[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Cloud Security](https://www.paloaltonetworks.com/cyberpedia/cloud-security?ts=markdown) 3. [ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management?ts=markdown) 4. [What is Infrastructure-as-Code Security](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security?ts=markdown) Table of Contents * [What Is Application Security Posture Management (ASPM)?](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management?ts=markdown) * [Application Security Posture Management (ASPM) Explained](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#application?ts=markdown) * [Why Is ASPM Important?](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#why?ts=markdown) * [The Role of ASPM in Cyber Defense](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#role?ts=markdown) * [ASPM: Business Value](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#aspm?ts=markdown) * [Comparing ASPM with Other Security Technologies](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#security?ts=markdown) * [How ASPM Works](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#works?ts=markdown) * [ASPM Use Cases](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#cases?ts=markdown) * [Top Considerations When Choosing an ASPM Solution](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#considerations?ts=markdown) * [ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-application-security-posture-management#faqs?ts=markdown) * [How DSPM Is Evolving: Key Trends to Watch](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends?ts=markdown) * [From Static Discovery to Dynamic Intelligence](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#static?ts=markdown) * [The Convergence of DSPM with Cloud-Native Security Architectures](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#native?ts=markdown) * [Real-Time Data Detection and Response](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#response?ts=markdown) * [AI Security and Generative AI Data Protection](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#protection?ts=markdown) * [Automation, Policy-as-Code, and DevSecOps Integration](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#automation?ts=markdown) * [DSPM Key Trends FAQs](https://www.paloaltonetworks.com/cyberpedia/dspm-evolving-trends#faq?ts=markdown) * [Interactive Application Testing \& ASPM: Closing DevSec Gaps](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps?ts=markdown) * [Modern Application Security Testing Architecture](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#modern?ts=markdown) * [Application Security Posture Management Fundamentals](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#application?ts=markdown) * [Technical Integration Mechanisms](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#technical?ts=markdown) * [Enhanced Detection and False Positive Reduction](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#enhanced?ts=markdown) * [Pre-Production Testing and Developer Feedback Loops](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#loops?ts=markdown) * [IAST and ASPM Integration FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-devops-gaps#faqs?ts=markdown) * [Buy or Build: Calculating ASPM ROI for Your Organization](https://www.paloaltonetworks.com/cyberpedia/aspm-roi?ts=markdown) * [ASPM Platform Requirements and Strategic Context](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#aspm?ts=markdown) * [Build Vs. Buy Decision Framework](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#vs?ts=markdown) * [ROI Calculation Models and Financial Analysis](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#roi?ts=markdown) * [Implementation Scenarios and Trade-Off Analysis](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#analysis?ts=markdown) * [Long-Term Scalability and Strategic Considerations](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#considerations?ts=markdown) * [ASPM ROI FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-roi#faqs?ts=markdown) * [Overcoming AppSec Chaos: 7 Modes of ASPM Adoption](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes?ts=markdown) * [Why ASPM Is Critical for Cloud-First Enterprises](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#why?ts=markdown) * [ASPM Maturity Assessment and Organizational Readiness](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#aspm?ts=markdown) * [7 Paths to ASPM Adoption](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#adoption?ts=markdown) * [Operating Models and Sustained ASPM Maturity](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#operating?ts=markdown) * [ASPM Adoption FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-adoption-modes#faqs?ts=markdown) * [ASPM: The Evolution Beyond ASOC](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc?ts=markdown) * [ASPM Vs. ASOC Market Evolution and Convergence Dynamics](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#aspm?ts=markdown) * [ASPM Core Features and Advantages Vs. ASOC Orchestration Capabilities](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#capabilities?ts=markdown) * [ASOC Vs. ASPM Disadvantages and Implementation Challenges](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#challenges?ts=markdown) * [ASPM Vs. ASOC Cost Analysis and Strategic Investment Planning](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#planning?ts=markdown) * [ASOC Vs. ASPM Selection Framework](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#framework?ts=markdown) * [ASPM and ASOC FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-asoc#faqs?ts=markdown) * [Top Cloud Data Security Solutions](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions?ts=markdown) * [The Modern Cloud Data Security Landscape](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#modern?ts=markdown) * [The Anatomy of Modern Cloud Security](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#cloud?ts=markdown) * [Evaluating Data Protection Platforms for Enterprise Deployment](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#data?ts=markdown) * [Leading Cloud Data Security Solutions and Market Positioning](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#security?ts=markdown) * [Strategic Implementation and Platform Selection](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#platform?ts=markdown) * [Top Cloud Data Security Solutions FAQs](https://www.paloaltonetworks.com/cyberpedia/data-security-solutions#faq?ts=markdown) * [Selecting Your ASPM Solution: Metrics That Matter](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics?ts=markdown) * [Why Opt for an ASPM solution?](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#solution?ts=markdown) * [Not All ASPM Solutions Are Created Equal](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#equal?ts=markdown) * [Must Have ASPM Components](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#components?ts=markdown) * [Real World Evaluation Requirements](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#evaluation?ts=markdown) * [Selecting ASPM Platform FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-solution-metrics#faq?ts=markdown) * [ASPM in Action: 8 Real‑World Use Cases](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases?ts=markdown) * [ASPM Explained](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#explained?ts=markdown) * [ASPM Use Cases](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#cases?ts=markdown) * [Enhancing Cloud Security with ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#security?ts=markdown) * [The Business Value of ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#value?ts=markdown) * [ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-use-cases#faq?ts=markdown) * [State of ASPM 2025: Key Trends \& Emerging Threats](https://www.paloaltonetworks.com/cyberpedia/aspm-trends?ts=markdown) * [ASPM Market Evolution and Adoption Trajectory](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#aspm?ts=markdown) * [AI-Native ASPM and Machine Learning Integration](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#integration?ts=markdown) * [Cloud-Native Security Challenges and Container Orchestration Threats](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#threats?ts=markdown) * [Software Supply Chain Vulnerabilities and SBOM Evolution](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#software?ts=markdown) * [DevSecOps Integration and Future ASPM Architecture](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#devsecops?ts=markdown) * [ASPM Key Trends \& Threats FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-trends#faqs?ts=markdown) * [Application Security Best Practices You Can't Skip in ASPM](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices?ts=markdown) * [ASPM Architecture: From Tool Sprawl to Unified Intelligence](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#aspm?ts=markdown) * [Advanced Risk Correlation and Contextual Prioritization Systems](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#advanced?ts=markdown) * [Policy-Driven Security Automation and Enforcement Architecture](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#policy?ts=markdown) * [Seamless DevOps Integration and Cloud-Native Security Orchestration](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#seamless?ts=markdown) * [Enterprise Scalability, Performance Engineering, and Compliance Automation](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#enterprise?ts=markdown) * [Application Security In ASPM Best Practices FAQs](https://www.paloaltonetworks.com/cyberpedia/application-security-best-practices#faqs?ts=markdown) * [How Supply Chain Threats Are Shaping ASPM Today](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats?ts=markdown) * [The Supply Chain Attack Surface in Modern ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#aspm?ts=markdown) * [Critical Supply Chain Vectors Driving ASPM Evolution](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#critical?ts=markdown) * [Software Supply Chain Risk Assessment and Prioritization](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#software?ts=markdown) * [Architectural Shifts in ASPM for Supply Chain Defense](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#defense?ts=markdown) * [Operationalizing Supply Chain Security Within ASPM Programs](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#programs?ts=markdown) * [Supply Chain Threats Are Shaping ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-supply-chain-threats#faqs?ts=markdown) * [How ASPM Strengthens Your Cloud Ecosystem](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem?ts=markdown) * [ASPM's Role in Unified Cloud Security Architecture](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#architecture?ts=markdown) * [Integration Points Across the Cloud Security Stack](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#integration?ts=markdown) * [Risk Intelligence and Contextual Prioritization in Cloud Environments](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#risk?ts=markdown) * [Operational Efficiency Through Automated Cloud Security Workflows](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#workflows?ts=markdown) * [Strategic Advantages for Cloud-First Organizations](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#strategic?ts=markdown) * [ASPM Strengthening the Entire Cloud Ecosystem FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-cloud-ecosystem#faqs?ts=markdown) * [Developer Infrastructure Posture: Integrating ASPM Early](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture?ts=markdown) * [Understanding Developer Infrastructure Posture](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#understanding?ts=markdown) * [ASPM Fundamentals: Beyond Traditional Application Security](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#aspm?ts=markdown) * [Early Integration Strategies: Embedding ASPM in Developer Workflows](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#early?ts=markdown) * [ASPM Compliance Framework Integration](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#integration?ts=markdown) * [Risk Prioritization and Remediation at Scale](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#risk?ts=markdown) * [Developer Infrastructure Posture Management and ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-infrastructure-posture#faqs?ts=markdown) * [Amplify ASPM with RBVM Risk‑Based Vulnerability Management](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability?ts=markdown) * [ASPM and RBVM Technical Convergence](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#aspm?ts=markdown) * [Enhanced API Security Through Contextual Intelligence](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#enhanced?ts=markdown) * [Runtime and Version Monitoring Convergence](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#runtime?ts=markdown) * [Build and Deploy Phase Security Amplification](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#build?ts=markdown) * [Operational Excellence and Measurable Outcomes](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#outcomes?ts=markdown) * [ASPM and RBVM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-risk-based-vulnerability#faqs?ts=markdown) * [CNAPP and ASPM Collaboration, Not Collision](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp?ts=markdown) * [ASPM Overview](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#aspm?ts=markdown) * [The Emergence of CNAPP](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#emergence?ts=markdown) * [ASPM Vs. CNAPP: The Main Differences](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#vs?ts=markdown) * [CNAPP and ASPM: The Synergies](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#synergies?ts=markdown) * [Integrating and Coordinating Complementary Capabilities](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#integrating?ts=markdown) * [CNAPP and ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-vs-cnapp#faqs?ts=markdown) * [CSPM Vs ASPM: Where Your Focus Belongs](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm?ts=markdown) * [Core Security Foundations: A Look at CSPM and ASPM](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#core?ts=markdown) * [Security Layer Distinctions: Infrastructure Vs. Application Focus](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#security?ts=markdown) * [Strategic Technology Assessment: Benefits and Constraints of Each Approach](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#strategic?ts=markdown) * [Deployment Scenarios and Implementation Strategies](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#deployment?ts=markdown) * [CSPM and ASPM FAQs](https://www.paloaltonetworks.com/cyberpedia/cspm-vs-aspm#faqs?ts=markdown) * [Why You Need Static Analysis, Dynamic Analysis, and Machine Learning?](https://www.paloaltonetworks.com/cyberpedia/why-you-need-static-analysis-dynamic-analysis-machine-learning?ts=markdown) * [What Is a Software Bill of Materials (SBOM)?](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom?ts=markdown) * [Software Bill of Materials Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sbom-explained?ts=markdown) * [Who Should Have a SBOM](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#who?ts=markdown) * [The Role of SBOMs in Cybersecurity and Compliance](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#role-of-sboms?ts=markdown) * [Why Is an SBOM Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#why-is-an-sbom-important?ts=markdown) * [Software Composition Analysis and SBOMs](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sca-and-sboms?ts=markdown) * [How Does an SBOM Help Prevent Open-Source Supply Chain Attacks](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#how?ts=markdown) * [SBOM Formats](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sbom-formats?ts=markdown) * [Software Bill of Materials Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#sbom-best-practices?ts=markdown) * [SBOM FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-software-bill-materials-sbom#faq?ts=markdown) * [What Is Policy-as-Code?](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code?ts=markdown) * [Defining Policy-As-Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#defining?ts=markdown) * [Policy-as-Code vs. Infrastructure as Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#policy?ts=markdown) * [Benefits of Policy-as-Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#benefits?ts=markdown) * [How to Use Policy-As-Code](https://www.paloaltonetworks.com/cyberpedia/what-is-policy-as-code#how?ts=markdown) * [What Is Static Application Security Testing (SAST)?](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing?ts=markdown) * [Why Is SAST Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#why?ts=markdown) * [SAST Vs. DAST](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#vs?ts=markdown) * [Software Composition Analysis and SAST](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#composition?ts=markdown) * [SAST Tools](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#tools?ts=markdown) * [Industry Guidelines](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#guidelines?ts=markdown) * [The Future of SAST](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#future?ts=markdown) * [Static Application Security Testing FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing#faq?ts=markdown) * [What Is Code Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security?ts=markdown) * [IaC Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#iac?ts=markdown) * [Application Code Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#application?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#software?ts=markdown) * [Code Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security#faqs?ts=markdown) * [What Is Software Composition Analysis (SCA)?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca?ts=markdown) * [What Is Software Composition Analysis?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#what?ts=markdown) * [What Are the Risks of Using Open Source Components?](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#components?ts=markdown) * [Software Composition Analysis Identifies Risks in Open Source Packages](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#software?ts=markdown) * [How to Use SCA in the Development Processes](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#processes?ts=markdown) * [The Benefits of Software Composition Analysis](https://www.paloaltonetworks.com/cyberpedia/what-is-sca#analysis?ts=markdown) * What is Infrastructure-as-Code Security * [How IaC Security Works](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security#how?ts=markdown) * [Why is IaC Security Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security#why?ts=markdown) * [What is IaC?](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown) * [Benefits of IaC](https://www.paloaltonetworks.com/cyberpedia/what-is-iac#benefits?ts=markdown) * [Challenges of IaC](https://www.paloaltonetworks.com/cyberpedia/what-is-iac#challenges?ts=markdown) * [Infrastructure as Code FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-iac#faqs?ts=markdown) * [What Is Secrets Management?](https://www.paloaltonetworks.com/cyberpedia/secrets-management?ts=markdown) * [Secrets Management Explained](https://www.paloaltonetworks.com/cyberpedia/secrets-management#secrets?ts=markdown) * [Why Is Secrets Management Important?](https://www.paloaltonetworks.com/cyberpedia/secrets-management#why?ts=markdown) * [Secrets Management Across the Enterprise](https://www.paloaltonetworks.com/cyberpedia/secrets-management#enterprise?ts=markdown) * [Secrets Management in DevOps Environments](https://www.paloaltonetworks.com/cyberpedia/secrets-management#devops?ts=markdown) * [Challenges of Secrets Management](https://www.paloaltonetworks.com/cyberpedia/secrets-management#challenges?ts=markdown) * [Secrets Management Best Practices](https://www.paloaltonetworks.com/cyberpedia/secrets-management#best?ts=markdown) * [A Comprehensive and Automated Solution](https://www.paloaltonetworks.com/cyberpedia/secrets-management#solution?ts=markdown) * [Secrets Management FAQs](https://www.paloaltonetworks.com/cyberpedia/secrets-management#faqs?ts=markdown) * [What Is Infrastructure as Code (IaC) Supply Chain Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security?ts=markdown) * [What Is GitOps? Understanding the 'DevOps' of Infrastructure Management](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#what?ts=markdown) * [The 4 Stages for Securing Your IaC Supply Chain](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#the?ts=markdown) * [Best Practices for Securing Your IaC Pipeline](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#best?ts=markdown) * [Embrace Change: Automating Your Organization's Infrastructure](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#embrace?ts=markdown) * [IaC Supply Chain Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-infrastructure-as-code-supply-chain-security#faqs?ts=markdown) * [ASPM Tools: Evaluation Criteria and How to Select the Best Option](https://www.paloaltonetworks.com/cyberpedia/aspm-tools?ts=markdown) * [The Need for Application Security Posture Management Solutions](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#solutions?ts=markdown) * [The Key Components of ASPM Tools](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#key?ts=markdown) * [How to Select and Evaluate the Right ASPM Solution](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#how?ts=markdown) * [Common Challenges Implementing ASPM](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#challenges?ts=markdown) * [ASPM Tools FAQs](https://www.paloaltonetworks.com/cyberpedia/aspm-tools#faqs?ts=markdown) # What is Infrastructure-as-Code Security 5 min. read [AppSec's New Horizon: A Virtual Event](https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html) Table of Contents * * [How IaC Security Works](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security#how?ts=markdown) * [Why is IaC Security Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security#why?ts=markdown) 1. How IaC Security Works * * [How IaC Security Works](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security#how?ts=markdown) * [Why is IaC Security Important?](https://www.paloaltonetworks.com/cyberpedia/what-is-iac-security#why?ts=markdown) [Infrastructure as code (IaC)](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown) presents an incredible opportunity to embed consistent and scalable cloud security coverage. [IaC security](https://www.paloaltonetworks.com/prisma/cloud/infrastructure-as-code-security?ts=markdown) refers to addressing cloud configuration issues in IaC rather than deployed cloud resources. Because IaC does not represent infrastructure itself, IaC security isn't "securing IaC" but rather ensuring that it is configured in such a way that it will provision secure resources. IaC security is a modern take on cloud security that has historically addressed configured cloud resources after being deployed and ensuring that periodic manual configuration doesn't introduce new issues. Cloud security issues are often related to securing access to critical services and customer data. Each cloud and resource has its own set of security best practices and corresponding compliance benchmarks. Organizations may also enforce their own policies unique to their infrastructure and business. IaC security transfers security monitoring of provisioned cloud resources to the infrastructure code layer. ## How IaC Security Works The most basic form of IaC security is being able to identify misconfigurations and security issues. Scanning IaC enables you to identify all the variables for which the proper settings are either missing or are incorrectly set. Scanning IaC involves checking templates, files, and modules and their variables against known policies. Policy violations occur when proper settings are either missing on variables, or the settings are incorrectly set. Because IaC is often cloud-agnostic, you may be dealing with hundreds of policies to check against. The best way to get complete coverage across cloud security best practices and compliance controls are through automation. By automating the scanning of IaC, you save time and get coverage not possible with manual work. There are a few open-source tools such as Open Policy Agent (OPA) and Bridgecrew's Checkov that enable anyone to scan infrastructure as code files or directories against known policies. IaC security is incredibly valuable in that it puts the same flexibility and repeatability that IaC uses to provision resources into securing it. Code is inherently extendable, and applying the same methodology into cloud security is the best way to secure it consistently. But for scanning to be valuable, IaC security must occur continuously. Whether you're adding it to your pull request checks or a failing step in your CI/CD pipeline, IaC works best when it's part of everyday code reviews. Not only does that ensure IaC is constantly covered, but it will harden your IaC over time by preventing misconfigurations from ever being deployed in the first place and [avoiding cloud drift](https://www.paloaltonetworks.com/blog/prisma-cloud/announcing-multi-cloud-drift-detection/). Finding the right tooling to automate the identification of IaC issues is imperative, and enforcing security policies continuously is just as important. Applying those methodologies to fixing issues in IaC is also important to a strong IaC security policy. The easiest way to make IaC security feedback actionable is to deliver fixes in a common language---code. Implementing infrastructure security as code not only equips developers with real solutions to their problems but helps set policies to govern infrastructure in the future. ## Why is IaC Security Important? As IaC adoption soars, it's becoming more important to understand the security risks and complexities involved with it. Because IaC best practices are still being established, there are very few universally-recognized resources and processes when it comes to IaC security. IaC is designed to make cloud provisioning simpler, faster, and predictable. But in order for teams to recognize those benefits, the same philosophy must be applied to how they approach cloud security. IaC security is the answer to cloud security in IaC-forward environments. It is the only way to get consistent, scalable, and immutable security. If security is not applied at the IaC layer, misconfigurations are inevitable. And when clouds are orchestrated by inherently misconfigured code, they'll continue to be orchestrated and configured incorrectly in production. Related Content [ASPM Buyer's GuideASPM Buyer's Guide Gain a comprehensive framework for evaluating and choosing an ASPM solution that shifts your AppSec strategy from reactive to proactive.](https://start.paloaltonetworks.com/application-security-posture-management-buyers-guide.html) [Accelerate Secure Development with Prevention-First Application Security Posture Management (ASPM) Learn how Cortex Cloud's ASPM centralizes and correlates findings from disparate security scanning tools with complete context across code, application infrastructure, and cloud ru...](https://www.paloaltonetworks.com/resources/datasheets/application-security-posture-management-solution-brief?ts=markdown) [Introducing Cortex Cloud ASPM Cortex Cloud ASPM gives security and engineering teams the control to prevent exploitable risk early and respond with full context across the software lifecycle.](https://www.paloaltonetworks.com/blog/cloud-security/introducing-aspm-cortex-cloud/) [AppSec's New Horizon Join this virtual event to get a practical, prevention-first blueprint --- backed by new Unit 42 research --- to modernize your AppSec strategy.](https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20is%20Infrastructure-as-Code%20Security&body=Learn%20how%20Infrastructure%20as%20Code%20%28IaC%29%20enables%20consistent%20and%20scalable%20cloud%20security%20by%20embedding%20security%20controls%20directly%20into%20automated%20infrastructure.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-iac-security) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-sca?ts=markdown) What Is Software Composition Analysis (SCA)? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown) What is IaC? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2025 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language