[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Next-Gen Trust Security](https://www.paloaltonetworks.com/network-security/next-gen-trust-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection and Response (CDR)](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection and Response (CDR)](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.paloaltonetworks.com/deploybravely?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Identity Security](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) 3. [AI Frameworks](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security?ts=markdown) 4. [What Is a Security Framework?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework?ts=markdown) Table of Contents * [How to Secure AI Infrastructure: A Secure by Design Guide](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security?ts=markdown) * [What created the need for AI infrastructure security?](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#what-created-the-need-for-ai-infrastructure-security?ts=markdown) * [What is secure by design AI?](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#what-is-secure-by-design-ai?ts=markdown) * [1. Secure the AI data pipeline](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#secure-the-ai-data-pipeline?ts=markdown) * [2. Secure model training environments](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#secure-model-training-environments?ts=markdown) * [3. Protect model artifacts](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#protect-model-artifacts?ts=markdown) * [4. Harden model deployment infrastructure](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#harden-model-deployment-infrastructure?ts=markdown) * [5. Defend inference-time operations](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#defend-inference-time-operations?ts=markdown) * [6. Monitor and respond continuously](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#monitor-and-respond-continuously?ts=markdown) * [7. Apply Zero Trust across AI environments](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#apply-zero-trust-across-ai-environments?ts=markdown) * [8. Govern the AI lifecycle end to end](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#govern-the-ai-lifecycle-end-to-end?ts=markdown) * [AI infrastructure security FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security#ai-infrastructure-security-faqs?ts=markdown) * What Is a Security Framework? Definition and Benefits * [Security Frameworks Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#security?ts=markdown) * [What Are Common Cybersecurity Frameworks?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#what?ts=markdown) * [Benefits of a Security Framework](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#benefits?ts=markdown) * [How Organizations Use Security Frameworks](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#how?ts=markdown) * [Security Frameworks and Security Maturity](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#maturity?ts=markdown) * [Security Frameworks vs. Compliance Requirements](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#security?ts=markdown) * [Security Framework FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#faqs?ts=markdown) * [What Is Explainability?](https://www.paloaltonetworks.com/cyberpedia/ai-explainability?ts=markdown) * [Explainability Defined](https://www.paloaltonetworks.com/cyberpedia/ai-explainability#explainability?ts=markdown) * [Why Explainability Matters](https://www.paloaltonetworks.com/cyberpedia/ai-explainability#why?ts=markdown) * [Explainability Vs. Interpretability](https://www.paloaltonetworks.com/cyberpedia/ai-explainability#vs?ts=markdown) * [Explainability and Adversarial Attacks](https://www.paloaltonetworks.com/cyberpedia/ai-explainability#attacks?ts=markdown) * [Explainable AI: From Theory to Practice](https://www.paloaltonetworks.com/cyberpedia/ai-explainability#practice?ts=markdown) * [Explainability FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-explainability#faqs?ts=markdown) * [IEEE Ethically Aligned Design](https://www.paloaltonetworks.com/cyberpedia/ieee-ethically-aligned-design?ts=markdown) * [IEEE Ethically Aligned Design Explained](https://www.paloaltonetworks.com/cyberpedia/ieee-ethically-aligned-design#ieee?ts=markdown) * [Key Areas of the IEEE EAD;](https://www.paloaltonetworks.com/cyberpedia/ieee-ethically-aligned-design#key?ts=markdown) * [Challenges and Ongoing Evolution of the EAD](https://www.paloaltonetworks.com/cyberpedia/ieee-ethically-aligned-design#challenges?ts=markdown) * [IEEE Ethically Aligned Design FAQs](https://www.paloaltonetworks.com/cyberpedia/ieee-ethically-aligned-design#faqs?ts=markdown) * [Google's Secure AI Framework (SAIF)](https://www.paloaltonetworks.com/cyberpedia/google-secure-ai-framework?ts=markdown) * [Google's Secure AI Framework Explained](https://www.paloaltonetworks.com/cyberpedia/google-secure-ai-framework#google?ts=markdown) * [SAIF's Key Pillars](https://www.paloaltonetworks.com/cyberpedia/google-secure-ai-framework#saif?ts=markdown) * [Secure AI Framework \& Integrated Lifecycle Security](https://www.paloaltonetworks.com/cyberpedia/google-secure-ai-framework#secure?ts=markdown) * [SAIF Challenges](https://www.paloaltonetworks.com/cyberpedia/google-secure-ai-framework#challenges?ts=markdown) * [Google's Secure AI Framework FAQs](https://www.paloaltonetworks.com/cyberpedia/google-secure-ai-framework#faqs?ts=markdown) * [NIST AI Risk Management Framework (AI RMF)](https://www.paloaltonetworks.com/cyberpedia/nist-ai-risk-management-framework?ts=markdown) * [NIST AI Risk Management Framework (AI RMF) Explained](https://www.paloaltonetworks.com/cyberpedia/nist-ai-risk-management-framework#nist?ts=markdown) * [Fundamental Functions of NIST AI RMF](https://www.paloaltonetworks.com/cyberpedia/nist-ai-risk-management-framework#fundamental?ts=markdown) * [Socio-Technical Approach](https://www.paloaltonetworks.com/cyberpedia/nist-ai-risk-management-framework#socio?ts=markdown) * [Flexibility](https://www.paloaltonetworks.com/cyberpedia/nist-ai-risk-management-framework#flexibility?ts=markdown) * [NIST Implementation](https://www.paloaltonetworks.com/cyberpedia/nist-ai-risk-management-framework#implementation?ts=markdown) * [NIST AI RMF Limitations](https://www.paloaltonetworks.com/cyberpedia/nist-ai-risk-management-framework#limitations?ts=markdown) * [NIST AI Risk Management Framework FAQs](https://www.paloaltonetworks.com/cyberpedia/nist-ai-risk-management-framework#faqs?ts=markdown) * [MITRE's Sensible Regulatory Framework for AI Security](https://www.paloaltonetworks.com/cyberpedia/mitre-sensible-regulatory-framework-atlas-matrix?ts=markdown) * [MITRE's Sensible Regulatory Framework for AI Security Explained](https://www.paloaltonetworks.com/cyberpedia/mitre-sensible-regulatory-framework-atlas-matrix#mitre?ts=markdown) * [Risk-Based Regulation and Sensible Policy Design](https://www.paloaltonetworks.com/cyberpedia/mitre-sensible-regulatory-framework-atlas-matrix#risk?ts=markdown) * [Collaborative Efforts in Shaping AI Security Regulations](https://www.paloaltonetworks.com/cyberpedia/mitre-sensible-regulatory-framework-atlas-matrix#collaborative?ts=markdown) * [Introducing the ATLAS Matrix: A Tool for AI Threat Identification](https://www.paloaltonetworks.com/cyberpedia/mitre-sensible-regulatory-framework-atlas-matrix#introducing?ts=markdown) * [MITRE's Comprehensive Approach to AI Security Risk Management](https://www.paloaltonetworks.com/cyberpedia/mitre-sensible-regulatory-framework-atlas-matrix#management?ts=markdown) * [MITRE's Sensible Regulatory Framework for AI Security FAQs](https://www.paloaltonetworks.com/cyberpedia/mitre-sensible-regulatory-framework-atlas-matrix#faqs?ts=markdown) * [AI Risk Management Framework](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework?ts=markdown) * [AI Risk Management Framework Explained](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework#ai?ts=markdown) * [Risks Associated with AI](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework#risks?ts=markdown) * [Key Elements of AI Risk Management Frameworks](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework#key?ts=markdown) * [Major AI Risk Management Frameworks](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework#major?ts=markdown) * [Comparison of Risk Frameworks](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework#comparison?ts=markdown) * [Challenges Implementing the AI Risk Management Framework](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework#challenges?ts=markdown) * [Integrated AI Risk Management](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework#integrated?ts=markdown) * [The AI Risk Management Framework: Case Studies](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework#the?ts=markdown) * [AI Risk Management Framework FAQs](https://www.paloaltonetworks.com/cyberpedia/ai-risk-management-framework#faqs?ts=markdown) * [What Is Observability?](https://www.paloaltonetworks.com/cyberpedia/observability?ts=markdown) * [Observability Explained](https://www.paloaltonetworks.com/cyberpedia/observability#explained?ts=markdown) * [Observability Data Types](https://www.paloaltonetworks.com/cyberpedia/observability#types?ts=markdown) * [Observability Tools for Cloud Security](https://www.paloaltonetworks.com/cyberpedia/observability#tools?ts=markdown) * [Observability FAQs](https://www.paloaltonetworks.com/cyberpedia/observability#faqs?ts=markdown) # What Is a Security Framework? 3 min. read [Explore Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) Table of Contents * * [Security Frameworks Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#security?ts=markdown) * [What Are Common Cybersecurity Frameworks?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#what?ts=markdown) * [Benefits of a Security Framework](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#benefits?ts=markdown) * [How Organizations Use Security Frameworks](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#how?ts=markdown) * [Security Frameworks and Security Maturity](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#maturity?ts=markdown) * [Security Frameworks vs. Compliance Requirements](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#security?ts=markdown) * [Security Framework FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#faqs?ts=markdown) 1. Security Frameworks Explained * * [Security Frameworks Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#security?ts=markdown) * [What Are Common Cybersecurity Frameworks?](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#what?ts=markdown) * [Benefits of a Security Framework](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#benefits?ts=markdown) * [How Organizations Use Security Frameworks](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#how?ts=markdown) * [Security Frameworks and Security Maturity](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#maturity?ts=markdown) * [Security Frameworks vs. Compliance Requirements](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#security?ts=markdown) * [Security Framework FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-security-framework#faqs?ts=markdown) A security framework, also called a cybersecurity framework, is a structured set of standards, policies, procedures, and best practices used to improve an organization's security posture and reduce cyber risk. It gives organizations a consistent way to design security programs, implement controls, identify threats and vulnerabilities, and define mitigation strategies. Key Points * **Security frameworks create structure:** They give organizations a consistent model for managing cybersecurity risk. \* **They support security operations:** Frameworks help define controls, architecture, responsibilities, and security processes. \* **They improve governance:** Many frameworks guide oversight, incident reporting, accountability, and maturity assessment. \* **They help with compliance:** Organizations often use frameworks to align with legal, regulatory, and industry requirements. \* **They reduce risk:** A well-defined framework strengthens resilience, improves readiness, and helps organizations respond more effectively to threats. ## Security Frameworks Explained Security frameworks help define how security operates across the organization. Depending on the framework, that may include assigning roles and responsibilities, establishing governance, reporting incidents, measuring security maturity, and promoting a stronger security culture. As digital environments have become more complex, security frameworks have evolved alongside them. Early frameworks focused on foundational security controls, while modern frameworks address cloud services, mobile devices, [ransomware](https://www.paloaltonetworks.com/cyberpedia/what-is-ransomware?ts=markdown), [fileless malware](https://www.paloaltonetworks.com/cyberpedia/what-are-fileless-malware-attacks?ts=markdown), [advanced persistent threats (APTs)](https://www.paloaltonetworks.com/cyberpedia/what-is-advanced-persistent-threat-apt?ts=markdown), and increasingly strict regulatory requirements. ### Why Security Frameworks Matter Without a framework, security efforts often become reactive and inconsistent. Organizations may deploy tools without clear priorities, address one threat at a time, and struggle to connect security investments to actual business risk. A security framework creates structure. It helps organizations align technical controls, governance, and risk management into a repeatable program. That makes it easier to identify gaps, prioritize improvements, evaluate technologies, and measure whether the security program is getting stronger over time. A framework also gives teams a common language for discussing security internally and externally. That matters when security leaders need to communicate with executives, auditors, regulators, partners, or customers without everyone talking past each other like it is a bad committee meeting. ## What Are Common Cybersecurity Frameworks? Cybersecurity frameworks vary by purpose, scope, and audience. Some are broad frameworks that apply across industries and geographies. Others are designed for specific sectors such as healthcare, financial services, public sector environments, or critical infrastructure. Some focus on overall governance and risk management, while others address more specific needs such as payment security, privacy, or adversary behavior. Security frameworks are developed by several types of organizations, including: * **Government agencies**, such as the U.S. National Institute of Standards and Technology (NIST) * **Industry consortiums**, such as the Payment Card Industry Security Standards Council * **International standards bodies**, such as the International Organization for Standardization (ISO) * **Independent organizations**, such as MITRE and Lockheed Martin Some cybersecurity frameworks are informational. These frameworks provide architectural guidance, taxonomies, or reference models that organizations can use to shape strategy and improve security operations. Examples include [NIST SP 800-207](https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final) Zero Trust Architecture (ZTA) and the [MITRE ATT\&CK framework](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack?ts=markdown). Other frameworks define specific requirements that organizations must meet. Examples include the [SWIFT Customer Security Controls Framework (CSCF)](https://www.swift.com/myswift/customer-security-programme/understand-controls) and regulatory frameworks associated with the [General Data Protection Regulation (GDPR)](https://www.paloaltonetworks.com/cyberpedia/gdpr-compliance?ts=markdown). In reality, many organizations align to multiple frameworks at the same time. A business may need one framework to guide architecture, another to support industry compliance, and another to help security teams understand attacker tactics and techniques. Large enterprises also commonly create internal security frameworks that build on public standards while adapting them to internal policies, technologies, and risk priorities. **Common Cybersecurity Framework Types** | Framework Type | Purpose | Examples | |----------------------------------------|---------------------------------------------------------------------------------------|--------------------------------------------------------------| | Broad security and risk frameworks | Help organizations structure overall cybersecurity strategy, governance, and controls | NIST Cybersecurity Framework, ISO 27001 | | Architectural and reference frameworks | Provide models for designing or improving specific security approaches | NIST SP 800-207 Zero Trust Architecture | | Threat and adversary frameworks | Help security teams understand attacker behaviors, tactics, and techniques | MITRE ATT\&CK, Lockheed Martin Cyber Kill Chain | | Regulatory and compliance frameworks | Define required controls or obligations tied to laws, industries, or sectors | GDPR, SWIFT CSCF, PCI DSS | | Industry-specific frameworks | Address the needs of specific verticals such as finance, healthcare, or utilities | Sector-specific risk and operational frameworks like HITRUST | ## Benefits of a Security Framework A security framework serves as the foundation of an organization's broader information security program. It helps translate security from a loose collection of tools and policies into a more organized, measurable operating model. From a **planning and strategy perspective**, a security framework can help organizations: * Establish a clear security vision and strategy * Identify vulnerabilities, control gaps, and areas of risk * Define security architecture and core functional requirements * Prioritize security initiatives and investments * Evaluate security vendors and service providers * Establish best practices for employees, partners, and customers * Create a common language for discussing risk and security issues * Save time by building on proven public standards and shared industry expertise From a **risk management perspective**, a security framework can help organizations: * Improve cyber resilience and readiness * Strengthen defenses against data theft, ransomware, and other attacks * Demonstrate alignment with industry and government regulations * Reduce the likelihood of fines, lawsuits, and reputational damage * Increase customer and stakeholder confidence * Lower the risk of cyber insurance coverage denials or increased premiums * Reduce exposure through the use of widely adopted, field-tested practices * Minimize integration and interoperability issues across multiple vendors ## How Organizations Use Security Frameworks Organizations use security frameworks to make security more deliberate and less improvised. A framework can guide how teams assess risk, choose controls, [respond to incidents](https://www.paloaltonetworks.com/cyberpedia/what-is-incident-response?ts=markdown), assign ownership, and measure improvement. For example, a framework can help a security team: * Identify missing or weak controls * Clarify incident response processes * Define accountability for oversight and governance * Measure security maturity over time * Align technical decisions to business priorities * Support audits, compliance reviews, and customer expectations Security frameworks matter beyond the security team alone. They are relevant to security leaders, risk managers, compliance teams, executives, and board-level stakeholders who need a clearer view of how cyber risk is being managed. ## Security Frameworks and Security Maturity A framework can also help organizations understand how mature their security program is. Instead of asking only whether a control exists, maturity-focused approaches ask deeper questions: * Is the control consistently implemented? * Is it measured and reviewed? * Is it aligned to business risk? * Can it scale across the organization? * Does it support faster, more effective response? This is one reason frameworks remain so valuable. They help organizations move from isolated security activities to a repeatable, measurable, and continuously improving program. ## Security Frameworks vs. Compliance Requirements Security frameworks and compliance requirements often overlap, but they are not the same thing. A security framework provides a structured approach to improving security. A [compliance](https://www.paloaltonetworks.com/cyberpedia/cybersecurity-compliance-and-regulations?ts=markdown) requirement defines specific obligations an organization must meet based on laws, regulations, or contractual commitments. In other words, a framework helps an organization build a stronger security program, while compliance tells it what boxes must be checked. The best programs do both. They use frameworks to guide real security improvement, not just to survive an audit and call it a day. No framework eliminates risk on its own. But without one, security programs often become fragmented, reactive, and harder to manage. A strong framework helps organizations make smarter decisions, improve resilience, and build a more effective approach to cybersecurity. ## Security Framework FAQs ### Why do organizations need a security framework? Frameworks provide a structured, repeatable way to manage risk. Without one, security efforts are often fragmented, leaving gaps that attackers can exploit through lateral movement or privilege escalation. ### Which security framework is the best? There is no single "best" framework. Most organizations select a framework based on their industry (e.g., PCI DSS for retail) or geography (e.g., GDPR for European operations). Many use the NIST CSF as a general foundational guide. ### How does a security framework help with cloud security? Frameworks like the CSA STAR or cloud security-specific versions of NIST help organizations address the shared responsibility model, ensuring that both the provider and the customer manage their respective security layers. ### Are security frameworks mandatory? Some are legally required (like HIPAA or GDPR), while others are optional but recommended as industry best practices to improve cyber resilience and reduce insurance premiums. ### How often should a security framework be updated? An organization's implementation of a framework should be reviewed at least annually or whenever significant changes occur in the IT environment, such as a major migration to the cloud or an acquisition. Related Content [Explore Zero Trust Architecture See how a modern security framework applies the "never trust, always verify" model.](https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture?ts=markdown) [Understand MITRE ATT\&CK Learn how the MITRE ATT\&CK framework helps teams map adversary behavior and improve security planning.](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack?ts=markdown) [Strengthen Incident Response Connect security framework planning to real-world incident response processes.](https://www.paloaltonetworks.com/cyberpedia/what-is-incident-response?ts=markdown) [See How PANW Supports NIST CSF Review how Palo Alto Networks aligns to the NIST Cybersecurity Framework to help organizations reduce cyber risk.](https://www.paloaltonetworks.com/resources/whitepapers/nist-csf-fulfillment-with-palo-alto-networks?ts=markdown) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20a%20Security%20Framework%3F%20Definition%20and%20Benefits&body=Learn%20how%20security%20frameworks%20provide%20a%20structured%20approach%20to%20risk%20management%2C%20compliance%2C%20and%20defense-in-depth%20through%20standardized%20controls.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-security-framework) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/ai-infrastructure-security?ts=markdown) How to Secure AI Infrastructure: A Secure by Design Guide [Next](https://www.paloaltonetworks.com/cyberpedia/ai-explainability?ts=markdown) What Is Explainability? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/ai-security?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language