[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [Cloud Native](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native?ts=markdown) 4. [What Is Cloud-Native Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security?ts=markdown) Table of contents * [What Is Cloud Native?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native?ts=markdown) * [Cloud Native Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#explained?ts=markdown) * [History of Cloud Native](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#history?ts=markdown) * [What Are Cloud-Native Applications?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#applications?ts=markdown) * [What Is Cloud-Native Architecture?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#architecture?ts=markdown) * [What Is Cloud-Native Application Development?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#development?ts=markdown) * [Benefits of Cloud-Native Application Development](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#benefits?ts=markdown) * [What Is a Cloud-Native Stack?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#stack?ts=markdown) * [Cloud-Native Security Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#challenges?ts=markdown) * [Cloud-Native FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native#faqs?ts=markdown) * [What Is Threat Modeling?](https://www.paloaltonetworks.com/cyberpedia/threat-modeling?ts=markdown) * [Threat Modeling Explained](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#threat?ts=markdown) * [Threat Modeling Frameworks](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#frameworks?ts=markdown) * [Threat Modeling: Four Question Framework](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#modeling?ts=markdown) * [Benefits of Threat Modeling in Modern Enterprise Security](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#benefits?ts=markdown) * [Threat Modeling Tools](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#tools?ts=markdown) * [Threat Modeling FAQs](https://www.paloaltonetworks.com/cyberpedia/threat-modeling#faqs?ts=markdown) * [What Are Microservices?](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices?ts=markdown) * [Microservices Explained](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#explained?ts=markdown) * [From Service-Oriented Architecture to Microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#service?ts=markdown) * [Benefits of Microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#benefits?ts=markdown) * [When to Use Microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#when?ts=markdown) * [Building and Deploying Microservices-Based Apps](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#deploying?ts=markdown) * [Microservices Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#best?ts=markdown) * [Adopting Microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#adopting?ts=markdown) * [Securing Microservices](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#securing?ts=markdown) * [Microservices FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices#faqs?ts=markdown) * What Is Cloud-Native Security? * [Cloud-Native Security Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#explained?ts=markdown) * [Cloud Native Goes Beyond Fixed Perimeters](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#perimeters?ts=markdown) * [Diagnostic Difficulties](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#diagnostic?ts=markdown) * [Accelerating DevOps Velocity](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#velocity?ts=markdown) * [Key Elements of Cloud-Native Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#key?ts=markdown) * [Cloud Native-Security Strategies](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#strategies?ts=markdown) * [Cloud-Native Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#faqs?ts=markdown) * [What Is CNAPP?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform?ts=markdown) * [CNAPP Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#cnapp?ts=markdown) * [Key Components of a CNAPP](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#key?ts=markdown) * [CNAPP Architecture and Functionality](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#architecture?ts=markdown) * [CNAPP Implementation Strategies](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#implementation?ts=markdown) * [CNAPP Benefits](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#benefits?ts=markdown) * [The AI-Enhanced CNAPP](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#enhanced?ts=markdown) * [What's Next for CNAPP?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#next?ts=markdown) * [Cloud-Native Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform#faqs?ts=markdown) * [What Is CSPM? | Cloud Security Posture Management Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management?ts=markdown) * [Cloud Security Posture Management Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#cloud?ts=markdown) * [Why Is CSPM Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#why?ts=markdown) * [How Does CSPM Work?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#how?ts=markdown) * [The Evolution of CSPM](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#the?ts=markdown) * [What Are Researchers Saying About CSPM?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#what?ts=markdown) * [What Are the Benefits of CSPM?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#benefits?ts=markdown) * [Cloud Security Posture Management (CSPM) FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-security-posture-management#faqs?ts=markdown) * [What Is Cloud Network Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security?ts=markdown) * [Cloud Network Security Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#network-security?ts=markdown) * [Cloud Network Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#cns?ts=markdown) * [Kubernetes Network Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#kns?ts=markdown) * [Kubernetes Control Plane Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#control-plane-security?ts=markdown) * [Network Security Best Practices for Containers and Kubernetes](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#best-practice?ts=markdown) * [Cloud Network Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-network-security#faq?ts=markdown) * [CSP-Built Security Vs. Cloud-Agnostic Security](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security?ts=markdown) * [Cloud Security: The Technology Decision](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#cloud?ts=markdown) * [Feature Set and Capabilities](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#feature?ts=markdown) * [The Multicloud Challenge](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#challenge?ts=markdown) * [Real-World Applications](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#realworld?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#prisma-cloud?ts=markdown) * [Cloud-Native Security FAQs](https://www.paloaltonetworks.com/cyberpedia/cloud-native-security-vs-3rd-party-security#faqs?ts=markdown) * [What Is Microsegmentation?](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation?ts=markdown) * [Microsegmentation Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#micro?ts=markdown) * [Beyond Perimeter Security](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#beyond?ts=markdown) * [Network Segmentation Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#network?ts=markdown) * [How Microsegmentation Works](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#how?ts=markdown) * [Types of Microsegmentation](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#types?ts=markdown) * [Benefits of Microsegmentation](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#benefits?ts=markdown) * [Microsegmentation Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#usecases?ts=markdown) * [Microsegmentation FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation#faqs?ts=markdown) * [Core Tenets of a Cloud Native Security Platform (CNSP)](https://www.paloaltonetworks.com/cyberpedia/core-tenets-of-a-cloud-native-security-platform?ts=markdown) * [What Is a Cloud Native Security Platform?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform?ts=markdown) * [What Does 'Cloud Native' Mean?](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform#what?ts=markdown) * [The Beginnings of Cloud Native Security](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform#beginning?ts=markdown) * [Enter Cloud Native Security Platforms](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform#enter?ts=markdown) * [CNSPs and the Future](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform#cnsp?ts=markdown) * [Cloud Native Security Platform FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-security-platform#faqs?ts=markdown) * [CSPM Tools: How to Evaluate and Select the Best Option](https://www.paloaltonetworks.com/cyberpedia/cspm-tools?ts=markdown) * [The Need for Cloud Security Posture Management Solutions](https://www.paloaltonetworks.com/cyberpedia/cspm-tools#need?ts=markdown) * [Components of CSPM Tools](https://www.paloaltonetworks.com/cyberpedia/cspm-tools#components?ts=markdown) * [How to Select the Right CSPM Solution](https://www.paloaltonetworks.com/cyberpedia/cspm-tools#how?ts=markdown) * [Common Challenges in Implementing CSPM](https://www.paloaltonetworks.com/cyberpedia/cspm-tools#common?ts=markdown) * [Cloud Security Posture Management (CSPM) FAQs](https://www.paloaltonetworks.com/cyberpedia/cspm-tools#faqs?ts=markdown) * [What is Platform as a Service (PaaS)?](https://www.paloaltonetworks.com/cyberpedia/platform-as-a-service-paas?ts=markdown) * [Benefits and Security Implications](https://www.paloaltonetworks.com/cyberpedia/platform-as-a-service-paas#benefits?ts=markdown) * [Platform as a Service FAQs](https://www.paloaltonetworks.com/cyberpedia/platform-as-a-service-paas#faqs?ts=markdown) * [What Is Serverless Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-serverless-security?ts=markdown) # What Is Cloud-Native Security? 4 min. read [Download The CNAPP Buyer's Guide](https://start.paloaltonetworks.com/cnapp-buyers-guide.html) Table of contents * * [Cloud-Native Security Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#explained?ts=markdown) * [Cloud Native Goes Beyond Fixed Perimeters](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#perimeters?ts=markdown) * [Diagnostic Difficulties](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#diagnostic?ts=markdown) * [Accelerating DevOps Velocity](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#velocity?ts=markdown) * [Key Elements of Cloud-Native Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#key?ts=markdown) * [Cloud Native-Security Strategies](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#strategies?ts=markdown) * [Cloud-Native Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#faqs?ts=markdown) 1. Cloud-Native Security Explained * * [Cloud-Native Security Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#explained?ts=markdown) * [Cloud Native Goes Beyond Fixed Perimeters](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#perimeters?ts=markdown) * [Diagnostic Difficulties](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#diagnostic?ts=markdown) * [Accelerating DevOps Velocity](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#velocity?ts=markdown) * [Key Elements of Cloud-Native Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#key?ts=markdown) * [Cloud Native-Security Strategies](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#strategies?ts=markdown) * [Cloud-Native Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security#faqs?ts=markdown) Cloud-native security refers to a set of security practices and technologies designed specifically for applications built and deployed in cloud environments. It involves a shift in mindset from traditional security approaches, which often rely on network-based protections, to a more application-focused approach that emphasizes identity and access management, [container security](https://www.paloaltonetworks.com/cyberpedia/what-is-container-security?ts=markdown) and workload security, and continuous monitoring and response. In a cloud-native security approach, security is built into the application and infrastructure from the ground up, rather than added on as an afterthought. This requires a combination of automated security controls, [DevOps processes](https://www.paloaltonetworks.com/cyberpedia/what-is-devops?ts=markdown), and skilled security professionals who can manage the complex and dynamic nature of cloud environments. The goal of cloud native-security is to protect against threats and vulnerabilities that are unique to cloud environments, while also ensuring compliance with regulations and standards. ## Cloud-Native Security Explained Cloud-native technologies have rendered traditional models of software development all but obsolete, doing away with the complexities of monolithic application architecture and ushering in radical changes to the modern development pipeline. This new paradigm offers numerous advantages, but it also introduces a new set of challenges. Of these, few have been as stubborn, perilous or complex as the issue of cloud-native security. Nearly all cloud-native application security challenges can be traced back to the nature of cloud-native applications themselves: Where monolithic application architectures are relatively static, cloud-native application architectures are highly dynamic. Their use of [containers](https://www.paloaltonetworks.com/cyberpedia/what-is-a-container?ts=markdown) and [serverless](https://www.paloaltonetworks.com/cyberpedia/what-is-serverless-security?ts=markdown)functions means cloud applications are forever shrinking and expanding, moving between on-premises and off-premises, and even bouncing across multiple cloud platforms. This results in a number of security challenges. ### Understanding Cloud-Native Architectures **Microservices Architecture** [Microservices architecture](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices?ts=markdown) is a software development approach that structures an application as a collection of small, loosely coupled services. Each microservice is responsible for a specific business capability and can be developed, deployed, and scaled independently. This modular approach allows for greater agility, flexibility, and resilience in cloud-native applications. From a security perspective, microservices architecture introduces challenges related to securing the communication between services, ensuring data integrity, and protecting sensitive data as it flows across multiple services. **Containerization** Containerization is the process of encapsulating an application and its dependencies into a lightweight, isolated unit called a container. [Containers](https://www.paloaltonetworks.com/cyberpedia/what-is-a-container?ts=markdown) provide an efficient and consistent runtime environment, allowing applications to run consistently across different infrastructure platforms. Containers are also portable, making it easier to move applications between different environments, such as development, testing, and production. But containerization also introduces new security challenges, including vulnerabilities within container images, container isolation, and the need for secure container orchestration. **Orchestration with Kubernetes** Kubernetes is a widely adopted container orchestration platform that automates the deployment, scaling, and management of containerized applications. It provides a robust framework for managing the lifecycle of containers and ensures the desired state of the application is maintained. From a security perspective, Kubernetes presents challenges related to cluster security, access control, and monitoring. ## Cloud Native Goes Beyond Fixed Perimeters In the past, application security teams needed only to secure a set number of servers running in physical data centers with hardware firewalls that created a fixed perimeter. This doesn't work with cloud-native applications. Security teams cannot establish a static firewall around an application that may operate both on- and off-premises, across multiple clouds, and which may scale up to millions of workload instances one day and down to only a few hundred the next. ## Diagnostic Difficulties With the elasticity and complexity of cloud-native application architecture, it's difficult to quickly diagnose the cause of any given security anomaly or incident. This poses a challenge for security teams, as the speed at which they diagnose and address a threat is as important as the specific tools they use to address it. ## Accelerating DevOps Velocity Now that individual services can easily be taken offline and modified or replaced without affecting other parts of the application, [DevOps](https://www.paloaltonetworks.com/cyberpedia/what-is-devops?ts=markdown) teams can put out new releases and updates much more frequently than in the past. However, the manual provisioning and policy management processes security teams once used can no longer keep up with modern release cycles. ## Key Elements of Cloud-Native Security Before they can implement more effective cloud-native security solutions, security, operations and developer teams must understand [the key elements of cloud-native security](https://www.paloaltonetworks.com/cyberpedia/core-tenets-of-a-cloud-native-security-platform?ts=markdown). These include: * **Inventory and classification:** Accurate inventory and proper classification of all assets are essential to ensure security operations teams have a clear view of potential vulnerabilities across the software stack. * **Compliance management:** Systems should be designed to consistently enforce industry and/or legal regulations (e.g., standard configurations, [security best practices](https://www.paloaltonetworks.com/cyberpedia/four-ways-to-improve-cloud-security-and-compliance?ts=markdown), usage of trusted registries). * **Network security:** An organization's strategy and provisions for ensuring the security of its assets and network traffic must include analysis of all network traffic flows, with the aim of preserving the confidentiality, integrity and availability of all systems and information on the network. * **Identity and access management (IAM) security:** [IAM security](https://www.paloaltonetworks.com/cyberpedia/what-is-identity-and-access-management?ts=markdown) is the practice of limiting cloud resources to certain individuals. This comprises activities such as access governance, [privileged monitoring](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access?ts=markdown) and user entity behavior analytics (UEBA) powered by machine learning. * **Data security:** This concerns the security of stored data, including the classification of data, [data loss prevention and malware scanning](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-data-protection?ts=markdown) for cloud storage. * **Vulnerability management:** Identification and prevention of vulnerabilities across the entire application lifecycle should include the continuous monitoring of all hosts, images and functions in the cloud environment. * **Workload security:** Protection of each distinct work function placed on a cloud instance ensures improved visibility across workloads and should also include vulnerability scanning and runtime security. * **Automated investigation and response:** Security tools should ideally offer auto-remediation and integration with the security operations center (SOC) and ticketing, in addition to third-party tools as necessary. ## Cloud Native-Security Strategies A number of cloud-native security strategies have emerged recently, boasting various degrees of effectiveness. These include: * **Shared responsibility models:** In the [shared responsibility model](https://www.paloaltonetworks.com/cyberpedia/cloud-security-is-a-shared-responsibility?ts=markdown), cloud providers are responsible for securing the underlying infrastructure, while the customer is responsible for securing their own applications, data, and access to the cloud.This concept forms the basis of all other modern cloud-native security strategies. * **Multilayered security:** A cloud service is generally made up of seven layers, including facility, network, hardware, OS, middleware, application and user. Multilayered security monitors each layer to identify risks and mitigate vulnerabilities. This approach can include multiple tools, such as [cloud-aware firewalls](https://www.paloaltonetworks.com/cyberpedia/what-is-a-web-application-firewall?ts=markdown) and end-to-end encryption. But managing these disparate tools can become cumbersome. * **Cloud-agnostic security platforms:** By far the most effective strategy for managing cloud-native security needs, these platforms can provide visibility across ecosystems (reducing cloud vendor lock-in) as well as streamline alerts and tools for overburdened security teams. ## Cloud-Native Security FAQs ### What are the security risks of cloud-native applications? Cloud-native applications face various security risks, including container-based vulnerabilities, [unsecured APIs](https://www.paloaltonetworks.com/cyberpedia/what-is-api-security?ts=markdown), data breaches, insecure network connections, and cloud misconfigurations. These risks can lead to data theft, data loss, compliance violations, and reputational damage. ### How does cloud-native security differ from traditional security methods? Cloud-native security differs from traditional security methods in that it requires a more dynamic approach that is adaptable to the constantly changing nature of cloud environments. Traditional security methods often rely on perimeter-based defenses, while cloud-native security focuses on [microsegmentation](https://www.paloaltonetworks.com/cyberpedia/what-is-microsegmentation?ts=markdown), Zero Trust, and continuous monitoring and mitigation. ### What are some best practices for securing cloud-native applications? Best practices for securing cloud-native applications include implementing strong access controls, implementing secure coding practices, using encryption for data at rest and in transit, regularly patching and updating software, performing vulnerability scans and penetration testing, and continuously monitoring for suspicious activity. ### What are some common security tools and technologies used in cloud-native environments? Common security tools and technologies used in cloud-native environments include container security platforms, cloud access security brokers (CASBs), identity and access management (IAM) solutions, network security solutions, and log analysis tools.Today, though, most organizations have consolidated their security solution in a comprehensive, code-to-cloud [CNAPP](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform?ts=markdown). ### What is the role of DevOps in cloud-native security? DevOps plays a critical role in cloud-native security by incorporating security into the entire application development and deployment lifecycle. DevOps teams use tools and processes, such as [infrastructure as code](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown), [continuous integration and delivery](https://www.paloaltonetworks.com/cyberpedia/what-is-the-ci-cd-pipeline-and-ci-cd-security?ts=markdown), and automated testing to build secure and resilient applications. ### How do you ensure compliance with regulations and standards in a cloud-native environment? To ensure compliance with regulations and standards in a cloud-native environment, organizations should conduct regular risk assessments, implement security controls and monitoring, perform audits and assessments, and document policies and procedures. Compliance can also be achieved through the use of third-party certifications and audits. ### How do you monitor and detect security incidents in a cloud-native environment? Monitoring and detecting security incidents in a cloud-native environment involves using tools like log analysis, intrusion detection and prevention, and security information and event management (SIEM). It also involves implementing automated responses to security incidents and conducting regular incident response testing and training. Learn more about how [a cloud agnostic security platform](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) can simplify your security strategy. Related content [Addressing the Need for Integrated Cloud Native Security with CNAPP Many organizations have been reactive to cloud native security, often forced to deal with issues as one-off problems, rather than addressing cloud security more holistically.](https://www.paloaltonetworks.com/blog/prisma-cloud/the-future-of-cloud-native-security-is-cloud-native-application-protection-platforms-2/?ts=markdown) [The State of Cloud-Native Security Report Over 3,000 cloud security and DevOps professionals identify their challenges, how they handle them and what they've learned in the process.](https://www.paloaltonetworks.com/state-of-cloud-native-security?ts=markdown) [Cloud-Native Security Maturity:Using Security to Drive Software Development Efficiency Dynamic cloud-native environments with faster software development cycles are the new normal. With these rapid changes come security challenges. Organizations need cloud-native sec...](https://www.paloaltonetworks.com/resources/guides/cloud-native-maturity-using-security-to-drive-software-development-efficiency?ts=markdown) [Top 5 Risks in Cloud-Native Development While cloud architectures deliver application velocity and agility, organizations making the transition are learning that cloud-native development also introduces new risks. Learn ...](https://www.paloaltonetworks.com/resources/research/top-5-cloud-native-risks-report?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Cloud-Native%20Security%3F&body=Discover%20advanced%20security%20strategies%20for%20cloud-native%20applications.%20Learn%20how%20to%20protect%20workloads%2C%20containers%2C%20and%20microservices%20in%20dynamic%20cloud%20environments.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-cloud-native-security) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-are-microservices?ts=markdown) What Are Microservices? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-a-cloud-native-application-protection-platform?ts=markdown) What Is CNAPP? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language