[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-security-solution?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberark/Seamless_IDs_small.jpg) Identity Security](https://www.paloaltonetworks.com/identity-security?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.paloaltonetworks.com/deploybravely?ts=markdown) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Identity Security](https://www.paloaltonetworks.com/cyberpedia/identity-security?ts=markdown) 3. [Privileged Access Management](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management?ts=markdown) 4. [Third Party Access](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access?ts=markdown) Table of Contents * [What Is Privileged Access Management (PAM)?](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management?ts=markdown) * [Privileged Access Management Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#privileged?ts=markdown) * [Why PAM Is Critical Today](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#why?ts=markdown) * [How PAM Works](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#how?ts=markdown) * [Core Pillars of Modern PAM Strategy](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#core?ts=markdown) * [Examples of Privileged Access](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#examples?ts=markdown) * [PAM Best Practices](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#pam?ts=markdown) * [Common PAM Challenges and How to Solve Them](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#common?ts=markdown) * [Use Cases \& Real-World Scenarios](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#scenarios?ts=markdown) * [Emerging Trends: Where PAM Is Going](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#emerging?ts=markdown) * [Privileged Access Management FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management#faqs?ts=markdown) * What Is Third Party Access? Common Mistakes \& Best Practices * [Third-Party Access Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#explained?ts=markdown) * [How Third-Party Access Is Exploited](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#how?ts=markdown) * [Types of Third-Party Access](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#types?ts=markdown) * [Third-Party Access vs. Vendor Risk Management](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#vs?ts=markdown) * [Use Cases \& Real-World Examples](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#examples?ts=markdown) * [Best Practices for Securing Third-Party Access](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#best?ts=markdown) * [Third-Party Access Policy Checklist](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#checklist?ts=markdown) * [Common Mistakes to Avoid](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#common?ts=markdown) * [Third-Party Access FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#faqs?ts=markdown) * [What Is Cloud Identity Security?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security?ts=markdown) * [Cloud Identity Security Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security#explain?ts=markdown) * [Why Cloud Identity Security Matters Now](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security#why?ts=markdown) * [Use Cases \& Real-World Examples](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security#use?ts=markdown) * [Core Components of a Strong Cloud Identity Framework](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security#core?ts=markdown) * [How Cloud Identity Security Works](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security#works?ts=markdown) * [What are Common Governance Challenges?](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security#what?ts=markdown) * [Benefits of Cloud Identity Security](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security#benefits?ts=markdown) * [Best Practices for Hardening Cloud Identity](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security#best?ts=markdown) * [How Cloud Identity Security Supports Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security#trust?ts=markdown) * [Cloud Identity Security FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security#faqs?ts=markdown) * [Shared Local Admin Credentials: A Critical Risk](https://www.paloaltonetworks.com/cyberpedia/what-are-shared-local-admin-credentials?ts=markdown) * [Shared Local Admin Credentials Explained](https://www.paloaltonetworks.com/cyberpedia/what-are-shared-local-admin-credentials#shared?ts=markdown) * [Why Shared Local Admin Credentials Are a Critical Risk](https://www.paloaltonetworks.com/cyberpedia/what-are-shared-local-admin-credentials#why?ts=markdown) * [How Attackers Exploit Shared Credentials (The Kill Chain)](https://www.paloaltonetworks.com/cyberpedia/what-are-shared-local-admin-credentials#how?ts=markdown) * [Critical Statistics: The Impact of Credential Reuse](https://www.paloaltonetworks.com/cyberpedia/what-are-shared-local-admin-credentials#critical?ts=markdown) * [How to Prevent Shared Credential Vulnerabilities](https://www.paloaltonetworks.com/cyberpedia/what-are-shared-local-admin-credentials#prevent?ts=markdown) * [Common Challenges in Remediation](https://www.paloaltonetworks.com/cyberpedia/what-are-shared-local-admin-credentials#common?ts=markdown) * [Detecting Shared Credential Abuse](https://www.paloaltonetworks.com/cyberpedia/what-are-shared-local-admin-credentials#detecting?ts=markdown) * [Shared Local Admin Credentials FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-shared-local-admin-credentials#faqs?ts=markdown) * [What Is Defense-in-Depth?: A Layered Cybersecurity Strategy](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth?ts=markdown) * [Defense-in-Depth Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#explained?ts=markdown) * [Key Data: Threats \& Trends](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#key?ts=markdown) * [The Core Architectural Components of Defense-in-Depth](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#core?ts=markdown) * [Defense-in-Depth in the Modern Cloud and Identity Landscape](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#landscape?ts=markdown) * [Disrupting the Attack Lifecycle: Defense-in-Depth and Lateral Movement](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#disrupting?ts=markdown) * [Defense-in-Depth versus Zero Trust Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#architecture?ts=markdown) * [Best Practices for Implementing a Layered Security Model](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#best?ts=markdown) * [Defense-in-Depth FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-defense-in-depth#faqs?ts=markdown) * [What Is Just-In-Time Access?](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit?ts=markdown) * [Just-in-Time Access Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#explained?ts=markdown) * [Key Data: Threats and Trends](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#key?ts=markdown) * [Types of Just-in-Time Access](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#types?ts=markdown) * [How Just-in-Time Access Works (Conceptual Flow)](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#how?ts=markdown) * [Key Components and Capabilities](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#components?ts=markdown) * [Key Steps to Implementing Just-in-Time Access](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#steps?ts=markdown) * [Common Risks and Implementation Challenges](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#risks?ts=markdown) * [Just-in-Time Access in a Zero Trust and Modern Security Architecture](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#architecture?ts=markdown) * [Just-in-Time Access FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit#architecture?ts=markdown) * [Zero Standing Privileges: Protecting Enterprise Access Control](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges?ts=markdown) * [Zero Standing Privileges Explained](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#zero?ts=markdown) * [ZSP and Other Access Models](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#vs?ts=markdown) * [The Critical Risk of Standing Privileges](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#privileges?ts=markdown) * [Key Benefits of Adopting ZSP](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#key?ts=markdown) * [A Practical Roadmap for ZSP Implementation](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#practical?ts=markdown) * [Zero Standing Privileges FAQs](https://www.paloaltonetworks.com/cyberpedia/zero-standing-privileges#faqs?ts=markdown) * [What Is Least Privilege Access?](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access?ts=markdown) * [Least Privilege Access, Defined](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#definition?ts=markdown) * [Benefits of Least Privilege](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#benefits?ts=markdown) * [Example of Least Privilege Access](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#example?ts=markdown) * [Least Privilege vs. Zero Trust](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#vs?ts=markdown) * [Managing Least Privilege Access](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#manage?ts=markdown) * [Least Privilege Access FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access#faqs?ts=markdown) # What Is Third-Party Access? 3 min. read [Secure Your Identities](https://www.paloaltonetworks.com/identity-security?ts=markdown) Table of Contents * * [Third-Party Access Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#explained?ts=markdown) * [How Third-Party Access Is Exploited](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#how?ts=markdown) * [Types of Third-Party Access](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#types?ts=markdown) * [Third-Party Access vs. Vendor Risk Management](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#vs?ts=markdown) * [Use Cases \& Real-World Examples](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#examples?ts=markdown) * [Best Practices for Securing Third-Party Access](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#best?ts=markdown) * [Third-Party Access Policy Checklist](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#checklist?ts=markdown) * [Common Mistakes to Avoid](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#common?ts=markdown) * [Third-Party Access FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#faqs?ts=markdown) 1. Third-Party Access Explained * * [Third-Party Access Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#explained?ts=markdown) * [How Third-Party Access Is Exploited](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#how?ts=markdown) * [Types of Third-Party Access](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#types?ts=markdown) * [Third-Party Access vs. Vendor Risk Management](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#vs?ts=markdown) * [Use Cases \& Real-World Examples](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#examples?ts=markdown) * [Best Practices for Securing Third-Party Access](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#best?ts=markdown) * [Third-Party Access Policy Checklist](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#checklist?ts=markdown) * [Common Mistakes to Avoid](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#common?ts=markdown) * [Third-Party Access FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-third-party-access#faqs?ts=markdown) Third-party access is the permission granted to external vendors, contractors, or partners to access an organization's infrastructure, systems, applications, or data to perform business tasks. It increases security risk because attackers can exploit vendor credentials, tokens, or remote access tools to gain unauthorized access to environments with legitimate credentials. Securing third-party access typically requires [least privilege](https://www.paloaltonetworks.com/cyberpedia/what-is-least-privilege-access?ts=markdown), phishing-resistant [MFA](https://www.paloaltonetworks.com/cyberpedia/what-is-multi-factor-authentication?ts=markdown), application-level access (often via [ZTNA](https://www.paloaltonetworks.com/cyberpedia/what-is-zero-trust-network-access-ztna?ts=markdown)), continuous monitoring, and strict offboarding. Key Points * **Business necessity, security liability**: Vendors enable critical operations, but vendor access paths can become a fast route to compromise. \* **The riskiest access is often "legitimate"**: Many major incidents begin with valid vendor credentials, tokens, VPN accounts, or integrations. \* **Least privilege is non-negotiable**: Third parties should receive the minimum access for the minimum time, ideally brokered, monitored, and revocable. \* **Identity is the choke point**: Strong authentication, conditional access, and privileged access controls can reduce the blast radius from third-party attacks. \* **Continuous verification beats annual questionnaires**: Effective risk management relies on ongoing monitoring and enforcement rather than point-in-time compliance. ## Third-Party Access Explained Granting access to external partners is a business necessity but introduces significant operational complexity. For C-Suite executives, this represents a major supply chain risk. [According to Unit 42](https://investors.paloaltonetworks.com/news-releases/news-release-details/unit-42-report-ai-and-attack-surface-complexity-fuel-majority), attacks involving third-party SaaS applications have surged 3.8x since 2022. Attackers frequently abuse trusted connectivity, such as OAuth tokens and API keys, to move laterally after an initial compromise. For SOC leaders, the challenge lies in visibility and control. Legacy systems, such as [VPNs](https://www.paloaltonetworks.com/cyberpedia/what-is-a-vpn), often lack the granular policy enforcement needed to restrict vendors to specific tasks. When a vendor connects via VPN, they are essentially placed "inside" the network, which facilitates [lateral movement](https://www.paloaltonetworks.com/cyberpedia/what-is-lateral-movement?ts=markdown) if their account is compromised. ![Third-Party Access Explained](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/cyberpedia/what-is-third-party-access/third-party-access-explained.webp "Diagram illustrating a secure third-party access architecture. External partners (vendors, contractors, and managed service providers) authenticate through multi-factor authentication and contextual checks before entering a security gateway. Access is routed through a secure web portal and session manager that enforces session isolation, protocol translation, and monitoring, allowing least-privileged access to internal corporate IT assets such as cloud applications, databases, and on-prem infrastructure while maintaining continuous auditing, compliance reporting, and behavioral analytics.") ***Figure 1**: Flow diagram showing third-party partners passing through an Isolation \& Control Plane to reach corporate IT assets.* ## How Third-Party Access Is Exploited Attackers often succeed by abusing legitimate access rather than relying on novel exploits. ### Common Third-Party Attack Paths 1. **Credential theft or MFA fatigue** Vendor credentials may be phished, stolen from logs, or purchased. Push-based MFA may be exploited through fatigue attacks. 2. **Session or token theft** OAuth tokens, cookies, and API keys may be stolen from endpoints, CI/CD systems, or source repositories. 3. **Compromised vendor tooling** If a third-party RMM, help desk, or remote support platform is compromised, attackers may inherit legitimate access at scale. 4. **Excess permissions and privilege escalation** Overly broad access (local admin, domain admin, cloud admin roles) can enable rapid escalation and control. 5. **Lateral movement through trusted connections** After entry, attackers may move from vendor-accessible systems to high-value assets such as identity stores, cloud control planes, or production data. ## Types of Third-Party Access ***Table 1**: Types of Third-Party Access* | Third-Party Access Type | Examples | Primary Risks | | **Vendor remote access (interactive)** | VPN, ZTNA, VDI, remote desktop gateways, remote support tools | Persistent accounts, weak MFA, unmanaged devices, overly broad network access | | **Privileged access (administrator-level)** | Domain admin, cloud admin, database admin, privileged SaaS roles | Control-plane compromise, stealthy persistence, ability to disable security controls | | **Application integrations (non-human)** | OAuth apps, API keys, service accounts, SAML apps | Long-lived tokens, excessive scopes, limited visibility, and difficult rotation | | **Data sharing access** | SFTP accounts, shared storage, CRM/marketing data exports | Uncontrolled replication, data exfiltration, accidental exposure | | **Operational technology (OT) / ICS third-party access** | Vendor maintenance access for manufacturing, energy, and utilities | Safety/uptime impacts, legacy protocols, weak segmentation, hard-to-patch assets | |----------------------------------------------------------|--------------------------------------------------------------------|--------------------------------------------------------------------------------------| ## Third-Party Access vs. Vendor Risk Management These concepts are related but not identical: * **Vendor Risk Management (VRM)**: governance processes such as due diligence, contracts, questionnaires, and SLAs * **Third-party access security**: technical enforcement such as identity controls, least privilege, monitoring, and revocation A vendor may "pass" due diligence and still serve as the entry point for a breach if access is poorly controlled. ## Use Cases \& Real-World Examples The [Unit 42 2026 Global Incident Response Report](https://www.paloaltonetworks.com/blog/2026/02/unit-42-global-ir-report/?ts=markdown) highlights that the time from initial access to data exfiltration has plummeted to just 72 minutes. This speed necessitates automated, real-time security responses. * **Managed Service Providers (MSPs)**: MSPs often require privileged access to manage server clusters. Without a centralized portal, tracking their specific actions becomes nearly impossible for compliance auditing. * **[SaaS](https://www.paloaltonetworks.com/cyberpedia/what-is-saas?ts=markdown) Supply Chain Attacks**: Attackers increasingly target the "human interface" through secure browsers to harvest credentials from unmanaged third-party devices. * **Just-in-Time (JIT) Provisioning** : Organizations use [JIT access](https://www.paloaltonetworks.com/cyberpedia/what-is-just-in-time-access-jit?ts=markdown) to grant temporary permissions only when a vendor needs to perform a specific task, closing the window of opportunity for attackers. ## Best Practices for Securing Third-Party Access ### 1) Inventory all third-party access paths Effective security starts with visibility. Inventory should include: * vendor identities (human and non-human) * access methods (VPN, ZTNA, SSH, SaaS admin) * permissions, roles, and scopes * systems and data accessed * business owner and vendor owner * start/end dates aligned to contracts ### 2) Enforce least privilege and least access duration Controls should include: * role-based access control (RBAC) with minimal scopes * removal of standing admin access where feasible * time-bound access approvals * per-task provisioning and deprovisioning ### 3) Require phishing-resistant MFA and strong authentication Recommended controls include: * FIDO2/WebAuthn keys for privileged vendor access * conditional access policies (device posture, location, risk signals) * blocking legacy authentication methods ### 4) Use secure access brokering instead of flat network access Application-specific access is typically safer than broad network access: * Expose only the required application, not the full network * Apply per-app policy enforcement * Capture session-level logs for accountability This approach significantly reduces opportunities for lateral movement. ### 5) Apply privileged access controls for vendor administrators For privileged third-party access, controls commonly include: * just-in-time (JIT) elevation * session recording * command-level restrictions (where feasible) * vaulting and rotating secrets * approval workflows and dual control for high-risk actions ### 6) Manage non-human identities as first-class risk Key practices include: * discovering and cataloging API keys, OAuth apps, and service accounts * limiting scopes to the minimum required * rotating keys/tokens on a defined cadence * detecting newly created integrations and unusual API activity ### 7) Monitor continuously and alert on vendor anomalies Monitoring should detect: * creation of new vendor accounts * logins from unusual geographies or times * privilege changes and role grants * abnormal API call volume or data exports * repeated authentication failures and excessive MFA prompts * access to systems outside the approved vendor scope ### 8) Offboard vendors aggressively Effective offboarding typically includes: * disabling accounts and revoking tokens at contract end * removing group memberships and entitlements * validating removal through audit logs * tying deprovisioning to procurement and vendor-management workflows ## Third-Party Access Policy Checklist A baseline policy typically specifies: * **Allowed access methods**: ZTNA preferred; VPN restricted; no direct internet-facing RDP * **Authentication requirements**: phishing-resistant MFA for privileged access * **Device requirements**: managed device enforcement or secure browser/VDI controls * **Approval and ownership**: named internal sponsor and vendor sponsor * **Logging**: centralized log collection with retention and review requirements * **Data handling**: least data access, encryption in transit, export controls * **Incident response**: vendor notification timelines and disclosure requirements * **Offboarding SLAs**: access removal within defined time windows ## Common Mistakes to Avoid * Shared vendor logins that eliminate accountability * Permanent admin access "for convenience." * VPN access to broad network segments * Unmanaged OAuth apps and long-lived tokens * Annual access reviews without continuous verification * Incomplete vendor offboarding that leaves "ghost access" behind ## Third-Party Access FAQs ### Why is VPN insufficient for third-party access? VPNs typically provide broad network-level access rather than granular application-level control. This creates a high risk of lateral movement if a vendor's credentials are stolen. ### What is the role of identity in third-party breaches? Identity is the most reliable path for attackers. Unit 42 found identity weaknesses played a role in nearly 90% of investigations, with attackers "logging in" using stolen tokens. ### How does Just-in-Time (JIT) provisioning improve security? JIT provisioning grants access only when needed and for a limited duration. This prevents "standing privileges" that attackers can exploit at any time. ### What are the main compliance requirements for vendor access? Frameworks like NIST, ISO 27001, and PCI-DSS require organizations to vet third parties and maintain strict access controls, including enforced MFA. ### How does a secure browser help with third-party access? A secure browser can defend the modern workspace by protecting the human interface on unmanaged vendor devices, preventing credential harvesting during routine web sessions. ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Third%20Party%20Access%3F%20Common%20Mistakes%20%26%20Best%20Practices&body=Learn%20how%20third-party%20access%20works%2C%20the%20risks%20of%20vendor%20connectivity%2C%20and%20why%20Zero%20Trust%20helps%20protect%20corporate%20IT%20assets%20from%20misuse%20and%20compromise.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/what-is-third-party-access) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/what-is-privileged-access-management?ts=markdown) What Is Privileged Access Management (PAM)? [Next](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-identity-security?ts=markdown) What Is Cloud Identity Security? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language