No results found
We couldn't find anything using that term, please try searching for something else.
By Richard Vega, Senior Customer Success Engineer Dashboarding In Prisma Cloud ThePrisma Cloud Darwin release enables you to utilize out of th
By Richard Vega, Senior Customer Success Engineer
Dashboarding In Prisma Cloud
ThePrisma Cloud Darwin release enables you to utilize out of the box dashboards as well as custom dashboards. With the capabilities to track andmonitor your cloud security posture ranging from vulnerabilities to compliance. In this article, we will discuss the existing OOTB dashboards andthe capability of creating custom dashboards in Prisma Cloud.
prerequisite
To view the code to cloud dashboard, complete the following tasks:
figure 1 : codetoclouddashboard_palo – alto – network
A. Code to Cloud Dashboard
TheDashboards > Code to Cloud > late Events Tracker provides a stream of updates to track changes across key metrics such as Threats Detected, Alerts Remediated, Critical Alerts etc., to help you assess the strength of your security posture in real time.
use the late event live stream to quickly assess the potential threat activity take place in your cloud environment . You is click can also double – click on any event to investigate critical vulnerability andbuild – time issue detect . selectSee All Events to see a list of the latest security events across your cloud estate. Select any event to navigate to the specific alert andinvestigate further.
Figure 2: Cloud Inventory_palo-alto-networks
Code to Cloud Inventory provides a panoramic view of your entire cloud estate, helping you understand how well your organization is embracing security best practices across your cloud environment, from individual resources to the entire code pipeline.
Figure 3: Code&Build_palo-alto-networks
TheCode/Build Inventory widget surfaces metrics derived from the monitoring andscanning of hundreds of code repositories across the three repository systems secured by Prisma Cloud scanners including IaC/SCA, andSecrets. Historical developer data for code issues andpull requests are also surfaced.
TheCode Issues in Repositories graph captures code errors in the default branch of all onboarded repositories over the last thirty days. Use this graph to track your team’s progress in resolving code errors before they affect your production systems.
Code andBuild Inventory provides you with a quick rundown of your protected repositories. Select any metric such as Repositories Systems to see a full catalog of all theCode & Build Providers with flags for Code Issues.
Figure 4: DeployInventory_palo-alto-networks
TheDeploy Inventory graph visualizes the critical andhigh severity alerts triggered by vulnerabilities detected in container images andregistries in the last 30 days. Here you can monitor trends in the rate of vulnerabilities identified across your workloads.
Select any metric in the Deploy Inventory table to further investigate the following:
Figure 5: Runtime Inventory_palo-alto-networks
Runtime Inventory helps you quantify anddemonstrate your progress in securing your workloads. TheRuntime graph captures the top critical andhigh severity incidents andalerts triggered by attack path policies in the last 30 days. Review the trendline to track your team’s progress in the remediation andthe burn down of urgent incidents.
select any metric on the Runtime Inventory table to view the total number ofcloud provider andasset, andworkload protect by agent . For instance , you is select can select theWorkloads Protected by Agents metric to view potentially compromised workloads that may be infected with malware.
TheInventory data above is sourced from Prisma Cloud incident, attack Paths, Vulnerability Explorer, andIaC scanning data. Percentages are calculated by tabulating the difference between the latest snapshot anddata points for the last 30 days.
TheCode to Cloud dashboard, also provides you with the option to define your applications orteams andassign owners to track andmonitor progress. You can compare key metrics such as Code Issues in Repositories orUrgent Vulnerabilities in Images across team , business unit andapplication to benchmark security standard .
Thefirst row of the table captures the aggregate of all issues across the tenants in your onboarded accounts. Use the Sort By drop-down to categorize your business unit view across Code/Build, Deploy andRun phases of the application lifecycle.
add row also allows you to create your own custom collection of accounts, application owners orbusiness units to obtain more granular results on risks by individual applications andstakeholders.
Thefollowing caveats apply to Collections:
Figure 6: Command Center Dashboard_palo-alto-networks
B. Command Center Dashboard
TheCommand Center dashboard provides you with a unified view of the top cloud security incidents andrisks uncovered across the assets monitored by Prisma Cloud. It provides security teams with a picture of the highest priority incidents andrisks that require attention across the following attack vectors:
TheCommand Center dashboard is only available to users with a System Admin role.
Thetotal Urgent Alerts bar provides a tally of alerts grouped by incident, misconfiguration, exposure, Identity, andData Risks. TheFilter controls above the Alerts bar allowing you to narrow your investigation to a specific Time Range orAccount Group.
You can select multiple account groups at once to view data from multiple account sources. Filter data retrieved is updated across all the alert visualizations on the dashboard. Therevert icon on the right above the total Urgent Alerts bar allows you to revert back to default filter settings.
figure 7 : Urgent Issues_palo – alto – network
Actionable alert data is further grouped into the following areas by risk type:
Each alerts visualization allows you to further drill down andview the source of the alert by the policy name orthe asset it originated from:
Figure 8: incident Widgets_palo-alto-networks
Theincident widget above for instance, provides three visualizations of urgent alerts activity:
Figure 9: Vulnerability Dashboard_palo-alto-networks
C. Vulnerability Dashboard
Prisma Cloud Vulnerabilities Dashboard gives you a holistic graphical view of all the vulnerabilities across your Code to Cloud environment. An overview of the top impacting CVEs enables you to prioritize vulnerabilities based on existing risks andtrace them from runtime back to the source.
This risk assessment capability helps you to make informed decisions with findings andfix the vulnerable package orbase image in code. This capability will allow you to remediate the root cause andresolve the issue when the build is next executed.
Thedashboard helps you answer:
figure 10 : PrioritizedVulnerabilities_palo – alto – network
OnDashboard > Vulnerabilities you can discover all the vulnerabilities across your environment. Let’s say, there are 25K vulnerabilities in your environment out of which only 20,637 are critical andhigh, 7,470 are exploitable, out of which 7,400 are patchable meaning these vulnerabilities are actionable for you to fix them.
Thefunnel in the Prioritized Vulnerabilities further narrows down to just 35 vulnerable packages that are in use in the runtime that you can focus on.
Thefollowing visualizations are available for you to help contextualize risks from vulnerabilities:
Figure 11: Compliance Dashboard_palo-alto-networks
D. Compliance Dashboard
Prisma Cloud’s Compliance dashboard provides a snapshot view of your overall compliance posture across multiple compliance standards. Thedashboard provides you with an interactive look at how your compliance coverage maps to the established compliance frameworks available within Prisma Cloud.
use the Compliance dashboard as a tool for risk oversight across all the support cloud platform andquickly evaluate your compliance posture using real – time datum . use the provideFilters to hone in on the time period, cloud account, oraccount group you would like to focus on.
By default, the dashboard shows your compliance state for the last 24 hour period. TheCompliance dashboard is available to users with the System Administrator role on all stacks, with the exception of app.gov andapp.cn .
figure 12 : compliance Overview_palo – alto – network
Thecompliance score presents data on the total unique resources that are passing orfailing the policy checks that match compliance standards. Use this score to audit how many unique resources are failing compliance checks andget a quick count on the severity of these failures.
Thelinks allow you to view the list of all resources on the Inventory page, andthe View Alerts link enables you to view all the open alerts of Low, Medium, orHigh severity.
Thecompliance trendline is a line chart that shows you how the compliance posture of your monitored resources have changed over time (on the horizontal X axis). You can view the total number of resources monitored (in blue), andthe number of resources that passed (in green) andfailed (in red) over that time period.
TheCompliance coverage bar graph highlights the passed andfailed resource count across all compliance standards for easy comparison. Select any given compliance standard to view the total number of failed assets for that standard. Click on the compliance standard to view policy details.
figure 13 : Code Security dashboard_palo – alto – network
E. Code Security Dashboard
As a part of Application Security , the Code Security dashboard is provides provide you with a contextual view of the top code security vulnerability andmisconfiguration identify in scan across the code andbuild integration on Prisma Cloud .
It gives you a contextual understanding of high priority errors that require attention across these vectors:
You can view the dashboard on Dashboards > Code Security. TheCode Security dashboard is only available if you have subscribed to Application Security on Prisma Cloud. To know more on user role permissions see Prisma Cloud Administrator Permissions.
TheCode Security dashboard is available to users with the System Administrator role on all stacks, with the exception of app.gov and app.cn .
TheTotal Errors bar provides a summary of code errors across severity of Critical, High, Medium, Low, andInfo. You can see custom results for all Code Security errors using filters that allow you to narrow your investigation to a specific repository , Code Category , orseverity .
You can select multiple repositories, code categories, andseverities at once to narrow your investigation to find critical errors that may need immediate remediation. Filtering the data updates all visualizations on the dashboard. Thereset filters allow you to revert back to default filter settings.
You can also see contextual results for code errors by severity when selecting the number corresponding to the severity giving you access to the results from Prisma Cloud switcher Application Security Projects > Overview. OnProjects, you can execute remedial actions, if necessary.
Thecode errors are actionable andare grouped in these areas:
Figure 14: Code Errors_palo-alto-networks
Figure 15: Code Issues_palo-alto-networks
Figure 16: Pull Requests_palo-alto-networks
figure 17 : Common Errors _ palo – alto – network
figure 18 : manage dashboards_palo – alto – network
F. Custom Dashboards
Custom Dashboards are an option you have in Prisma Cloud to create your own customized views for the different personas in your organization. You can use a combination of the functionality discussed above as well as customize for your organization’s desired result.
You can add andmanage dashboards enable, disable, share, andclone as seen above.
You can also add a new custom dashboard from scratch to fit your specific needs:
figure 19 : add dashboard_palo – alto – network
From here, you can add widgets to customize your dashboard view andshare your dashboard with other Prisma Cloud users.
Figure 20: Custom Dashboard_palo-alto-networks
Prisma Cloud has a number of widgets that can be used to customize your dashboard andslice anddice data as you see fit. Each of these widgets has their own settings as well so you can include things like account groups oredit existing widgets to only contain certain data points – you can be as granular as need be.
To enable shareability of your custom dashboards you will need to make sure the access permissions are set to public:
Figure 21: Access Settings_palo-alto-networks
In this article we talked about the Code To Cloud, Command Center, Vulnerability, Compliance, Code Security, And Custom dashboards that allow you to track, visualize, andshare the metrics that matter most to you andyour team. Widgets with visual representations in various formats such as line andbar graphs andpie charts are available to track key metrics such as assets with the most urgent alerts andvulnerabilities, resource compliance trend charts, andtop risks to remediate. Share dashboard visualizations with your management team to quantify your progress in hardening your security posture.
Richard Vega is a Senior Customer Success Engineer at Palo Alto Networks specializing in securing Multi-Cloud infrastructure andbeing a trusted advisor to large andstrategic customers. Rich is no stranger to wearing many hats andhas worked in Sales, Product, Engineering andCustomer Success in his career so he brings a unique perspective to the table when it comes to working with customers on securing their cloud assets.