAS The agentless app firewall permissions
Agentless template for AWS has been revised to include
a policy to support Auto Scaling of EC2
instances. To enable auto scaling, you must
update your AWS CloudFormation permission
template.
API Changes
CHANGE DESCRIPTION
Adds Cache-control Header for all API Adds a header Cache-control: no-store in the
Responses API response to control storing of cache for all
API requests.
Supports Amazon EC2 Auto Scaling in WAAS agentless deployment now supports
WAAS Agentless Deployment automatic scaling of WAAS observers to
handle a large amount of network traffic or
sudden increase of traffic volume.
By default, the feature is disabled. You can
enable the feature by using the PUT method in
the following API endpoint:
/api/vVERSION/policies/firewall/app/
agentless
• autoScalingEnabled: Enables the auto
scaling using Amazon EC2 Auto Scaling
feature for a VPC observer handling
multiple network instances.
Default: False
• autoScalingMaxInstances: Specifies
the maximum deployed instances for
autoscaling deployment.
Prisma™ Cloud Release Notes 576 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
The request and response schema of this API are updated. In the reponse, the entities object
in GET, /api/vVERSION/cloud/discovery is moved to another endpoint GET, /api/v1/cloud/
discovery/entities. For more information, see the new parameters.
API Discovery Retention Policy On the WAAS API Discovery database, if the
database has reached its storage capacity and
new path entries are added for API endpoints,
the Console utilizes the 'Last Observed' date
to remove older entries and improve the
Prisma™ Cloud Release Notes 577 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Name Resolution Change in AKS Clusters Previous versions show the value of the server
field of the cluster kubeconfig file with the
node running the Defender. Now, daemonset
Defenders report the same cluster name
displayed in the Azure portal in their scans.
This change only applies to nodes in resource
groups using the default format Azure assigns
to AKS node resource groups. If you have
a custom name for the AKS node resource
group or the name can’t be resolved, the value
of the server field of the cluster kubeconfig file
is shown.
API Versioning with new Release Numbering Starting with version 30.xx, each maintenance
Format release (like 30.01, 30.02, and so on) may
contain new features and improvements. As a
result, the URLs for the APIs will be updated
to reflect the version.
You can use different .xx versions of the
API at the same time for your automation
requirements as we continue to support
backward compatibility for two major
including minor (maintenance) release
versions behind the current one (n-2). For
example, while on build 30.01, you can
continue to use the API paths such as api/
v30.00, api/v22.12, and api/v22.06 due to
backward compatibility.
Though we recommend you to update scripts
to use the current or new API paths, you
won’t need to worry about making changes to
your code immediately when a new major or
minor (maintenance) release is announced.
Prisma™ Cloud Release Notes 578 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
Enhancements
Defender Upgrade All Improvements When you select to upgrade all Defenders
(Manage > Defenders > Deployed Defenders),
Prisma™ Cloud Release Notes 579 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 580 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
Prisma™ Cloud Release Notes 581 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Enhancements
Added support for Oracle Enterprise Linux You can now run Defenders on OEL 8 and 9
(OEL) 8 and 9. hosts. Prisma Cloud now also protects OEL
containers and images.
Prisma™ Cloud Release Notes 582 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Added support for Red Hat Enterprise Linux 9 You can now run Defenders on RHEL 9 hosts.
on X86 architecture. Prisma Cloud now also protects RHEL 9
containers and images.
Added support for Rocky Linux 8 and 9. You can now run Defenders on hosts running
Rocky Linux 8 and 9. Prisma Cloud now also
protects Rocky Linux containers and images.
Added support for Windows Server 2022. • Container Defenders support the following
features for Windows Server 2022.
• Windows compliance scans
• Vulnerability scans
• Registry scans
• Runtime scans
• CNNS
• Windows metadata scans in Alibaba,
AWS, Azure, and GCP
• Host Defenders support the following
features for Windows Server 2022.
• Windows compliance scans
• Vulnerability scans
• WAAS scans
• Windows metadata scans in Alibaba,
AWS, Azure, and GCP
Improved registry scan logs. Registry scan logs (Manage > Logs > Console)
now include information about registry scans
that failed if there is no Defender available to
scan the registry.
Add log when package manager files are Added a log in cases when during image scan,
missing in the scan the package manager folders required for
the scan (e.g, /var/lib/dpkg) don’t exist. The
log will appear either in the Defender logs or
twistcli stdout. In these cases, the scan might
end with 0 vulnerabilities for this image.
Added support for custom tagging agentless You can specify up to ten tags as a part of the
scanners and resources created within your advanced agentless configuration. These tags
accounts. are added to any previously existing resource
tags.
Prisma™ Cloud Release Notes 583 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Introduced a new column Last changed to API The discovered API Change history log is
Discovery with the date of the latest change shown in the details pane.
to the API.
Prisma™ Cloud Release Notes 584 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
Prisma™ Cloud Release Notes 585 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Support for Talos Linux - container Orchestrator Defenders for Talos Linux are
vulnerabilities and compliance now supported. Talos Linux Defenders allow
you to perform vulnerability and compliance
scans for running containers and perform
registry scans. To deploy on Talos Linux
cluster, use the new "Talos Linux deployment"
toggle in the Defenders deployment page, or
the new --talos flag in twistcli.
The following functionality is not available.
• Scanning of underlying hosts.
• Runtime scanning.
• Agentless scanning.
• Automatic recognition of the cluster name.
• Block policies.
Auto Import Prisma Cloud Accounts for The Cloud accounts onboarded in the
Agentless Scans Platform are now auto-imported under
Manage > Cloud accounts with the default
settings including agentless scanning and
cloud discovery enabled. Both individual
accounts and the accounts of an organization
are auto-imported for compute workload
scanning.
Note: The number of accounts onboarded per
customer is limited to 5K.
Prisma™ Cloud Release Notes 586 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Support for AWS SQS Notification in Added support for AWS SQS as an alert
Compute Alerts trigger under Compute > Manage > Alerts >
Add profile. Prisma Compute users can now
use the AWS SQS integration configured
in the Prisma platform to send compute
workloads alerts to AWS SQS.
Prisma™ Cloud Release Notes 587 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
• gcr.io/distroless/python3-debian11` –
latest
• gcr.io/distroless/java-base-debian11` –
latest
• gcr.io/distroless/java11-debian11` – latest
• gcr.io/distroless/java17-debian11` – latest
• gcr.io/distroless/nodejs-debian11` – 14,
16, 18, latest
Immediate Image Registry Scanning You can now trigger a specific image scan in
the registry and get immediate results. This
allows you to scan the images as soon as they
are added to the registry, without waiting for
the scheduled scans. Triggering the scan is
done using the Scan Registry API, and this API
scan will not interrupt the ongoing scheduled
scans that are run from under Monitor >
Vulnerabilities > Images > Registries.
The registry must first be configured in the
registry settings to scan images.
Deployment Date and Elapsed Time for You can now view the deployment date and
Deployed Image the elapsed time since the image was first
deployed in a container.
See the image details view in the Vulnerability
Explorer and Radar to determine the start
time of a vulnerable image.
Prisma™ Cloud Release Notes 588 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Support for More Registry Entries You can now add up to 19,999 registry
entries to Defend > Vulnerabilities > Images
> Registry settings. And on Monitor >
Vulnerabilities > Images > Registries, view
scan results for a maximum of 100,000
images.
NOTE: When you upgrade to Lagrange, if you
have configured 20,000 entries or more, you
cannot add or update any registry settings
until you are within the limit of 20,000. To
add or modify any registry settings, you must
delete the entries that exceed the limit.
Individual Effects per Protection for The Container runtime policy rules now allow
Container Runtime Policy individual effect per protection, such as. anti-
malware, crypto miners, reverse shell attacks,
etc. instead of one global effect for each
section - Processes, Networking, File System,
and Anti-malware. The effect includes the
following options: Disabled/Alert/Prevent/
Block according to the supported effects for
each detection.
Prisma™ Cloud Release Notes 589 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Custom Certificate Trust for Registry You can now enter a custom self-signed
Scanning certificate while configuring the registry
scans, this allows Prisma Cloud to validate the
registry.
Prisma™ Cloud Release Notes 590 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Support for JFrog Artifactory Registry Scan Fixed an error with JFrog artifactory registry
on JFrog Cloud scan running on JFrog Cloud. With Lagrange,
the Defenders support registry scans and on-
demand scans running on both JFrog On-
prem and JFrog Cloud.
Vulnerability Assessment for Go Packages CVEs in Go packages are now detected at the
package level for more accurate results, and
not only at the module level. To read more
about Go modules and packages, see Modules
overview.
Immediate Alerts for Registry Scan Added support for sending immediate
Vulnerabilities alerts for registry images vulnerabilities.
When configuring alerts under Compute
> Manage > Alerts, the "Immediately alert
for vulnerabilities" toggle now applies not
only to deployed images and hosts but
also to registry images. Furthermore, the
existing trigger for "Image vulnerabilities
(registry and deployed)" is now split into 2
triggers: "Deployed images vulnerabilities" and
"Registry images vulnerabilities", to allow you
to configure your alert profile as granular as
your environment requires.
Prisma™ Cloud Release Notes 591 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Exceptions for Base Image Vulnerabilities For deployed and CI images, you can now
exclude base image vulnerabilities introduced
by the base images or the middleware
image while configuring the Vulnerability
Management rules under Defend >
Vulnerabilities > Images > Deployed/CI. To
use this feature, you need to first specify the
Prisma™ Cloud Release Notes 592 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Alert Trigger Enhancements for Google The following new fields were added to
Security Command Center existing alert triggers for Google SCC.
• Image vulnerabilities (deployed): Includes
the following properties.
• Collections
• Cluster Name
• Account ID
• Container runtime: Includes the following
properties.
• Collections
• Cluster Name
• Account ID
• Incidents: Includes the following
properties.
• Collections
• Cluster Name
• Account ID
The container and image compliance trigger
was added for Google SCC. This new trigger
sends full data with every scan.
Path and Layer Information in Syslog Output The image scan syslog output that the Prisma
Cloud Console produces now includes two
new fields: package_path and layer.
The host scan syslog output that the Prisma
Cloud Console produces now includes one
new field: package_path.
Prisma™ Cloud Release Notes 593 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Regional STS Endpoint Support for Defender AWS recommends the use of a regional
on AWS STS endpoint over the use of the global
STS endpoint sts.amazonaws.com.
When onboarding your AWS cloud
account, you can now use a regional
sts.REGION.amazonaws.com STS endpoint.
Then, your deployed Defenders don’t need
to access the global STS endpoint. Defenders
can get the STS token from the regional STS
endpoint to perform scans such as registry
scans. To enable regional STS endpoints, refer
to the AWS documentation.
Support to Generate Vulnerability Reports by You can filter the Vulnerability (CVE) results
Package and Risk Factors in the Vulnerability Explorer (Monitor >
Vulnerabilities > Vulnerability Explorer)
to view the vulnerabilities present in your
deployments in a package pivot. Similarly, you
can also filter using risk factors.
Prisma™ Cloud Release Notes 594 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Dedicated Defenders for Blobstore Scanning To specialize the function of the Defenders
in Tanzu environments, you can now deploy
dedicated Defenders that only perform
blobstore scanning and are deployed on
dedicated Linux VMs. Use the dedicated
scanners if you want to avoid using the
Defenders installed on the Diego cells
to perform the blobstore scanning. The
dedicated Blobstore scanning Defenders are
not supported on Windows VMs.
Upgrade Confirmation for Defenders on When you upgrade to v22.12, the Defenders
Tanzu in Tanzu environments are automatically
upgraded and the user confirmation for
upgrading to subsequent versions becomes
available. To upgrade the Defenders in your
Tanzu environment starting with the next
update for v22.12, download the latest tile
from the Prisma Cloud Console and import it
into your environment using the Tanzu Ops
Manager. With this change, Tanzu Defender
upgrade is not available directly from the
Prisma Cloud Console.
Added Support for Tanzu Application Service You can now deploy Defenders to scan
(TAS) on Windows your Windows TAS environments. The
Defenders are deployed as addon software
on the Windows Diego cells of your TAS
environment, which is similar to how they
are deployed on Linux. You must now select
the Orchestrator deployment method to
deploy the TAS Defenders. Because of this
change you can filter your TAS Defenders by
foundation.
The following features are not available for
Defenders on Windows TAS environments.
• Scan of applications running Docker
images on TAS
• Use of a proxy to install a tile
• Cert-based authentication
Prisma™ Cloud Release Notes 595 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
New Fields to Splunk Alerts The following fields are added to Splunk
alerts.
• command - Shows the command which
triggered the runtime alert.
• namespaces - Lists the Kubernetes
namespaces associated with the running
image.
• startup process - Shows the executed
process activated when the container is
initiated.
In-Depth Scanning of Nested Java Archives In previous releases, Defenders scanned two
levels deep in nested Java Archives (JARs).
The latest version of Defender can scan
up to ten levels of nested JARs. While this
level of nesting is atypical, this capability
improved the scan accuracy by detecting the
vulnerabilities in the deepest nested jars. You
can view the vulnerabilities in your images
with the following steps.
1. Go to Monitor > Vulnerabilities > Images.
2. Filter the results to show your packages
using JARs.
3. Click on the shown results to see the
details.
4. Go to Package info and filter the results.
Twistcli Sandbox for Third-Party Assessment To help you augment and expand the
Tools compliance checks the twistcli sandbox now
enables you to run a third-party binary/script
of choice within the sandboxed container.
For example: ./twistcli sandbox --token "token"
--volume /opt/sandbox_testing_tools:/opt/
sandbox --analysis-duration 0.1m --third-party-
delay 0.2m --third-party-cmd "/opt/sandbox/
test_tool" --third-party-output /opt/sandbox/
output.txt --v <image:tag>
You can view the scan results on the mounted
volume and on Monitor > Runtime > Image
analysis sandbox. In this example the output
of the 3rd party testing tool will be written to
Prisma™ Cloud Release Notes 596 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Agentless Scanning for Oracle Cloud You can now onboard Oracle Cloud
Infrastructure Infrastructure accounts for agentless
scanning of your hosts on Oracle Cloud
Infrastructure (OCI). You can view the results
of the vulnerability scans on Monitor >
Vulnerabilities > Images> Deployed.
Application Control for Hosts You can now set specific application control
rules to make sure your Linux hosts that are
protected by Defenders, can install or run
Prisma™ Cloud Release Notes 597 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Account Information and Filtering for You can now filter the Serverless functions
serverless functions for vulnerabilities and compliance issues
with specific Account IDs for each Cloud
provider. The account ID column is added
under Defend/Monitor > Vulnerabilities/
Compliance > Functions.
Prisma™ Cloud Release Notes 598 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Enhancement in API Discovery The Monitor > WAAS > API discovery is
enhanced to include all discovered resource
paths with HTTP method, instead of a per-app
view. The API discovery page now includes
Path risk factors to flag endpoints that have
sensitive, unauthenticated, or internet-
accessible data.
Allow list to Bypass Geo Access Control You can now add a specific network list to
bypass the IP-based or Geo-based access
control under Defend > WAAS > Container/
Host/App-Embedded/Agentless > Add/Edit
App > Access control > Network controls >
Exceptions allowing you to exempt specific
IPs from the access control rules.
Prisma™ Cloud Release Notes 599 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
OWASP Mapping for WAAS Events WAAS events are now mapped to the
appropriate OWASP Top 10 risk and OWASP
API Top 10 risk. And, you can view event
summaries for each of these risks on the
WAAS Explorer.
Support TLS in Out-Of-Band Rules WAAS Out-Of-Band now supports TLS (1.0,
1.1, 1.2) protocol.
Simplified Onboarding for VPC Traffic Setting up WAAS for agentless now comes
Mirroring with easier onboarding configuration for
AWS VPC traffic mirroring under Defend >
WAAS > Agentless that auto-deploys the
Prisma™ Cloud Release Notes 600 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
API Changes
CHANGE DESCRIPTION
Supports new body parameters for a You can use the following new optional
Defender daemonset script body parameters in POST, api/vVERSION/
defenders/helm/twistlock-defender-
helm.tar.gz and POST, api/vVERSION/
defenders/daemonset.yaml to create a
daemonset install script for a Defender with
customized parameters: * Annotations *
Tolerations * CPULimit * MemoryLimit *
PriorityClassName * RoleARN
API support for Agentless Scanning Adds support for agentless scanning for
vulnerabilities and compliance in hosts and
containers. You can use the following APIs:
Prisma™ Cloud Release Notes 601 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
POST, api/vVERSION/agentless/templates:
Downloads a tarball file containing the
agentless resource templates required with
the credential for onboarding. POST, api/
vVERSION/agentless/scan: Starts an agentless
scan. GET, api/vVERSION/agentless/progress:
Displays the progress of an ongoing scan.
POST, api/vVERSION/agentless/stop: Stops an
ongoing scan.
Improved Severity Assessment with Exploit Introduces a response parameter exploit for
Data better severity assessment and improved risk
factor calculation in the following APIs: * GET,
api/vVERSION/images * GET, api/vVERSION/
hosts * GET, api/vVERSION/serverless
The improved features include the following:
* Enriched PoC data that helps assigning a
vulnerability with a PoC published around
the web. * New risk factor, Exploit in the
wild, provides information about which CVEs
(from CISA KEV) have a proven risk of being
exploited. * Create alert/block policies for
exploits in the wild vulnerabilities, as well as
for CVEs with PoC. * Improved mechanism
for detecting Remote execution and DoS risk
factors.
New environmental risk factors that adds to
better and improved risk score calculation:
• Sensitive information: Provided in
environment variables or private keys and is
stored in image or serverless function.
• Root Mount: Indicates that the vulnerability
exists in a container with access to the host
filesystem.
• Runtime socket: Indicates that the
vulnerability exists in a container with
access to the host container runtime socket.
• Host Access: Indicates that the vulnerability
exists in a container with access to the host
namespace, network, or devices.
You can use the exploit data to understand the
exploit type, its kind, and get more information
from the source where it’s listed.
Support for Audit Records through APIs Adds support for Audits APIs to create and
store audit event records for all controls.
Prisma™ Cloud Release Notes 602 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 603 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
• GET, api/vVERSION/audits/firewall/app/
agentless/timeslice
• GET, api/vVERSION/audits/firewall/app/
agentless/download
• GET, api/vVERSION/audits/firewall/
network/container
• GET, api/vVERSION/audits/firewall/
network/container/download
• GET, api/vVERSION/audits/firewall/
network/host
• GET, api/vVERSION/audits/firewall/
network/host/download
• GET, api/vVERSION/audits/kubernetes
• GET, api/vVERSION/audits/kubernetes/
download
• GET, api/vVERSION/audits/runtime/app-
embedded
• GET, api/vVERSION/audits/runtime/app-
embedded/download
• GET, api/vVERSION/audits/runtime/
container
• GET, api/vVERSION/audits/runtime/
container/download
• GET, api/vVERSION/audits/runtime/
container/timeslice
• GET, api/vVERSION/audits/runtime/file-
integrity
• GET, api/vVERSION/audits/runtime/file-
integrity/download
• GET, api/vVERSION/audits/runtime/host
• GET, api/vVERSION/audits/runtime/host/
download
• GET, api/vVERSION/audits/runtime/host/
timeslice
• GET, api/vVERSION/audits/runtime/log-
inspection
• GET, api/vVERSION/audits/runtime/log-
inspection/download
• GET, api/vVERSION/audits/runtime/
serverless
• GET, api/vVERSION/audits/runtime/
serverless/download
Prisma™ Cloud Release Notes 604 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
• GET, api/vVERSION/audits/runtime/
serverless/timeslice
• GET, api/vVERSION/audits/trust
• GET, api/vVERSION/audits/trust/download
Supports Viewing 250 Reports or Entries Per The query parameter limit now supports a
Page page size of 250 entries or reports. The default
value is 50 entries or reports per page.
For example: Use the following way to
retrieve the first 250 reports with a limit query
parameter for an API endpoint /hosts:
$ curl -k \
-u <USER> \
-H 'Content-Type: application/
json' \
-X GET \
Prisma™ Cloud Release Notes 605 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
‘https://<CONSOLE>/
api/v<VERSION>/hosts?
limit=250&offset=0’
Support for More Registry Entries You can now add or edit up to 19,999 registry
entries by using the following API: * POST,
api/vVERSION/settings/registry * PUT, api/
vVERSION/settings/registry
DISA STIG Scan Findings and Justifications Every release, we perform an SCAP scan of the
Prisma Cloud Compute Console and Defender
images. The process is based upon the U.S.
Air Force’s Platform 1 "Repo One" OpenSCAP
scan of the Prisma Cloud Compute images. We
compare our scan results to IronBank’s latest
approved UBI8-minimal scan findings. Any
discrepancies are addressed or justified.
Addressed Issues
ISSUE DESCRIPTION
Prisma™ Cloud Release Notes 606 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 607 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 608 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Support for Distro-level Defenders The change will not apply for
Exclusions in Package scans performed by previous
Vulnerability Scans versions of Defenders.
Prisma™ Cloud Release Notes 609 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 610 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Addressed Issues
ISSUE DESCRIPTION
Prisma™ Cloud Release Notes 611 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Addressed Issues
ISSUE DESCRIPTION
PCSUP-11455 fixed in 22.06.228 Setting the collection scope for greater than
6000 collections under runtime policy rules
would freeze, this is now fixed.
Prisma™ Cloud Release Notes 612 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 613 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
HTTPS Proxy Support for Agentless Scanning Agentless scanning now supports connections
over an HTTPS proxy server. If you use
custom certificates for authentication, you
can now configure custom certificates for the
connection to Console when using Agentless
scanning.
Cloud Native Network Segmentation The Cloud Native Network Firewall (CNNF)
is now renamed as Cloud Native Network
Segmentation (CNNS) in Compute > Radars
> Settings , and you can create policies for
enforcing Layer 4 communication from hosts
Prisma™ Cloud Release Notes 614 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Addressed Issues
ISSUE DESCRIPTION
Prisma™ Cloud Release Notes 615 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
TYPE DESCRIPTION
Maven system dependencies With the End of Support for Maven system
dependencies, Defender injection for Java
functions is now implemented using the
bundle as a Maven internal repository. With
this update, <systemPath> dependency is
no longer used.
Compile dependency in Gradle 7.0 With the End of Support for compile
dependency in Gradle 7.0, Defender
injection for Java functions is updated to an
implementation dependency using an internal
repository.
Prisma™ Cloud Release Notes 616 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 617 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
CVE Coverage Update As part of the 22.06 release, Prisma Cloud has
rolled out updates to its vulnerability data for
Common Vulnerabilities and Exposures (CVEs)
in the Intelligence Stream. The new additions
are as follows:
• Support for Github Security Advisories
vulnerabilities including Go, Java, and
Python vulnerabilities.
• Increase of 152% new PRISMA-IDs since
the Joule major release.
• Faster addition of CVEs (pre-filled CVEs).
The pre-filled CVEs were added to the
Intelligence Stream on an average of 56
days before they were analyzed in the
NVD. As an example, the SpringShell
CVE (CVE-2022-22965) was published
on March 31, 2022, and the NVD
analysis was completed on April 8, 2022.
‘PRISMA-2022-0130’ was published for
Prisma™ Cloud Release Notes 618 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
New Filters in the Vulnerability Explorer On the Vulnerability Explorer, you can
now generate a vulnerabilities report using
new filters such as CVSS score and severity
threshold. In addition to viewing the filtered
results for deployed images, registry images,
hosts, and functions under Vulnerability
(CVE) results, on Monitor > Vulnerabilities >
Vulnerability Explorer, you can also download
a detailed report for CVEs in a CSV format or
a detailed report for impacted resources in a
CSV format from the Vulnerability Explorer.
Vulnerability Scan Report for Registry Images With the vulnerabilities report for registry
images (Monitor > Vulnerabilities > Images >
Registries), you can review the top 10 critical
CVEs discovered in your registry images and
search by a CVE ID to view the results for
both registry and deployed images that are
impacted by a CVE.
Prisma™ Cloud Release Notes 619 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Compliance Alert Triggers for Slack You can now trigger and send vulnerabilities
detected for container and image compliance,
and host compliance to your Slack integration.
Integrate with Azure Active Directory Using Prisma Cloud Compute now uses the
SAML 2.0 Microsoft Graph API for integrating with
Azure Active Directory (AD) resources. This
transition is inline with the deprecation
notice from Microsoft of the Azure AD
Graph API and the Azure Active Directory
Authentication Library (ADAL).
For authenticating users on the Prisma
Cloud Console, you must replace the
Directory.Read.All permission for
Azure Active Directory Graph with the
Directory.Read.All permission for the
Microsoft Graph API.
OIDC User Identity Mapping You can map OIDC identities to Prisma Cloud
users as required by the specification. Instead
of using the default sub attribute, you can
now use like email or username .
Prisma™ Cloud Release Notes 620 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Enhanced Coverage for Certificate You can now authenticate with Azure using a
Authentication with Azure certificate for the following integrations:
• Cloud discovery
• Azure Key Vault
• ACR registry scanning
• Azure serverless function scanning
• Azure VM image scanning
Prisma™ Cloud Release Notes 621 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Vulnerability and Compliance Scanning for App-Embedded Defenders can now scan the
Workloads Protected by App-Embedded workloads they protect for vulnerabilities and
Defenders compliance issues. They can also collect and
report package information and metadata
about the cloud environments in which they
run.
Go to Monitor > Vulnerabilities > Images
> Deployed and Monitor > Compliance
> Images > Deployed to review the scan
reports.
Improved Visibility for CaaS Workloads For CaaS (Container as a Service) workloads
Protected by App-Embedded Defenders protected by the App-Embedded Defenders,
you can now view more metadata on the
cloud environment on which it is deployed,
forensics, and runtime audits on the Monitor
> Runtime > App-Embedded observations
page. You can filter the workloads in the table
by a number of facets, including collections,
account ID, and clusters.
Prisma™ Cloud Release Notes 622 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Runtime File System Audits for App- App-Embedded Defender runtime defense
Embedded Defenders now includes support for container file
systems so that you can continuously monitor
and protect containers from suspicious file
system activities and malware.
Automatically Extract Fargate Task To streamline the embed flow and eliminate
Entrypoint at Embed-Time manual intervention (that is updating task
definitions to explicitly specify entrypoints),
Prisma Cloud can automatically find the image
entrypoint and set it up in the protected task
definition.
Now, when Prisma Cloud generates a
protected task definition , it knows the
entrypoint and/or cmd instructions of the
container image during the first run of the
App-Embedded Defender.
Prisma™ Cloud Release Notes 623 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
CloudFormation Template (CFT) Support for You can now generate protected Fargate task
Fargate Task Definitions definitions in the CFT format for embedding
an App-Embedded Defender.
Additional Checks for CIS Benchmark for In 22.06, we’ve added support for more
OpenShift checks from the CIS OpenShift benchmark.
Prisma™ Cloud Release Notes 624 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Support for Google Artifact Registry You can now scan Google Artifact Registries .
Prisma™ Cloud Release Notes 625 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Scan Image Tar Files with twistcli twistcli can scan image tarballs for the
Docker Image Specification v1.1 and later.
Rule to Allow Activity in Attached Sessions When you start a session inside pods or
containers running in your deployment using
commands such as kubectl exec or docker
exec, you can now explicitly specify whether
the rule should allow the activity in attached
sessions. This option on Defend Runtime
Container Policy > Add rule > Processes helps
you reduce the volume of alerts generated for
the allowed activities and processes.
When enabled, process, network, and
filesystem activity executed in an attached
session such as kubectl exec, is explicitly
allowed without additional runtime analysis.
Only Defender versions 22.06 or later will
support this capability.
Prisma™ Cloud Release Notes 626 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Compliance and Custom Compliance Support With agentless scanning you can now scan
hosts from all three major cloud providers
—AWS, Azure, and Google Cloud—against
compliance benchmarks. In addition to out of-
the-box checks, you can apply user defined
custom compliance checks and scan against
the host file system.
Prisma™ Cloud Release Notes 627 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Unscanned Cloud Account Detection You can now easily discover regions within
AWS, Azure, or Google Cloud accounts where
agentless scanning is not enabled, and enable
scanning for those cloud accounts.
Auto-Defend Host Process Update When you set up the process to automatically
deploy Defenders on hosts, this update
ensures that Host Defenders are not deployed
on container hosts. Hosts running containers
Prisma™ Cloud Release Notes 628 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
CIS Linux Benchmark Update The CIS Linux Benchmark now includes 13
additional checks. You can find the additional
controls in the Defend > Compliance > Hosts
> CIS Linux template.
Runtime Protection for Azure Functions Serverless Defenders now offer runtime
protection for Azure Functions. Functions
implemented in C# (.NET Core) 3.1 and 6.0
are supported.
WAAS Out of Band Detection Out of band is a new mode for deploying
Web Application and API Security (WAAS).
It enables you to inspect HTTP messages to
an application based on a mirror of the traffic,
without the need for setting up WAAS as an
inline proxy, so that you can receive alerts
on malicious requests such as OWASP top
alerts, bot traffic, and API events. It provides
you with API discovery and alerting without
impacting the flow, availability, or response
time of the protected web application.
Out of band detection also allows you to
extend your WAAS approach:
• You can monitor your resources deployed
on AWS with VPC traffic mirroring from
workloads. This option gives you the
Prisma™ Cloud Release Notes 629 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
OpenAPI Definition File Scanning You can scan OpenAPI 2.X and 3.X definition
files in either YAML or JSON formats,
and generate a report for any errors or
shortcomings such as structural issues, gaps
in adherence to security guidelines and best
practices.
You can initiate a scan through twistcli, upload
a file to the Console, or import a definition
file in to a WAAS app. The scan reports are
available under Monitor > WAAS > API
definition scan.
Prisma™ Cloud Release Notes 630 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Automatic Port Detection of WAAS When you enable the automatic detection
Applications for Containers or Hosts of ports in WAAS Container, Host, or Out
of band rules, you can secure ports used by
unprotected web applications. The automatic
detection of ports makes it easier to deploy
WAAS at scale because you can protect
web applications without the knowledge
of which ports are used. Additionally, you
can add specific ports to the protected
HTTP endpoints within each app in your
deployment.
Customization of Response Headers You can append or override names and values
in HTTP response headers for Containers,
Hosts, and App Embedded deployments that
are sent from WAAS protected applications.
Prisma™ Cloud Release Notes 631 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
WAAS Actions for HTTP Messages that You can now apply the Alert, Prevent, or
Exceed Body Inspection Limits Ban WAAS actions for HTTP messages that
exceed the body inspection limit and ensure
that messages that exceed the inspection
limit are not forwarded to the protected
application.
To enforce these limitions, you must have a
minimum Defender version of 22.01 (Joule).
And with custom rules ( Defend > WAAS >
Out of band), you can apply Disable or Alert
actions for HTTP messages that exceed the
body inspection limit.
Prisma™ Cloud Release Notes 632 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Regex Match in Forensics Message When defining a custom rule, you can now
define a regular expression to match for
strings and include the matched information
in the forensics message.
Defender Compatibility with Custom Rules To make it easier to review and make sure
that all Defenders meet the minimum version
requirement for a rule, you can now view the
minimum Defender version required to use
each rule. The Defender version information
is displayed in a new column within the
custom rules table.
Prisma™ Cloud Release Notes 633 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
API Changes
CHANGE DESCRIPTION
GET /stats/vulnerabilities/
impacted-resources/download
Introduces a new API endpoint that downloads
a detailed report for impacted resources in a
CSV format.
Prisma™ Cloud Release Notes 634 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
PUT policies/firewall/app/out-of-
band
Introduces a new API endpoint that updates
or edits a WAAS custom rule for out of band
traffic.
GET policies/firewall/app/out-of-
band
Introduces a new API endpoint that discovers
and detects the HTTP traffic for an existing
WAAS out of band custom rule.
GET policies/firewall/app/out-of-
band/impacted
Introduces a new API endpoint that fetches the
impacted resources list for an existing WAAS
out of band custom rule.
POST waas/openapi-scans
Introduces a new API endpoint that scans the
API definition files and generates a report for
any errors, or shortcomings such as structural
issues, compromised security, best practices,
and so on. API definition scan supports
scanning OpenAPI 2.X and 3.X definition files
in either YAML or JSON formats.
GET profiles/app-embedded
Introduces a new API endpoint that fetches the
app-embedded runtime metadata.
GET profiles/app-embedded/download
Introduces a new API endpoint that downloads
the app-embedded runtime profiles in a CSV
format.
GET util/arm64/twistcli
Introduces a new API endpoint that downloads
an x64 bit Linux ARM architecture twistcli in a
ZIP format.
Prisma™ Cloud Release Notes 635 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
GET /stats/vulnerabilities/
impacted-resources
Introduces new optional query parameters
such as pagination and resource type to the
existing API endpoint. To enable backward
compatibility, if you don’t use these optional
query parameters, the API response will display
results without pagination and registry images,
and similar to the response in the previous
releases (Joule or earlier).
Addressed Issues
ISSUE DESCRIPTION
Prisma™ Cloud Release Notes 636 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 637 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
TYPE DESCRIPTION
Prisma™ Cloud Release Notes 638 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
• Debian 10
• RHEL 8.4
• CentOS 8
• Photon OS 4
CHANGE DESCRIPTION
No Image Scanning for Short-lived Containers For short-lived containers, that is, when
a container is created and immediately
terminated, the image will not be scanned. In
previous versions, the image was scanned by
monitoring pull events from the registry.
Change in Prisma Cloud UI Credentials for AWS, GCP, and Azure cloud
accounts are now under Manage > Cloud
Accounts.
Prisma™ Cloud Release Notes 639 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Serial Number Field for Incidents will be The data collection for incidents in the Prisma
Empty Cloud Compute database is capped to 25,000
incidents or 50 MB, whichever limit is reached
first.
After the upgrade to 22.06, if the size of your
incident collection exceeds this limit, then the
oldest incidents that exceed the limit will be
dropped.
As part of this change, the serial number field
for incidents will now be empty. The serial
number was a running count of the incidents
according to the size of the data collection.
Now that the collection is capped, the serial
number is no longer available. To uniquely
identify incidents, use the ID field instead.
Use Category Field to Identify Incident Type A new field category is now available for
incidents alert integration with Webhook and
Splunk to identify the incident type.
Prisma™ Cloud Release Notes 640 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Openshift 3.11 End of Support RedHat has announced the EOL for Openshift
3.11. So, Openshift 3.11 is no longer
supported on Prisma Cloud.
Alert Notifications through External Starting with the Maxwell release, the
Integrations that Overlap on Prisma Cloud external integrations (alert profiles) in
Compute that overlap with the Prisma Cloud
platform will only be supported on the
platform.
Before the Maxwell release, you must set up
new integrations on Settings > Integrations
and delete the overlapping alert profiles
defined under Compute > Manage > Alerts
For the list of overlapping integrations, see
supported alert providers.
EOL for Windows Server 2016 Support for Windows Server 2022 will be
added with or before the Maxwell release
in 2023. With support for Windows Server
2022, Windows Server 2016 will no longer be
supported. Microsoft has announced the EOL
for Windows Server 2016 as of January,2022.
Prisma™ Cloud Release Notes 641 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Notices
Docker Access Control with the Access User Support for Docker Access Control is being
role deprecated along with the Access User role.
Support will be removed in the Newton
release.
Code Security module for Scanning Support for scanning your code repositories
from the Prisma Cloud Compute console
(Monitor > Vulnerabilities > Code
repositories) is being deprecated. Twistcli for
code rep scanning is also being deprecated.
You can use the Code Security module on
Prisma Cloud to scan code repositories
and CI pipelines for misconfigurations and
vulnerabilities.
Support for code repo scanning using Prisma
Cloud Compute will be removed in the
Newton release.
Prisma™ Cloud Release Notes 642 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Support ARM: Add Defenders, twistcli, Console Old defenders and consoles
vulnerabilities support for and Intelligence Stream won’t support ARM64
ARM to the IS ARM support since there isn’t any the
dedicated implementation.
The Intelligence Stream
is updated with ARM64
CVEs for all consoles, but
as we predict, it won’t be
common to get an ARM
related CVE for each x86
CVE. ARM64 Defenders
are required to scan ARM-
based images. Make sure
to assign the appropriate
collections in your Registry
Scanning Scope for x86_64
images and ARM64 images to
prevent errors in the registry
scanning. The ALL collection
automatically includes the
ARM64 Defenders.
Prisma™ Cloud Release Notes 643 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 644 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
Defender • github.com/docker/distribution
• github.com/tidwall/gjson
The following issues are not displayed for Compute resources. Compute is not
vulnerable to these issues because it does not use the ssh package; the vulnerability is
in the implementation of the ssh server in the package.
• Console & Defender—CVE-2022-27191 for golang.org/x/crypto/ssh
• Console—CVE-2020-29652 for golang.org/x/crypto/ssh
Prisma™ Cloud Release Notes 645 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
AKS Version Support Update Prisma Cloud Compute adds support for
AKS 1.22.6 for Linux and Windows with
containerd. See system requirements.
Prisma™ Cloud Release Notes 646 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Feature Description
Prisma™ Cloud Release Notes 647 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Enhanced Scoping for Vulnerability Tags For enhanced exception and metadata reporting
on vulnerabilities, Prisma Cloud allows you to
granularly tag vulnerabilities based on CVE ID,
package, and resources.
Use the Manage > Collections and tags >
Tags page to assign a tag to a CVE for a single
package, or for all the packages affected by
it. You can assign a tag to a specific resource
such as ubuntu:18.04, resources defined
using wildcards (for example, ubuntu:*), and to
multiple resources across your environment. For
container images, when you assign the tag to a
base image, Prisma Cloud automatically assigns
the tag to all its descendant images.
Organization-Level Credentials for GCP You can now use your organization-level
credentials to enable Prisma Cloud to find
and scan all projects in your GCP organization
resource hierarchy. With the support for
organization-level credentials, capabilities
such as cloud discovery and registry scanning
are simplified and you do not need to create
credentials for each project.
Log DNS Queries in Forensics To investigate incidents and events that occur
in your environment, the forensics capabilities
with recording DNS queries are extended to
Prisma™ Cloud Release Notes 648 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 649 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
PII/Sensitive Information Sanitization for You can now you can filter sensitive information
Runtime Events included within Runtime events, such as
commands run inside protected workloads, and
ensure that it is not included in the Runtime
findings (including Forensics, Incidents, Audits.)
onManage > System > General.
For protecting user privacy as well as ensuring
that logs comply with relevant regulations (PCI,
GDPR, HIPAA, amongst others), you have two
options to scrub your sensitive Runtime data in
Prisma Cloud Compute,
• Default scrubbing configuration: automatically
scrub secrets from runtime events. This
configuration is enabled by default when you
upgrade the Console.
• Customize your own regex to detect and
scrub sensitive information, in addition to the
existing capabilities in WAAS.
Prisma™ Cloud Release Notes 650 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Splunk Integration You can now send alerts from Prisma Cloud
Compute Edition Console to Splunk and
consolidate alert notifications to enable your
operations teams. The alert integration with
Splunk uses the Splunk HTTP Event Collector
and the _json source type.
This enhancement is in addition to the existing
Prisma Cloud Enterprise Edition integration with
Splunk.
Extended RBAC Across Prisma Cloud RBAC capabilities across Prisma Cloud enable
Views you to limit data only to specify users and groups
based on the Resource List and Collections
Prisma™ Cloud Release Notes 651 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Kubernetes auditing enhancements for Kubernetes auditing, which ingests audit data
EKS and AKS from Kubernetes clusters to help you identify
risks and security events, now supports AWS
EKS clusters and Azure AKS clusters.The
configuration settings on Defend > Access >
Kubernetes are enhanced to include AWS and
Azure, in addition to the existing GCP support.
Additionally, you can configure Kubernetes
auditing policy rules more granularly using a
cluster filter and apply rules to specific clusters.
Compliance for containerd Containers All CRI runtime compliance checks are now
applicable for containerd containers also.
This feature is not supported on Bottlerocket OS.
Multiple Image Tags Support Image tags are now collected and presented for
image IDs with multiple, different tags.
Prisma™ Cloud Release Notes 652 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
AKS Windows containerd Node Support You can now install the Windows Container
Defender on your Azure Kubernetes Service
(AKS) Windows nodes with containerd runtime.
With Defenders deployed, you can view the
running containers and images on Radar and
leverage the runtime defense capabilities on
Prisma Cloud Compute for these containers;
Vulnerabilities and Compliance scanning are not
supported yet.
Remote VMware Tanzu Blobstores Scan You can now scan remote VMWare Tanzu TAS
blobstores located in a different cloud controller
than the scanning Defender. This capability
provides flexibility when defining the blobstore
scanning Defenders, and eliminates the need to
deploy Defenders in all TAS environments where
you want to perform blobstore scanning.
Prisma™ Cloud Release Notes 653 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Pre-Deployment Scan Support for Hosts You can now scan virtual machine (VM) images
on Azure and GCP on Azure and GCP to detect and harden against
vulnerabilities, compliance issues, and malware
at the pre-deployment stage. For example, if you
have an image with the vulnerable version of the
Apache log4j, the scan will detect and report this
security issue before you deploy any hosts using
the image.
Configure automatic scanning of the VM images
for public, marketplace or private libraries across
your Azure subscription or GCP projects on
Defend > Vulnerabilities > Host > VM images,
and review the scan results on Monitor >
Host > VM Images under Vulnerabilities and
Compliance.
Prisma™ Cloud Release Notes 654 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Collection of Cloud Provider Metadata for Windows Defenders now collect and report
Windows Virtual Machines cloud metadata the same way as Linux
Defenders. Cloud metadata includes things such
as the cloud provider where the Defender runs
(for example, AWS), and the name of the host on
which the Defender is deployed.
Prisma™ Cloud Release Notes 655 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Custom Rules-Extended Functionality The Allow action is now available for WAAS
custom rules. When allowed, requests override
actions set by other protections such as
application firewall, bot protection, API
protection can be applied for traffic that matches
WAAS and runtime rules.
The following transformation functions are
available for creating custom rules - lowercase,
compressWhitespace, removeWhitespace,
urlQueryDecode, urlPathDecode, unicodeDecode,
htmlEntityDecode, base64Decode,
replaceComments, removeCommentSymbols,
removeTags.
API Observations Improvements On Monitor > WAAS > API observations, the
JSON body content is now added to the learning
model.
Schemes will be presented as part of the
observations and will be available for export in
an Open API specification V3 JSON.
Prisma™ Cloud Release Notes 656 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Information on Backward Compatibility New features introduced in this release that will
not be supported by older versions of Defenders.
• Openshift - make changes to crio.conf via
Machine Config Operator only
• Remove PII data from FullProcCmd command
• Defender support for containerd on Windows
• Container compliance support for containers
running on containerd
• Update of Docker CIS to 1.3.1
The following new/modified checks aren’t
supported:1.1.4, 1.1.8, 1.1.12, 1.1.15, 1.1.16,
1.1.17, 1.1.18, 3.23, 3.24. 3.7, 3.8.The rest are
supported.
• Openshfit CIS v1.1.0 support
• Log DNS requests in Forensics
Prisma™ Cloud Release Notes 657 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 658 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 659 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
The list of addressed issues are not cumulative; only the issues that are fixed with the last
published release are included here.
Issue ID Description
Fixed in 31.00.129Fixed Harbor support Fixed an issue limiting the support of Prisma
Cloud Compute as a pluggable scanner in Harbor.
The support is now extended to instances where
the Defenders operate in a CRI environment.
Fixed in 31.00.129Fixed Missing version Fixed an issue that caused missing version
detection in JAR packages detection for jar packages when the version
name included a date, for example, 20171018.
Fixed in 31.00.129Inconsistent reporting Fixed an issue where AKS cluster names were
of AKS cluster names and type not properly processed and the cluster was
incorrectly classified as a generic Kubernetes
cluster instead of an AKS cluster. Now, the
cluster names and their type are properly parsed
as AKS clusters.
Prisma™ Cloud Release Notes 660 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 661 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
PCSUP-9241 Fixed in 30.00.140 For the AWS US Gov region, alerts are not
forwarded successfully to the AWS Security
Hub integration. With this fix, the correct AWS
product ARN for US and China regions are used.
Prisma™ Cloud Release Notes 662 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 663 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Compute Release Information
Prisma™ Cloud Release Notes 664 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security
Release Information
Edit on GitHub
Review this section to learn about all the exciting new features in the Prisma Cloud Code Security
module.
Prisma™ Cloud is an API-based integration that provides security at all stages of the software
delivery process. It provides visibility in to your resources deployed across different environments,
and checks your adherence to compliance standards and security best practices for your assets at
runtime, and IaC templates and images even before the resources are deployed.
Prisma Cloud Code Security module identifies vulnerabilities, misconfigurations and compliance
violations inInfrastructure as Code ( IaC) templates, container images and git repositories.
To view the current operational status of Palo Alto Networks cloud services, see https://
status.paloaltonetworks.com/.
To stay informed on the Code Security capabilities added on Prisma Cloud Enterprise Edition,
make sure you review the following information:
• Features Introduced in 2023—Code Security
• Features Introduced in 2022—Code Security
• Look Ahead—Planned Updates on Prisma Cloud Code Security
665
Prisma Cloud Code Security Release Information
FEATURE DESCRIPTION
Code Security Dashboard APIs Prisma Cloud Code Security (CCS) now
includes the following new Dashboard
endpoints that enable you to get details and
metrics for Code Security related issues:
• Common Errors By Policy
• Code Issues by Severity
• IaC Errors by Category
• Top Non-compliant Package Licenses
• Pull Requests over Time
• Top CVSS Score Vulnerabilities
• Top Repositories by Critical Error Count
• Code issues over time
Prisma™ Cloud Release Notes 666 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
New Features
FEATURE DESCRIPTION
Integrated View of Run and Build details for To help you as a Cloud Security Engineer
Alerts investigate issues from code to cloud, the
alert details now include information to trace
and attribute which build-time resource
has caused a policy violation for a runtime
resource deployed in your cloud account.
The alert details overview includes the IaC
resource details and information on the
build time resource. The new Traceability
information helps you connect an alert from
the production environment back to the origin
templates in your upstream development
environment.
To view the build-time details in an alert:
• You must enable a Configuration policy
with the subtype Run, Build and attach it to
an alert rule on Prisma Cloud.
• Your IaC templates must be onboarded
through a VCS integration.
• Terraform resources must include the
yor_trace tag so that your IaC resources
are tagged with a unique UUID for
tracing the relationship between the code
resource and the runtime resource that is
deployed from it. This is not necessary for
CloudFormation.
Prisma™ Cloud Release Notes 667 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
CSV Export support on Projects For further investigation for issues seen
on Projects (Code Security > Projects) you
can export the scan results across code
category views with configured filters as a
CSV report. The CSV report includes the
following information:
• Code Category: View the code category of
the issue.
• Status: View if the issue is Open,
Suppressed, Fixed, Passed or Fix Pending.
• Severity: View the severity of the issue.
• IaC Category or Risk Factor: View if
the issue is in code category of IaC
misconfigurations or Risk Factor for
Secrets and Vulnerabilities.
• Policy ID: View the Prisma Cloud policy ID
that is non-conformant.
• Policy Reference: Helps you navigate to
the policy reference guide to know more
about the non-conformant policy.
• Title: The policy name or CVE ID based on
the issue.
Prisma™ Cloud Release Notes 668 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 669 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
New Features
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 670 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 671 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
New Features
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 672 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Additional Read permissions for GitHub The GitHub app is being updated to improve
integration security coverage and visibility of your Git
and CI/CD security posture. If you have set
up the GitHub integration on Prisma Cloud
Code Security, you will be prompted to grant
additional Read permissions to the application
on GitHub.
Approving these permissions will enable you
to use the enhanced capabilities that security
teams can use to monitor and optimize their
Git and CI/CD Security posture across the
organization, when it becomes available.
FEATURE DESCRIPTION
Support for Multiple IaC Frameworks on Visual Editor is being enhanced to support
Visual Editor multiple IaC frameworks when creating
custom build policies. This support enables
you to differentiate between Terraform and
CloudFormation framework policies and is
Prisma™ Cloud Release Notes 673 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
New Features
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 674 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Validate Secrets during a Secrets scan When Prisma Cloud performs a secrets scan,
it can now validate certain secrets against
public APIs to see if the secret is still active.
This allows you to prioritize notifications on
secret exposure. Validation is off by default,
but you can enable it Settings > Code Security
Configuration > Validate Secrets. You can
access information on validation of secrets on
Projects > Secrets, using Resource Explorer
where prioritization of a valid secret is either
to Suppress it or perform a Manual Fix.
Alternatively you can run Checkov on your
repositories to filter potentially exposed
secrets.
Prisma™ Cloud Release Notes 675 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Multiple Integrations support from a single Prisma Cloud now supports multiple
Prisma Cloud account on Terraform Cloud integrations for Terraform Cloud Run
and Enterprise Run Task Task and Terraform Enterprise Run Task
organization from a single Prisma Cloud
account.
Policy Updates
High and Medium severity Secrets Policies Changes - The default severity for a few
Secrets Policies in Configuration Build Policies
now includes High and Medium severity. With
Prisma™ Cloud Release Notes 676 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
FEATURE DESCRIPTION
CycloneDX XML Output Format Update There is an update to CycloneDX XML output
format to match Python library updates where
all XML tags are namespaced. This update
helps with serialization and deserialization,
and it may have a breaking impact with
ingesting the SBOM documents.
Prisma™ Cloud Release Notes 677 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Learn about the new Code Security capabilities on Prisma™ Cloud Enterprise Edition (SaaS) in
March 2023.
The following new features or enhancements are available for Prisma Cloud Code Security. These
capabilities help agile teams add security checks to their existing IaC (Infrastructure-as-Code)
model and enforce security throughout the build lifecycle.
• New Features
• Policy Updates
New Features
FEATURE DESCRIPTION
Custom Prisma Cloud Permission group for As a part of custom Prisma Cloud roles
Code Security capabilities for Code Security, administrators can now
define explicit permissions for Code Security
workflows from Permission Group (Settings
> Access Control > Add > Permission Group).
In addition to the existing System Admin
permission you can define roles for:
• View access Permissions: Provide view
access for Code Security Configuration,
Projects, Supply Chain and Development
Pipelines pages.
• Repository permissions: Provide integrate,
view, update and delete access to
Repositories.
Prisma™ Cloud Release Notes 678 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 679 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Secrets Scanning on Git History In addition to the current scans run on your
repositories, Prisma Cloud now scans Git
history to find exposed secrets that are
deleted from code. You can view the scan
results in the resource block on Projects
(Code Security > Projects), Secrets code
category view. On Resource Explorer, you
can also see the commit history on when the
secret was added or removed.
Policy Updates
AWS EBS volume region with encryption is Changes- The Build remediation instructions
disabled are being updated.
Impact- No impact on Code Security findings.
Prisma™ Cloud Release Notes 680 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Policy Deletions
AWS EC2 instance is not configured with Changes- This policy is deleted because
VPC resources are configured in VPC by default.
Impact- Code Security findings for this policy
will no longer be surfaced in scans.
My SQL server enables public network access Changes- This policy is a duplication of an
(duplication of CKV_AZURE_53) existing policy, therefore will be deleted.
Impact- Code Security findings for this policy
will no longer be surfaced in scans.
New Features
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 681 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Code Editor for Custom Secrets In addition to the custom policy for build-
time checks, Code Editor now helps you
define regular expression patterns for Custom
Secrets identified on the Prisma Cloud
console. The policy violation for custom
secrets will continue to be viewable on Code
Security > Projects.
Alert Rules for Detecting Drift With this release, for Drift Detection (Code
Security > Projects), you can now add alert
rules to identify policy drift violations for
account groups and policies to which you
would like to receive alerts within your AWS
and Azure cloud accounts. From the Prisma
Cloud console (Alerts > Overview), you can
access the alert summary and trace the origin
of the drift using the yor_trace tag viewable on
Traceability (Alerts > Overview > Alert Count
> Alert ID)
Prisma™ Cloud Release Notes 682 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 683 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 684 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 685 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 686 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Manage Network Tunnels for self-hosted Establish secure and managed access between
version control systems (VCS) your self-hosted version control systems
(VCS) and Prisma Cloud using Transporter.
After configuring a Transporter in your
environment, followed by authentication
from Prisma Cloud, Transporter establishes a
network tunnel through the WebSocket over
HTTPS. A single Transporter on the Prisma
Cloud can secure multiple VCS integrations,
or you can use multiple Transporters. This
feature will be available on request.
Prisma™ Cloud Release Notes 687 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
New Features
FEATURE DESCRIPTION
Prisma™ Cloud Release Notes 688 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Terraform Cloud ( Run Tasks) With this release, for Terraform Cloud
( Run Tasks)(Settings > Repositories >
Add Repository > Terraform Cloud (Run
Tasks)) integration you can enable specific
configuration run tasks scan during Pre-
plan and Post-plan phase for selected or
all workspaces. Using your preferential
configuration, Prisma Cloud will perform a run
tasks scan on your selected (or all) workspaces
before or after Terraform Cloud generates a
plan.
Prisma™ Cloud Release Notes 689 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
New Configuration Build Policies The following new build policy is available on
Prisma Cloud Code Security module:
• Cleartext credentials over unencrypted
channel should not be accepted for the
operation
• GCP Firewall with Inbound rule overly
permissive to All Traffic
• Rules used could create a double pipeline
• Detect images within GitLab CI workflows
• Container job does not use a non latest
version tag
• Pipeline image version is referenced via an
arbitrary tag
• Pipeline uses mutable development orbs
• Pipeline uses unversioned volatile orbs
• Pipeline uses netcat with an IP address
• Pipeline uses run command that is
vulnerable to shell injection
• Pipeline uses curl in a suspicious way
Prisma™ Cloud Release Notes 690 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 691 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
FEATURE DESCRIPTION
Terraform Cloud Run Tasks For Terraform Cloud Run Tasks, the
Enforcement Settings for IaC Scans were
enforced only when you had enabled the
checkbox to Make Prisma Cloud’s run tasks
mandatory. The Make Prisma Cloud’s run
tasks mandatory is now removed, to make
this behavior consistent with other VCS, IDE,
and CI/CD pipeline integrations for Code
Security.
Impact- If you have an existing Terraform
Cloud Run Task integration on Prisma Cloud
that was not set to mandatory, and have set
the Enforcement Settings threshold for Hard
Fail to anything other than Off such as Low
or above for IaC Scan, the run tasks will now
be mandatory. Builds that were passing earlier
Prisma™ Cloud Release Notes 692 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 693 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
New Configuration Build Policies The following new build policy is available on
Prisma Cloud Code Security module:
AWS Security Group allows all traffic on all
ports
Prisma™ Cloud Release Notes 694 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
The following new features or enhancements are available for Prisma Cloud Code Security. These
capabilities help agile teams add security checks to their existing IaC (Infrastructure-as-Code)
model and enforce security throughout the build lifecycle.
• New Features
• New Policies and Policy Updates
• Changes in Existing Behavior
• REST API Updates
New Features
Feature Description
Prisma™ Cloud Release Notes 695 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
New Configuration Build Policies New build policies are available on Prisma
Cloud Code Security module for the following
categories:
• General - 123 policies
• IAM - 12 policies
• Networking - 34 policies
• Build Integrity - 18 policies
• Secrets - 57 policies
• Kubernetes - 13 policies
• Logging - 4 policies
• Public - 1 policy
Prisma™ Cloud Release Notes 696 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 697 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 698 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Change Description
Code Editor for With this release, you can Test your YAML policy template when creating a
Build Policies rule for a custom policy in build-time checks (Policies > Add Policy > Config).
Additionally, information such as Name and Severity will not be displayed in
the existing example of the YAML policy template on the console. However,
this information will still be visible in your YAML code file. For example, in
your VCS .
CHANGE DESCRIPTION
Prisma Cloud Code Security The following new APIs are available for
Code Security that allow you to retrieve the
code review and integrated VCS repositories
metadata, list of affected resources for
suppression, BOM report and Checkov
version details, single repository and tag rule
details, and enforcement rules.
• BOMReport
• CheckovVersion
• PackagesAlerts
Prisma™ Cloud Release Notes 699 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
• Rules
• Repository
• DevelopmentPipeline
• TagRules: Returns the tag rule by OOTB ID
New Features
Feature Description
Multiple Token Support for Azure Repos The Azure repos integration (Settings >
Repositories > Add Repositories > Azure
Repos) on the Prisma Cloud console now
also supports multiple OAuth tokens. You
can onboard multiple organizations from the
same Azure Repos account (using a single user
token), or enable multiple tokens to onboard
multiple organizations associated with the
Prisma™ Cloud Release Notes 700 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Resource Explorer Enhancements Resource Explorer has four tabs to give you
contextualized understanding of a resource
from code to cloud. Accessible on Code
Security > Projects and Code Security >
Supply Chain, each tab gives you specific
resource metadata:
Prisma™ Cloud Release Notes 701 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Drift Detection for CloudFormation Prisma Cloud now automatically detects and
remediates drift between CloudFormation
and AWS runtime environments. This
enhancement augments the ability to identify
drift for resources deployed using Terraform
on AWS.
From the Prisma Cloud console, you can
also Fix Drift, apply the manual changes that
were made to the cloud resource and apply
them as code in a pull request back to the
CloudFormation template.
Usability Enhancements for Customizing For the default Prisma Cloud Configuration
Build Policy policies of subtype Build, you can now clone
the policy and modify the name or severity
level.
Further, when you use the code editor to
create a custom build policy, the metadata
includes an auto-completion list with only the
relevant options.
New Configuration Build Policies The following new build policies are available
on Prisma Cloud Code Security module:
• Non-compliant license type has been
found on your open source packages
• An unknown license type has been found
among your open source package licenses
Prisma™ Cloud Release Notes 702 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
The following new features or enhancements are available for Prisma Cloud Code Security. These
capabilities help agile teams add security checks to their existing IaC (Infrastructure-as-Code)
model and enforce security throughout the build lifecycle.
• New Features
• REST API Updates
New Features
Feature Description
New Configuration Build Policies The following new build policies will be
available on Prisma Cloud Code Security
module:
• GithHub Actions
ACTIONS_ALLOW_UNSECURE_COMMANDS
environment variable is set to true
Prisma™ Cloud Release Notes 703 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 704 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Updates to Existing Configuration Run The following new Build policies will be added
Policies to the existing Configuration Run policies:
• Alibaba Cloud OSS bucket accessible to
public
• Alibaba Cloud disk encryption is disabled
• Alibaba Cloud RAM password policy does
not have an uppercase character
• Alibaba Cloud RAM password policy does
not have a number
• Alibaba Cloud RAM password policy does
not have a minimum of 14 characters
• Alibaba Cloud RAM password policy does
not have a symbol
• Alibaba Cloud RAM password policy does
not expire in 90 days
• Alibaba Cloud RAM password policy does
not have a lowercase character
• Alibaba Cloud Security group allow
internet traffic to RDP port (3389)
• Alibaba Cloud Security group allow
internet traffic to SSH port (22)
CHANGE DESCRIPTION
Prisma™ Cloud Release Notes 705 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
New API Endpoints for Code The following new API endpoints are available for
Security Prisma Cloud Code Security to fix code errors, set
policies and tag rules, search repositories, remediate
issues, and handle vulnerabilities:
• POST /code/api/v1/errors/supply-chain-
fix
• GET /code/api/v1/errors/files/{uuid}
• POST /code/api/v1/policies/definition/
{queryId}
• POST /code/api/v1/policies
• GET /code/api/v1/policies/table/data
• POST /code/api/v1/policies/{policyId}
• DELETE /code/api/v1/policies/
{policyId}
• POST /code/api/v1/policies/preview
• POST /code/api/v1/policies/clone/
{policyId}
• POST /code/api/v1/remediations/
buildtime
• GET /code/api/v1/remediations/
buildtime/{fixId}
• GET /code/api/v1/remediations/
buildtime/baseFile/{filename}
• GET /code/api/v1/repositories/search
• POST /code/api/v1/supply-chain/nodes
• GET /code/api/v1/tag-rules
• POST /code/api/v1/tag-rules
• GET /code/api/v1/tag-rules/{tagRuleId}
• PUT /code/api/v1/tag-rules/{tagRuleId}
• DELETE /code/api/v1/tag-rules/
{tagRuleId}
• POST /code/api/v1/tag-rules/affected-
resources
• GET /code/api/v1/vulnerabilities/
packages/files/{fileMetadataId}
• GET /code/api/v1/vulnerabilities/
packages/{packageUuid}/direct-sub-
dependencies
Prisma™ Cloud Release Notes 706 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
• GET /code/api/v1/vulnerabilities/
packages/{packageUuid}
• POST /code/api/v1/vulnerabilities/
packages/license-violations
• POST /code/api/v1/vulnerabilities/
packages/search
• GET /code/api/v1/vulnerabilities/
packages/{packageUuid}/cves
See also Code Security API.
New Features
Prisma™ Cloud Release Notes 707 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
New Configuration Build Policies The following new build policies are available
on Prisma Cloud Code Security module:
• OCI private keys are hard coded in the
provider
• OpenStack hard coded password, token,
or application_credential_secret exists in
provider
• OpenStack Security groups allow ingress
from 0.0.0.0:0 to port 22 (tcp / udp)
• OpenStack Security groups allow ingress
from 0.0.0.0:0 to port 3389 (tcp / udp)
• Kubernetes ClusterRoles that grant
control over validating or mutating
admission webhook configurations are not
minimized
• Kubernetes ClusterRoles that
grant permissions to approve
Prisma™ Cloud Release Notes 708 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Updates to Existing Configuration Run The following new Build policies are added to
Policies the existing Configuration Run policies:
• OCI Block Storage Block Volume does not
have backup enabled
• OCI Block Storage Block Volumes are not
encrypted with a Customer Managed Key
(CMK)
• OCI Compute Instance boot volume has
in-transit data encryption is disabled
• OCI Compute Instance has Legacy
MetaData service endpoint enabled
• OCI Compute Instance has monitoring
disabled
• OCI Object Storage bucket does not emit
object events
• OCI Object Storage Bucket has object
Versioning disabled
• OCI Object Storage Bucket is not
encrypted with a Customer Managed Key
(CMK)
• OCI Object Storage bucket is publicly
accessible
• OCI IAM password policy for local
(non-federated) users does not have a
lowercase character
• OCI IAM password policy for local (non-
federated) users does not have a number
Prisma™ Cloud Release Notes 709 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Build Policy Updates-Metadata AWS access keys and secrets are hard coded
in infrastructure
Changes— The cloud type for this policy is
updated from ANY to AWS.
Impact— No impact on alerts.
Prisma™ Cloud Release Notes 710 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 711 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Change Description
Code Reviews With this release, new Enforcement options are available for code reviews.
and Pull With the enhancement, the ability to configure Code Reviews and Pull
Request Bot Request Bot Comments is no longer part of the Code Security Configuration
Comments for on Settings > Code Security Configuration. Instead, these capabilities are
Code Security now available as a part of Enforcement on Code Security > Projects > More
Configuration Actions > Enforcement.
This change does not impact your existing configuration. All your existing
configurations are migrated over as Enforcement settings. You can review
and manage the enforcement thresholds and exceptions from Code Security
> Projects > More Actions > Enforcement.
Prisma™ Cloud Release Notes 712 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Feature Description
Feature Description
Prisma™ Cloud Release Notes 713 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Code Editor for Build When creating a custom policy for build-time checks, you can
Policies now use a Code Editor to build a custom YAML policy template.
The Code Editor is the default view when you create a rule in
Configuration build policy (Policies > Add Policy > Config and as an
example a YAML policy template is available on the Prisma Cloud
console.
Feature Description
IaC Tag and Trace Use the tagging capability to manage resource tags in the most cost
and time-efficient manner, and trace drift in configuration. Tracing
helps you identify what has changed and where, so that you can
keep cloud configurations synchronized with IaC templates.
Using Yor, an auto-tagging tool, all runtime resources are scanned,
and for every non-compliant resource, Yor auto creates a PR (Pull
Request) in the repository for you to review.You can then manage a
list of tag and tag rules for your IaC infrastructure on Code Security
> Projects > Manage Tags to enable or disable auto-created tags
from Yor ( yor_trace), manage out-of-the-box tags, and custom tags,
edit, clone, and delete custom tags, or add a new tag and a tag rule.
Prisma™ Cloud Release Notes 714 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Supply Chain Security To help you assess and mitigate the risks in your supply chain
(Code Security > Supply Chain) provides a view into how your Iac
templates and application security are connected. The dashboard
maps all of the components and processes of your software supply
chain to help you understand the threat surface, identify the risk
chains, and show you where you need to focus your security efforts.
The new supply chain graph leverages a new data model that uses
data from the current scanner findings, to provide you with real-time
discovery of potential misconfigurations and where vulnerabilities
exist in both code and in resources that are deployed. The graph
helps you visualize the files, resources, and pipeline components that
make up your code and ultimately, your cloud environments.
Code Security API The Prisma Cloud Code Security API is now available. This API
enables you to:
• Initiate Code Security scans of repositories you’ve added to
Prisma Cloud
Prisma™ Cloud Release Notes 715 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Feature Description
IaC Security in Git Integrate GitHub, GitLab, BitBucket and Azure repositories natively
Repositories, CI/CD with the Prisma Cloud platform for IaC Security. SaaS as well as on-
and IDEs premise versions of Git solutions, such as GitHub server and GitHub
cloud, are supported.
Prisma™ Cloud Release Notes 716 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Unified Policies for The Out-of the-Box build policies on Prisma Cloud have been
Build-Time and Run- updated to include all IaC Security related policies from Bridgecrew.
Time Checks The name and descriptions of the Bridgecrew policies integrated on
Prisma Cloud have been updated to be consistent with the platform.
New Developer Use the new Developer role to enable developer-centric experiences
Role With Granular on the Prisma Cloud platform and foster collaboration between
Repository Access developers and SecOps. You can also manage access to Git
repositories and restrict access to IaC scan results from specified
repos and for selected users only.
Prisma™ Cloud Release Notes 717 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
The details and functionality listed below are a preview and the actual release date is
subject to change.
FEATURE DESCRIPTION
Code Security has a New Name Starting with 23.8.3, Cloud Application
Security is the new name for the combination
of the Cloud Code Security capabilities and
the newly introduced CI/CD Security module.
CI/CD Security is available as a standard
a-la-carte option or as an add-on with the
Prisma Cloud Runtime Security Foundations
or Advanced bundles.
Owing to the name change, the path to
Projects, Development Pipelines and Supply
Chain will now be Application Security
instead of Code Security on the Prisma Cloud
administrative console. The change does
impact any existing workflows for scanning
and fixing issues.
New Policies for Cloud Application Security Starting with the 23.8.1 release, 125 new
(previously Cloud Code Security) Config policies of subtype Build that enable
the detection of CI/CD security risks will
be enabled by default and available on the
Policies page. With the release, the Code
Security capabilities are being renamed as
Prisma™ Cloud Release Notes 718 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Policy Updates
Migration of Build Integrity Policies to Changes - The Build Integrity policies for
Configuration Build Policies GitHub and GitLab Terraform Providers will
be migrated to IaC Misconfiguration Build
policies in the next release.
Here is the list of policies to be migrated:
• Ensure GitHub repository is Private
• Ensure GitHub repository has vulnerability
alerts enabled
• Ensure GitHub Actions secrets are
encrypted
• Ensure GitHub branch protection rules
requires signed commits
• Ensure Gitlab project merge requests has
at least 2 approvals
• Ensure Gitlab branch protection rules do
not allow force pushes
• Ensure Gitlab project prevents secrets
Impact- You will view policy violations for
these policies on Projects and Supply Chain
in IaC Misconfigurations code category.
Enforcement levels for IaC Misconfigurations
will now be applied to pipelines with these
findings.
Prisma™ Cloud Release Notes 719 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Deprecation Notices
Deprecation Notice
Prisma™ Cloud Release Notes 720 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Deprecation Notice
• GitHub organization security settings do
not include SSO
• GitHub Repository doesn’t have
vulnerability alerts enabled
• GitHub Actions Environment Secrets are
not encrypted
• GitHub merge requests should require at
least 2 approvals
• GitHub organization webhooks do not use
HTTPs
• GitHub repository webhooks do not use
HTTPs
• GitHub branch protection rules do not
require linear history
• GitHub repository has less than 2 admins
• GitHub branch protection rules are not
enforced on administrators
• GitHub branch protection does not dismiss
stale reviews
• GitHub branch protection does not restrict
who can dismiss a PR
• GitHub branch protection does not require
code owner reviews
• GitHub branch protection does not require
status checks
• GitHub branch protection does not require
push restrictions
• GitHub branch protection rules allow
branch deletions
• Ensure container job uses a non latest
version tag
• Ensure container job uses a version digest
• Ensure set variable is not marked as a
secret
• BitBucket pull requests require less than
approvals
Impact- You will not view any policy
violations on Projects and Supply Chain.
Prisma™ Cloud Release Notes 721 ©2023 Palo Alto Networks, Inc.
Prisma Cloud Code Security Release Information
Prisma™ Cloud Release Notes 722 ©2023 Palo Alto Networks, Inc.
Get Help
Edit on GitHub
The following topics provide information on where to find more about this release and how to
request support:
• Related Documentation
• Request Support
723
Get Help
Related Documentation
Edit on GitHub
Refer to the following documentation on the Technical Documentation portal or search the
documentation for more information on our products:
Prisma™ Cloud Release Notes 724 ©2023 Palo Alto Networks, Inc.
Get Help
Request Support
Edit on GitHub
For contacting support, for information on support programs, to manage your account, or to open
a support case, go to https://support.paloaltonetworks.com.
To provide feedback on the documentation, please write to us at:
documentation@paloaltonetworks.com.
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
https://www.paloaltonetworks.com/company/contact-support
Palo Alto Networks, Inc.
www.paloaltonetworks.com
Prisma™ Cloud Release Notes 725 ©2023 Palo Alto Networks, Inc.
Get Help
Prisma™ Cloud Release Notes 726 ©2023 Palo Alto Networks, Inc.
The enhancements to Registry Scanning and twistcli provide superior image scanning capabilities by introducing support for Package URL (pURL) format, which enables reliable referencing of software packages. Additionally, twistcli now supports scanning image tarballs, offering flexibility for vendors delivering container images as tar files. The integration with Kaniko further enhances image build processes within Kubernetes without the Docker daemon .
The update to API ingestion for Google BigQuery involves replacing existing permissions with new ones to include 'cloudasset.assets.searchAllResources' and 'cloudasset.assets.searchAllIamPolicies'. Without these updated permissions, datasets and tables will not be ingested, resulting in no data being available for generating alerts related to BigQuery .
Enabling Azure WAF (Web Application Firewall) on Azure Front Door significantly improves application-layer security by configuring criteria to block malicious requests. This action provides a robust defense mechanism against various web application attacks and enhances overall security posture .
Azure Active Directory (Azure AD) authentication allows for centralized management of identities for Azure SQL Database and SQL Data Warehouse users, enabling seamless integration with other Microsoft services. This centralization enhances security and simplifies user account management .
Enabling GCP Identity-Aware Proxy (IAP) is important because it enforces access control policies for applications and resources, securing connections to External HTTP(s) Load Balancers. This security measure uses signed headers or the App Engine standard environment to verify user identities, thus reducing unauthorized access risks .
The introduction of new Code Security APIs in Prisma Cloud enhances visibility and control over code-related security issues. APIs such as 'Common Errors By Policy' and 'Code Issues by Severity' allow detailed insights into errors and vulnerabilities, helping teams to prioritize fixing efforts. These APIs facilitate integration into existing CI/CD pipelines and development workflows, strengthening the security posture from the codebase .
The policy RQL for GCP PostgreSQL instance database flag configurations has been enhanced by changing the 'contains' operator to 'equals'. This change aims to resolve false alerts that were previously triggered due to collision with similar flag names, such as 'log_statement_stats' .
The updated policy modifies the RQL to ignore case sensitivity for specific subnet names, such as 'GatewaySubnet' and 'AzureFirewallSubnet'. This update means that previously generated alerts, which did not match the exact case for these subnet names, will now be resolved as the policy is updated .
Not adhering to the principle of least privilege in OCI IAM policies introduces significant security risks as it allows non-administrators to have full administrative privileges across the tenancy. This overprivileged access increases the potential for accidental or malicious changes to resources and configurations, leading to data breaches or operational disruptions .
Automated drift detection in Prisma Cloud enhances security and compliance by identifying discrepancies between IaC templates, such as CloudFormation and AWS runtime environments. This capability allows users to detect and correct configuration drifts, ensuring that deployed resources remain aligned with the specified security and compliance standards .