[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [AppSec](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security?ts=markdown) 4. [What Is Cloud Detection and Response (CDR)?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr?ts=markdown) Table of Contents * [What Is AppSec?](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security?ts=markdown) * [AppSec Explained](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#appsec?ts=markdown) * [The Fundamentals of AppSec](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#fundamentals?ts=markdown) * [Building Security into the Development Lifecycle](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#building?ts=markdown) * [Implementing Secure Coding Practices](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#implementing?ts=markdown) * [Application Security Testing](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#testing?ts=markdown) * [Implementing Security in CI/CD Pipelines](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#pipelines?ts=markdown) * [Securing Application Architecture](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#architecture?ts=markdown) * [Access Control and Authentication](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#access?ts=markdown) * [Monitoring and Incident Response](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#monitoring?ts=markdown) * [Managing AppSec in Production](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#managing?ts=markdown) * [Training and Building a Security-First Culture](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#training?ts=markdown) * [AppSec Trends](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#trends?ts=markdown) * [AppSec FAQs](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security#faqs?ts=markdown) * [What Is Sandboxing?](https://www.paloaltonetworks.com/cyberpedia/sandboxing?ts=markdown) * [Sandboxing Explained](https://www.paloaltonetworks.com/cyberpedia/sandboxing#sandboxing?ts=markdown) * [Sandboxing in Email Security](https://www.paloaltonetworks.com/cyberpedia/sandboxing#security?ts=markdown) * [Endpoint Sandboxing and EDR](https://www.paloaltonetworks.com/cyberpedia/sandboxing#endpoint?ts=markdown) * [Browser Isolation and Web Sandboxing](https://www.paloaltonetworks.com/cyberpedia/sandboxing#browser?ts=markdown) * [Sandboxing in Cloud-Native Workflows](https://www.paloaltonetworks.com/cyberpedia/sandboxing#workflows?ts=markdown) * [Sandbox Evasion and Threat Actor Tradecraft](https://www.paloaltonetworks.com/cyberpedia/sandboxing#tradecraft?ts=markdown) * [Real-World Case Studies in Sandboxing Effectiveness](https://www.paloaltonetworks.com/cyberpedia/sandboxing#effectiveness?ts=markdown) * [Feeding Sandboxed Intelligence into XDR and SOC Pipelines](https://www.paloaltonetworks.com/cyberpedia/sandboxing#feeding?ts=markdown) * [Sandboxing FAQs](https://www.paloaltonetworks.com/cyberpedia/sandboxing#faqs?ts=markdown) * [Application Security: A Practitioner's Guide](https://www.paloaltonetworks.com/cyberpedia/application-security?ts=markdown) * [Application Security Explained](https://www.paloaltonetworks.com/cyberpedia/application-security#application?ts=markdown) * [Types of Applications Organizations Need to Secure](https://www.paloaltonetworks.com/cyberpedia/application-security#types?ts=markdown) * [Whose Job Is It -- Developers or Security?](https://www.paloaltonetworks.com/cyberpedia/application-security#security?ts=markdown) * [A Pragmatic Guide for Security-Minded Developers](https://www.paloaltonetworks.com/cyberpedia/application-security#developers?ts=markdown) * [Types of Application Security Testing](https://www.paloaltonetworks.com/cyberpedia/application-security#testing?ts=markdown) * [Application Security Tools and Solutions](https://www.paloaltonetworks.com/cyberpedia/application-security#solutions?ts=markdown) * [Compliance Is Not Security, But It's Not Optional Either](https://www.paloaltonetworks.com/cyberpedia/application-security#compliance?ts=markdown) * [Application Security FAQs](https://www.paloaltonetworks.com/cyberpedia/application-security#faqs?ts=markdown) * What Is Cloud Detection and Response (CDR)? * [Cloud Detection and Response (CDR) Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#explained?ts=markdown) * [How CDR Works](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#how?ts=markdown) * [Key Features of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#key?ts=markdown) * [CDR and Other Detection and Response Approaches](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#vs?ts=markdown) * [How CDR and XSIAM Work Together](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#work?ts=markdown) * [How CDR Addresses Unique Challenges in Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#addressing?ts=markdown) * [Key Capabilities of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#capabilities?ts=markdown) * [How CDR Bridges SOC and Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#bridging?ts=markdown) * [Challenges of Implementing CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#potential?ts=markdown) * [CDR Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#practices?ts=markdown) * [Cloud Detection and Response FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#faqs?ts=markdown) * [How to Transition from DevOps to DevSecOps](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops?ts=markdown) * [Initiate a Security-First Culture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#initiate-a-security-first-culture?ts=markdown) * [Incorporate Secure DevOps Practices](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#devops-practices?ts=markdown) * [Automate and Monitor Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#automate-and-monitor-security?ts=markdown) * [Evaluate and Maintain Security Posture](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#maintain-security-posture?ts=markdown) * [Ensure Compliance and Effective Incident Response](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#effective-incident-response?ts=markdown) * [Continuous Improvement in Security](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#improvement-in-security?ts=markdown) * [DevOps to DevSecOps FAQs](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops#faq?ts=markdown) * [Cloud Security Service, Cloud Storage and Cloud Technology](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology?ts=markdown) * [Cloud and Platform as a Service](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#cloud-and-pass?ts=markdown) * [Infrastructure as a Service -- The Public Cloud](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#information-as-a-service?ts=markdown) * [Comprehensive, Scalable Cloud Security with Flexible Licensing Options](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#scalable-cloud-security?ts=markdown) * [Cloud Security Service, Storage and Technology FAQs](https://www.paloaltonetworks.com/cyberpedia/cloud-security-service-cloud-storage-and-cloud-technology#faq?ts=markdown) * [How Does VMware NSX Security Work](https://www.paloaltonetworks.com/cyberpedia/how-does-vmware-nsx-security-work?ts=markdown) * [What Is the Software Development Lifecycle (SDLC)?](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle?ts=markdown) * [Software Development Lifecycle Explained](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#software?ts=markdown) * [Why the SDLC Matters](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#why?ts=markdown) * [Foundational Phases](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#phases?ts=markdown) * [Common SDLC Models](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#common?ts=markdown) * [Security and Compliance Integration](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#security?ts=markdown) * [SDLC in Context](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#context?ts=markdown) * [SDLC Challenges](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#challenges?ts=markdown) * [Choosing or Tailoring an SDLC Model](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#choosing?ts=markdown) * [SDLC Tooling and Automation](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#automation?ts=markdown) * [Version Control and CI/CD Pipelines](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#version?ts=markdown) * [Value-Stream Metrics and Visibility](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#visibility?ts=markdown) * [Cloud, On-Premises, and Hybrid Considerations](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#cloud?ts=markdown) * [Best-Practice Guidelines for High-Velocity Delivery](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#best?ts=markdown) * [Next Steps Toward Lifecycle Maturity](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#next?ts=markdown) * [Software Development Lifecycle FAQs](https://www.paloaltonetworks.com/cyberpedia/sdlc-software-development-lifecycle#faqs?ts=markdown) * [What Is SDLC Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle?ts=markdown) * [SDLC Security Overview](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#sdlc?ts=markdown) * [Security Across the Classic SDLC Phases](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#security?ts=markdown) * [Common Vulnerabilities and Attack Vectors in the SDLC](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#common?ts=markdown) * [Foundational Secure-SDLC Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#practices?ts=markdown) * [Tooling and Automation Layers](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#tooling?ts=markdown) * [Frameworks and Standards for Secure SDLC](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#frameworks?ts=markdown) * [DevSecOps Integration](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#devsecops?ts=markdown) * [Metrics and Continuous Improvement](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#metrics?ts=markdown) * [Advancements in Software Supply Chain Defense](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#advancements?ts=markdown) * [Roadmap to Secure-SDLC Maturity](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#roadmap?ts=markdown) * [SDLC Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-secure-software-development-lifecycle#faqs?ts=markdown) # What Is Cloud Detection and Response (CDR)? 5 min. read [Download The CNAPP Buyer's Guide](https://start.paloaltonetworks.com/cnapp-buyers-guide.html) Table of Contents * * [Cloud Detection and Response (CDR) Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#explained?ts=markdown) * [How CDR Works](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#how?ts=markdown) * [Key Features of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#key?ts=markdown) * [CDR and Other Detection and Response Approaches](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#vs?ts=markdown) * [How CDR and XSIAM Work Together](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#work?ts=markdown) * [How CDR Addresses Unique Challenges in Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#addressing?ts=markdown) * [Key Capabilities of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#capabilities?ts=markdown) * [How CDR Bridges SOC and Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#bridging?ts=markdown) * [Challenges of Implementing CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#potential?ts=markdown) * [CDR Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#practices?ts=markdown) * [Cloud Detection and Response FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#faqs?ts=markdown) 1. Cloud Detection and Response (CDR) Explained * * [Cloud Detection and Response (CDR) Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#explained?ts=markdown) * [How CDR Works](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#how?ts=markdown) * [Key Features of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#key?ts=markdown) * [CDR and Other Detection and Response Approaches](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#vs?ts=markdown) * [How CDR and XSIAM Work Together](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#work?ts=markdown) * [How CDR Addresses Unique Challenges in Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#addressing?ts=markdown) * [Key Capabilities of CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#capabilities?ts=markdown) * [How CDR Bridges SOC and Cloud Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#bridging?ts=markdown) * [Challenges of Implementing CDR](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#potential?ts=markdown) * [CDR Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#practices?ts=markdown) * [Cloud Detection and Response FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr#faqs?ts=markdown) Cloud detection and response (CDR), also referred to as cloud-native detection and response (CNDR) and cloud threat detection and response (CTDR), provides threat prevention, detection, and response capabilities tailored for multicloud environments. It employs agentless technology to offer protection, real-time visibility, and identification of threats, vulnerabilities, misconfigurations, and compliance gaps without interfering with operations. ## Cloud Detection and Response (CDR) Explained Cloud detection and response is a security capability that provides real-time visibility, threat detection, and automated response across cloud environments. It helps security teams identify suspicious activity, correlate data from multiple cloud sources, and take immediate action to mitigate threats. CDR integrates with other security tools like [cloud-native application protection platforms (CNAPP)](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform?ts=markdown) and [security information and event management (SIEM)](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software?ts=markdown) systems to deliver a centralized, proactive defense against cloud threats. ### Enhanced Context and Data Correlation A unified platform that integrates CDR with CNAPP and SIEM tools centralizes data from multiple sources---cloud telemetry, workload activity, identity data, and runtime security events. With this holistic approach teams can: * **Correlate Threat Signals:** By aggregating data from multiple planes (data, identity, network, and control), the platform reduces alert noise and reveals multi-stage attack patterns. * **Prioritize Threats Effectively:** CNAPP tools can identify toxic combinations of risks (e.g., misconfigurations paired with exposed credentials), while CDR uses this context to prioritize threats based on exploitability. ### Streamlined Investigation and Response By consolidating CDR with CNAPP and SIEM capabilities, the platform provides a consistent investigation interface, eliminating the need for tool-switching: * **Unified Investigation Dashboard:** Security teams can trace threats across the entire cloud stack without pivoting between platforms. * **Automated Playbooks:** SIEM integration ensures automated responses (e.g., isolating compromised containers or disabling compromised IAM roles) based on insights from both CNAPP and CDR data. ### Operational Efficiency and Speed A centralized security command center powered by CDR, CNAPP, and SIEM integration reduces operational overhead by: * **Reducing Tool Sprawl:** A single pane of glass view reduces the number of platforms security teams need to manage, improving collaboration across CloudSec, [AppSec](https://www.paloaltonetworks.com/cyberpedia/appsec-application-security?ts=markdown), and SecOps. * **Accelerating Incident Response:** Automated correlation between cloud misconfigurations and runtime threats shortens mean time to detect (MTTD) and respond (MTTR). ### Business and Security Alignment Integration via CDR also supports broader business goals by: * **Lowering Costs:** Consolidation reduces licensing fees, maintenance overhead, and training requirements associated with managing multiple tools. * **Improving Security Posture:** Consistent enforcement of security policies across code, runtime, and infrastructure enhances resilience against modern threats. ## How CDR Works Cloud detection and response joins high-fidelity telemetry with real-time analytics and automated containment to enhances an organization's ability to defend against [cyber attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cyber-attack?ts=markdown). The system ingests control-plane, data-plane, and workload signals, builds incident-grade context on a unified object model, and enforces remediation through cloud-native controls and platform APIs. ### Telemetry Ingestion CDR collects cloud control-plane activity from provider audit logs such as AWS CloudTrail, Azure Activity Logs, and Google Cloud Audit Logs. Many teams now centralize this stream in queryable security lakes, including CloudTrail Lake, to accelerate investigations and enable retention with integrity guarantees. Network-level data flows in from VPC and VNet flow logs and load balancer access logs, while service logs cover gateways, serverless, and managed databases. Workload-level runtime signals arrive through kernel-native instrumentation such as eBPF, which captures process, file, network, and syscall activity across containers and VMs with low overhead. [Kubernetes](https://www.paloaltonetworks.com/cyberpedia/what-is-kubernetes?ts=markdown) audit events and API-server logs round out cluster context. Recent eBPF advances expanded policy enforcement and pre-execution visibility, which strengthens real-time detection without the performance tax of traditional agents. Identity telemetry anchors the model --- IdP sign-ins, token minting and exchange, role assumptions, conditional-access outcomes, and privilege changes. [SaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-saas?ts=markdown) and office-suite events matter as well, given adversaries' lateral moves across mail and storage, for example. Public guidance such as CISA's SCuBA baselines and BOD 25-01 pushed organizations to standardize collection and configuration hygiene across M365 and Google Workspace, improving signal quality for CDR. ### Normalization, Enrichment, and Graphing Pipelines normalize provider-specific events into common schemas, attach cloud resource metadata, and resolve principals to owners and business units. The solution builds a time-ordered graph linking identities, tokens, resources, and network paths, so a single incident object represents the end-to-end exposure and all related activity. That graph powers lineage, blast-radius estimation, and what-changed analysis during response. ### Detection Methods Modern CDR aligns analytic coverage to the [MITRE ATT\&CK](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack?ts=markdown) Cloud matrices for [IaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-a-service?ts=markdown), SaaS, office suites, and identity providers. Engines combine rules, temporal correlation, baselining, and sequence models to surface techniques such as credential abuse, role chaining, cloud persistence, control-plane modification, [lateral movement](https://www.paloaltonetworks.com/cyberpedia/what-is-lateral-movement?ts=markdown) via serverless, container breakout attempts, and [exfiltration](https://www.paloaltonetworks.com/cyberpedia/data-exfiltration?ts=markdown) over sanctioned services. Mapping detections to ATT\&CK clarifies residual gaps and drives roadmap priorities. Behavioral analytics turn raw signals into adversary-centric stories. Examples include detecting anomalous STS role use after conditional-access failure, IMDS probing followed by credentialed API calls, or kubectl exec against a [workload](https://www.paloaltonetworks.com/cyberpedia/what-is-workload?ts=markdown) with no prior operator access. Runtime sensors validate exploit reachability and confirm impact by observing process trees, socket connections, and policy violations at the kernel boundary. Independent references note the growing use of eBPF to achieve this depth with minimal performance impact. ### Case Construction and Triage The system assembles detections, telemetry, and enrichment into a single, incident-grade case object. Ownership, last change, effective permissions, and business criticality attach to the same assets and principals that appear in the graph. Analysts pivot within the case, not across tools, and view ATT\&CK-aligned timelines, related alerts, and recommended next actions. ### Automated Response CDR orchestrates cloud-native controls to contain threats with precision: * **Identity containment**: Revoke refresh tokens, disable risky sessions, reduce role trust, and rotate keys across affected accounts. * **Endpoint and workload isolation**: Quarantine a VM, cordon and drain a node, evict or kill a pod, and block process families observed in the attack path. * **Network interdiction**: Insert narrowly scoped security-group or NSG rules, update firewall policies, and sever egress used for exfiltration. * **Control-plane rollback**: Revert unauthorized policy or configuration changes through versioned templates and organizational policies. * **Data protection**: Lock buckets, disable public access, and enforce service-side encryption where the case indicates exfiltration risk. Provider audit lakes and queryable logs speed scoping and verification during automation, an area where recent CloudTrail Lake enhancements have shortened investigative loops. ### Continuous Verification and Coverage Management Coverage dashboards track ATT\&CK technique detection across cloud, identity, and SaaS surfaces to expose blind spots and measure improvement. Program guidance from CSA and CISA emphasizes structured logging baselines to raise signal quality, which directly improves CDR efficacy. ### Operating Model Effective CDR runs as a joint program between CloudSec, identity, and the SOC. Cloud teams own guardrails and resource metadata quality. The [SOC](https://www.paloaltonetworks.com/cyberpedia/what-is-a-soc?ts=markdown) owns detection logic, triage, and automation policy. Product security validates exploitability and feeds hardening changes back into [infrastructure as code](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown). The shared goal is fewer, higher-confidence cases, faster containment, and durable posture fixes anchored to the same incident object and graph. Aligning to cloud-specific ATT\&CK matrices keeps the program threat-led and measurable. ## Key Features of CDR * **Flexible Deployment**: Supports agent-based and agentless options, allowing seamless integration into cloud environments. * **Centralized Dashboard**: Offers a unified view of threats, vulnerabilities, and compliance status across all cloud assets. * **Real-Time Monitoring** : Continuously tracks workloads, configurations, and activities to detect threats such as malware, [ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-ransomware?ts=markdown), and [data breaches](https://www.paloaltonetworks.com/cyberpedia/data-breach?ts=markdown). * **Automated Response**: Provides actionable insights and automation to enable quick containment of threats. * **Risk Prioritization**: Assesses and ranks risks based on their potential impact, helping security teams focus on critical issues. ![Many Businesses Now Run](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cdr/many-businesses-run-in-the-cloud.jpg "Many Businesses Now Run ") ## CDR and Other Detection and Response Approaches Traditional detection and response solutions are primarily designed for on-premises environments, which need more scalability and flexibility for today's cloud landscapes. Unlike these legacy systems, CDR is purpose-built for cloud environments. It harnesses its expansive resources to provide real-time threat detection and automated response capabilities that meet the dynamic needs of modern cloud-based infrastructures. ### CDR vs. Endpoint Detection and Response (EDR) CDR and [EDR](https://www.paloaltonetworks.com/cyberpedia/what-is-endpoint-detection-and-response-edr?ts=markdown) serve different but complementary roles in cybersecurity. CDR is focused on detecting and responding to threats within cloud environments, while EDR is centered on protecting individual endpoints. Together, they provide a holistic security approach by covering cloud-specific and endpoint-level threats, ensuring comprehensive protection across an organization's entire digital infrastructure. ### CDR vs. Security Information and Event Management (SIEM) CDR and [SIEM](https://www.paloaltonetworks.com/cyberpedia/what-is-siem-software?ts=markdown) complement each other by combining their strengths to provide a comprehensive security solution: 1. **Integrated Data:** CDR feeds cloud-specific telemetry and insights into SIEM, enriching its dataset and improving its overall threat detection and correlation capabilities. 2. **Coordinated Response:** CDR's automated responses to cloud-specific threats can trigger alerts or actions within SIEM, enabling a unified, coordinated response to security incidents across all environments. 3. **Unified Visibility:** Together, cloud detection and response and SIEM provide a complete view of the organization's security posture, ensuring consistent monitoring, detection, and response across cloud, hybrid, and on-premises infrastructures. ### CDR vs. Network Detection and Response (NDR) CDR and [NDR](https://www.paloaltonetworks.com/cyberpedia/what-is-network-detection-and-response?ts=markdown) work together by offering specialized threat detection and response at both the cloud and network levels, ensuring a more resilient and comprehensive security strategy across the organization's digital ecosystem. CDR identifies threats specific to the cloud, while NDR detects threats moving across networks, providing comprehensive coverage of cloud and network layers. Insights from CDR can inform NDR about cloud-specific threats and vice versa, enabling coordinated, faster responses to incidents across the entire environment. ### CDR vs. Cloud Workload Protection Platform (CWPP) [CWPP](https://www.paloaltonetworks.com/cyberpedia/what-is-cwpp-cloud-workload-protection-platform?ts=markdown) and CDR complement each other by addressing different aspects of cloud security, providing a more comprehensive protection strategy. CWPP ensures that the [workloads](https://www.paloaltonetworks.com/cyberpedia/what-is-workload?ts=markdown) are secure, while CDR monitors the broader cloud environment for any threats or anomalies, providing end-to-end protection. CDR specializes in detecting and responding to threats across the entire cloud infrastructure. It continuously monitors services, applications, and networks for malicious activity, misconfigurations, or breaches. It identifies potential threats and provides alerts or automated responses to help mitigate cyber attacks like account takeovers or [malware](https://www.paloaltonetworks.com/cyberpedia/what-is-malware?ts=markdown) infections. In contrast, CWPP protects specific cloud workloads, such as applications, [containers](https://www.paloaltonetworks.com/cyberpedia/what-is-a-container?ts=markdown), virtual machines, and serverless functions. It offers a range of security measures, including [vulnerability management](https://www.paloaltonetworks.com/cyberpedia/what-Is-vulnerability-management?ts=markdown), runtime protection, and compliance management, to secure workloads from development through runtime. Together, CDR and CWPP offer a comprehensive approach to cloud security. ## How CDR and XSIAM Work Together CDR complements [extended security intelligence and automation management (XSIAM)](https://www.paloaltonetworks.com/cyberpedia/what-is-extended-security-intelligence-and-automation-management-xsiam?ts=markdown) by enhancing its capabilities to provide threat prevention, detection, and response for cloud environments. Specifically, CDR Complements XSIAM in the following ways: 1. **Runtime Threat Prevention:** CDR starts with a prevention-first approach, blocking threat activity in real-time on cloud workloads. 2. **Enhanced Detection:** CDR adds cloud-specific threat detection to XSIAM, processing events in the cloud with AI to surface anomalies. 3. **Automated Response:** CDR extends XSIAM response actions to the cloud, enabling faster, automated incident responses tailored for cloud environments. 4. **Unified Data Integration:** CDR feeds [cloud-native](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native?ts=markdown) telemetry into XSIAM, enriching its data for better threat correlation and detection across all platforms. 5. **Streamlined Operations:** With CDR's insights, XSIAM can prioritize alerts and reduce false positives, optimizing security team efficiency. 6. **Comprehensive Security Posture:** Together, CDR and XSIAM create a unified approach to security, protecting against both cloud-specific threats and the rest of the attack surface. ![Bad Actors are Escalating Their Attacks on the Cloud](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-cdr/bad-actors-are-escalating.png "Bad Actors are Escalating Their Attacks on the Cloud") ## How CDR Addresses Unique Challenges in Cloud Security As organizations migrate to the cloud, they encounter new security challenges that traditional tools need help managing. Cloud environments' dynamic and distributed nature introduces complexities such as data overload, rapid infrastructure changes, and fragmented security postures. 1. **Data Overload:** Cloud environments generate vast volumes of data that can overwhelm traditional security tools. CDR uses advanced analytics and [machine learning](https://www.paloaltonetworks.com/cyberpedia/machine-learning-ml?ts=markdown) to efficiently sift through this data, identifying anomalies and potential threats in real time. 2. **Dynamic Infrastructure:** Cloud infrastructure changes continuously, with resources scaling up or down rapidly, making it challenging to enforce consistent security policies. CDR solutions adapt dynamically to these changes, providing continuous protection regardless of the cloud's evolving state. 3. **Fragmented Security:** Integrating multiple cloud services often leads to fragmented security controls and visibility gaps. CDR unifies these elements, providing a cohesive security framework across various platforms to ensure comprehensive coverage. ### How CDR Addresses Today's Cloud Threats CDR has become a critical tool in modern cybersecurity, explicitly designed to handle the unique threats cloud environments pose as cybercriminals employ sophisticated tactics like advanced malware, [phishing](https://www.paloaltonetworks.com/cyberpedia/what-is-phishing?ts=markdown), ransomware, and [lateral movement](https://www.paloaltonetworks.com/cyberpedia/what-is-lateral-movement?ts=markdown) attacks. CDR leverages cloud-native capabilities to detect and respond to these threats swiftly. CDR enhances threat detection and streamlines [incident response](https://www.paloaltonetworks.com/cyberpedia/what-is-incident-response?ts=markdown) by providing centralized visibility across multicloud and hybrid environments. It integrates machine learning and [artificial intelligence](https://www.paloaltonetworks.com/cyberpedia/artificial-intelligence-ai?ts=markdown) to automatically analyze large data volumes, identify risks, and initiate responses faster than ever before. ### Proactive Cloud Security CDR represents a proactive approach to cloud security, ensuring that even the most complex threats are quickly identified and neutralized. This approach reinforces the resilience of cloud-based operations, helping cybersecurity teams stay ahead in the ongoing battle against sophisticated attackers. ## Key Capabilities of CDR CDR systems offer essential capabilities to safeguard cloud environments. ### Continuous Security Monitoring Real-time analytics scrutinize cloud environments, detecting anomalies instantly. Security teams gain actionable insights through continuous data collection and analysis. This persistent vigilance ensures rapid identification of vulnerabilities and maintains up-to-date analysis against sophisticated cyberattacks. ### Threat Intelligence and Analytics CDR systems analyze large datasets and enhance threat detection through pattern recognition and anomaly detection. Machine learning models predict potential threats, while real-time analytics and historical data correlation enable proactive defense measures. ### Real-Time Threat Detection Sophisticated algorithms analyze vast data streams, pinpointing suspicious behavior instantly. Machine learning models adapt to evolving threats, enhancing detection accuracy. Security teams receive immediate alerts, allowing rapid intervention. This proactive stance mitigates risks before they escalate, safeguarding [sensitive data](https://www.paloaltonetworks.com/cyberpedia/sensitive-data?ts=markdown) and maintaining operational integrity. ### Automated Response and Remediation Systems autonomously identify and alert teams to threats, dramatically reducing response times. AI-driven tools execute predefined remediation protocols, ensuring consistent and swift action. This automation minimizes human error and frees up security teams to focus on complex issues. Continuous learning from each incident refines future responses and security resilience. ### Integration with Existing Tools CDR systems integrate seamlessly with existing security tools, such as SIEM platforms, consolidating alerts and streamlining incident response. This integration allows security teams to manage and mitigate risks efficiently across diverse environments, ensuring a cohesive defense strategy. ### Automating Compliance Reporting A CDR solution automates compliance reporting by continuously monitoring and alerting on security policies, providing real-time visibility into cloud environments, and generating automated reports that align with regulatory requirements. #### Continuous Monitoring and Real-Time Alerts CDR solutions continuously monitor cloud activities, including data access, file transfers, and user behavior, to detect any policy violations or suspicious activities that could impact compliance. When a potential breach or noncompliance event is detected, the system can trigger real-time alerts, allowing for immediate response and remediation. #### Automated Policy Enforcement CDR solutions automatically enforce security policies and controls aligned with compliance standards, such as [GDPR](https://www.paloaltonetworks.com/cyberpedia/gdpr-compliance?ts=markdown), [HIPAA](https://www.paloaltonetworks.com/cyberpedia/what-is-hipaa?ts=markdown), [PCI DSS](https://www.paloaltonetworks.com/cyberpedia/pci-dss?ts=markdown), or others. By setting predefined rules, the system ensures that only authorized actions are performed and automatically blocks or mitigates unauthorized activities, reducing the risk of compliance violations. #### Compliance Reporting and Audit Readiness CDR solutions provide automated compliance reporting features that generate detailed reports on security events, incidents, and remediation actions. These reports are designed to meet the specific requirements of regulatory bodies, making it easier for businesses to demonstrate compliance during audits. The solution can also maintain an audit trail of all cloud activities, simplifying the documentation process for compliance purposes. #### Data Protection and Privacy Management CDR solutions help automate data protection by identifying and categorizing sensitive data, ensuring it is appropriately encrypted, stored, and accessed according to regulatory requirements. They can also detect and respond to data breaches or leaks, ensuring that personal and sensitive data remains secure and compliant with privacy laws. #### Integration with Compliance Frameworks Many CDR solutions integrate directly with industry-standard compliance frameworks and tools, automating the mapping of security controls to compliance requirements. This integration allows organizations to automatically align their cloud security posture with regulatory obligations, reducing manual effort and the risk of human error. ### Detecting Threats Pre-Exfiltration Organizations can proactively detect threats and reduce vulnerabilities by combining advanced threat detection techniques and comprehensive security measures. Machine learning algorithms and real-time analytics monitor network traffic and user behaviors to identify anomalies and deviations from established baselines, flagging suspicious activities before data exfiltration occurs. Threat intelligence platforms correlate these anomalies with known threat patterns, while behavioral analysis tools detect unusual access attempts and unauthorized data movements, enabling early threat interception and preventing data breaches. ### Reducing the Attack Surface To minimize potential vulnerabilities, do the following: * Implement strict access controls and network segmentation to limit attackers' entry points. * Isolate critical assets to reduce risk. * Use automated patch management to address security gaps quickly. * Regularly audit and remove unused services and accounts to eliminate unnecessary risks. Organizations can effectively reduce how attackers exploit weaknesses by continuously monitoring and improving these measures. ## How CDR Bridges SOC and Cloud Security CDR improves security by unifying security operations centers (SOC) and [cloud security (CloudSec)](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-security?ts=markdown) through centralized visibility, streamlined collaboration, and automated threat response. Here's how: ### Centralized Data and Visibility CDR consolidates data from both SOC and CloudSec sources, providing a unified view of cloud-native application activity, security events, and infrastructure behavior. This eliminates the blind spots caused by tool fragmentation and enables both teams to work from the same security dataset. * **SOC Benefit:** Access to cloud-specific telemetry alongside enterprise data. * **CloudSec Benefit:** Context on real-time threats alongside cloud misconfigurations and vulnerabilities. ### Consistent Threat Detection and Prioritization By correlating signals from the cloud control plane, workload activity, and identity sources, CDR ensures both SOC and CloudSec teams prioritize the most critical threats. * **SOC Benefit:** Faster identification of high-risk cloud threats without manual data correlation. * **CloudSec Benefit:** Clear visibility into how cloud misconfigurations may be exploited during active attacks. ### Automated and Coordinated Incident Response CDR enables automated response actions based on prebuilt playbooks, reducing manual effort and accelerating containment across both cloud and on-premises environments. * **SOC Benefit:** Automated responses for cloud-based threats integrated into broader enterprise-wide security playbooks. * **CloudSec Benefit:** Immediate containment of cloud-native threats, such as disabling compromised IAM roles or quarantining compromised containers. ### Collaboration and Knowledge Sharing CDR breaks down operational silos by allowing both teams to share insights and collaborate using a single security platform. * **SOC Benefit:** Cloud threat intelligence enhances on-premises security strategies. * **CloudSec Benefit:** SOC expertise in threat hunting improves cloud-native investigations. ### Operational Efficiency By unifying SOC and CloudSec workflows under a single platform, CDR reduces tool sprawl, simplifies alert management, and minimizes the need for specialized skill sets for cloud-specific threats. * **SOC Benefit:** Less time spent switching between tools and manually investigating cloud threats. * **CloudSec Benefit:** Enhanced visibility without managing separate cloud security platforms. ## Challenges of Implementing CDR Implementing CDR presents a dual-edged sword of opportunities and obstacles. Organizations gain enhanced security visibility and faster response times but face challenges like alert fatigue and integration complexities. Balancing these aspects requires strategic planning and resource allocation. Effective CDR deployment can transform security operations, but it demands continuous improvement and adaptation to evolving threats. Integrating CDR tools with existing security infrastructure can be complex and require considerable customization. The automated nature of CDR can sometimes result in false positives, overwhelming security teams, and alert fatigue. Additionally, implementing and maintaining CDR solutions can be expensive, which might be a barrier for smaller organizations. CDR tools can also be resource-intensive, potentially impacting the performance of the cloud environment. Effective use of these solutions demands skilled personnel who understand cloud environments and advanced security practices. Lastly, CDR's continuous monitoring and data collection might raise privacy concerns, especially in industries with strict data protection regulations. ### Reducing Alert Fatigue Security teams often drown in a sea of false positives, which dilutes their focus on genuine threats. Implementing adaptive filtering mechanisms helps prioritize alerts based on contextual relevance and historical data. Automated correlation of events across multiple cloud environments further refines alert accuracy. Regularly updating detection rules and incorporating threat intelligence feeds ensure that alerts remain relevant and actionable. By streamlining alert management, organizations can enhance their response efficiency, allowing security professionals to concentrate on critical incidents without being overwhelmed by noise. ### Enhancing Visibility Organizations can implement real-time monitoring tools to gain comprehensive insights into their cloud environments: * By leveraging advanced analytics, they can identify patterns and anomalies that may signal potential threats. Integrating cloud-native security solutions ensures seamless visibility across diverse platforms. * Employing user and entity behavior analytics (UEBA) helps detect unusual activities and proactively mitigate risks. Organizations can swiftly identify and respond to emerging threats by maintaining a clear view of cloud activities, bolstering their overall security posture. ### How CDR Improves Response Times CDR improves response times by enabling real-time detection, automating responses, providing centralized visibility, prioritizing threats, and integrating with existing security tools. These features help security teams respond to threats faster and more effectively. **Real-Time Threat Detection** CDR continuously monitors cloud environments and identifies threats, minimizing the delay between threat occurrence and detection. This immediacy allows security teams to act faster, reducing the exposure window. **Automated Responses** CDR solutions automate threat response actions, such as isolating compromised resources or blocking malicious activity, significantly reducing the need for manual intervention. Automated responses are executed instantly, which speeds up containment and mitigation. **Centralized Visibility** CDR provides a unified view of security incidents across all cloud assets, eliminating the time-consuming process of gathering and correlating data from multiple sources. This centralized visibility enables quicker assessment and decision-making. **Contextual Risk Prioritization** CDR leverages advanced analytics to assess and prioritize threats based on their severity and potential impact, helping security teams focus on the most critical issues first. This prioritization streamlines response efforts and reduces overall response time. **Seamless Integration with Security Tools** CDR integrates with other security tools and platforms, such as XSOAR (security orchestration, automation, and response), to coordinate and accelerate response actions across the entire security stack. ## CDR Best Practices Establishing clear criteria is crucial when considering CDR best practices. Organizations should prioritize CDR solutions that offer comprehensive threat detection, seamless integration with existing security tools, and automated incident response features that can adapt to evolving threats. CDR deployment strategies must be carefully planned to minimize disruption to existing workflows and maximize the new system's effectiveness. Thorough testing and training are also essential to ensure staff use the new tools proficiently. Additionally, organizations must be prepared to address common challenges, such as false positives and integration complexities, and have efficient strategies to overcome them. Following these best practices can help organizations strengthen their cloud security posture and respond to threats more swiftly and effectively. ### How to Select and Deploy a CDR Solution Selecting and deploying a CDR solution requires a strategic approach, including the following. #### Assess Your Business Needs Determine your organization's security objectives by identifying specific security needs, such as threat detection, incident response, and compliance with industry standards. To better understand the cloud environment, map out your cloud architecture, including cloud providers, services, applications, and workloads you must protect. #### Evaluate Key Features Ensure the solution offers the [key capabilities](#key) mentioned above: real-time threat detection, automated incident response, continuous monitoring and analysis, and integration with existing security tools. #### Plan Deployment Begin by creating a comprehensive deployment strategy. This strategy should involve a phased approach, starting with a small-scale pilot test to identify potential issues and make necessary configuration adjustments. Additionally, define and configure security policies aligning with its risk tolerance and regulatory requirements. Ensuring seamless integration with the existing IT infrastructure and security ecosystem is also crucial to the deployment's success. #### Test and Optimize * **Conduct Security Testing:** Perform penetration testing, red teaming, or simulated attacks to ensure the solution effectively detects and responds to threats. * **Monitor and Optimize:** Monitor the solution's performance and tune its settings based on detected threats and business needs. #### Training and Awareness Provide dedicated training sessions for security teams to ensure they understand how to use the solution effectively. Conduct awareness campaigns to educate all employees on recognizing and reporting potential security incidents, fostering a culture of vigilance and proactive response across the organization. #### Review and Adapt * **Regularly Review Performance:** Continuously review the CDR solution's performance, staying updated on new features or updates from the vendor. * **Adapt to Emerging Threats:** Adapt your deployment and configuration to address new threats and changes in your cloud environment. By following these steps, you can effectively select and deploy a cloud detection and response solution tailored to your business needs, helping to secure your cloud assets and data against evolving threats. ## Cloud Detection and Response FAQs ### How does CDR integrate with existing security tools? CDR solutions often integrate with security tools such as SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), and firewalls. This integration enables a unified security posture by correlating data from various sources, enhancing overall threat detection and providing comprehensive incident response capabilities. ### What are the key features to look for in a CDR solution? Key features to look for in a CDR solution include: * Real-time threat detection and alerting * Advanced analytics and machine learning capabilities * Automated incident response and remediation * Integration with other security tools and platforms * Comprehensive visibility into cloud environments * Threat intelligence and context enrichment * Compliance and audit reporting How does CDR help in compliance and regulatory requirements? CDR solutions assist in meeting compliance and regulatory requirements by providing continuous monitoring, detailed audit logs, and incident response capabilities. These solutions help organizations adhere to GDPR, HIPAA, and PCI-DSS standards by ensuring that cloud environments are secure and that any security incidents are promptly detected and mitigated. ### What are the challenges in implementing CDR? Some challenges in implementing CDR include: * Complexity of multi-cloud environments * Integration with existing security infrastructure * Managing and analyzing large volumes of cloud data * Ensuring real-time detection and response * Addressing cloud-specific threats and vulnerabilities * Training and skill requirements for security personnel ### Can CDR solutions detect insider threats in the cloud? Yes, CDR solutions are capable of detecting insider threats in the cloud. By monitoring user activities, access patterns, and data usage, CDR tools can identify unusual or suspicious behavior that may indicate an insider threat. Advanced analytics and behavior analysis help detect deviations from normal user behavior, enabling timely identification and response to potential insider threats. Related content [Palo Alto Networks Cloud Detection and Response Solutions Explore Palo Alto Networks' Cloud Detection and Response (CDR) for enhanced multi-cloud security with real-time threat detection and automated responses.](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) [Palo Alto Networks Cortex XDR: Cloud Security Datasheet Discover how Palo Alto Networks Cortex XDR optimizes cloud security by integrating endpoint, network, and cloud data to detect and respond to advanced threats accurately.](https://www.paloaltonetworks.com/resources/techbriefs/cortex-xdr-for-cloud?ts=markdown) [Emerging Cloud Attacks Every Organization Must Know Get threat insights to prevent modern cloud attacks from expert threat research and learn how AI-powered cloud detection and response can reduce MTTR by 90%.](https://www.paloaltonetworks.com/resources/infographics/cdr-emerging-cloud-attacks?ts=markdown) [Stop Cloud Attacks with Cortex CDR Learn how Cortex Cloud Detection and Response (CDR) is designed to provide unparalleled protection purpose built for the cloud, ensuring your hybrid and multicloud environment rema...](https://www.paloaltonetworks.com/resources/datasheets/cloud-detection-response-cdr?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Cloud%20Detection%20and%20Response%20%28CDR%29%3F&body=Cloud%20detection%20and%20response%20%28CDR%29%20is%20a%20security%20capability%20offering%20real-time%20threat%20visibility%2C%20prevention%2C%20and%20automated%20response%20for%20multicloud%20environments.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-cloud-detection-and-response-cdr) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/application-security?ts=markdown) Application Security: A Practitioner's Guide [Next](https://www.paloaltonetworks.com/cyberpedia/devops-to-devsecops?ts=markdown) How to Transition from DevOps to DevSecOps {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language