Cloud Security Posture Management

Comprehensive cloud security across the world’s largest clouds.

Detecting and preventing the misconfigurations and threats that lead to data breaches and compliance violations is growing ever more difficult as cloud architectures become increasingly complex.

Download the latest datasheet on CSPM.

Continuously monitor all your cloud resources

As enterprises adopt cloud native methodologies and gain the flexibility of multi-cloud architectures, stitching together security data from disparate legacy tools becomes a considerable obstacle. DevOps and security teams need a single, integrated solution that provides complete visibility into every deployed resource alongside configuration and compliance status.
Prisma Cloud takes a unique approach to Cloud Security Posture Management (CSPM), going beyond mere compliance or configuration management. Vulnerability intelligence from more than 30 data sources provides immediate clarity on critical security issues while controls across the development pipeline prevent insecure configurations from ever reaching production.
  • Gain complete visibility across clouds
  • Prevent configuration drift
  • Protect identities and data, and enforce compliance
  • Visibility, Compliance and Governance
    Visibility, Compliance and Governance
  • Threat Detection
    Threat Detection
  • Data Security
    Data Security
  • Infrastructure-as-Code Scanning
    Infrastructure-as-Code Scanning


Our approach to Cloud Security Posture Management

Visibility, Compliance and Governance

Prisma Cloud delivers comprehensive visibility and control over the security posture of every deployed resource. While some solutions simply aggregate asset data, Prisma Cloud analyzes and normalizes disparate data sources to provide unmatched risk clarity.

  • Cloud asset inventory

    Gain continuous visibility across all deployed assets from a single, unified console with more than 1.5 billion assets monitored across customers. Leverage automated workload and application classification across more than 100 services as well as full lifecycle asset change attribution.

  • Configuration assessment

    Immediately enforce configuration guardrails with more than 600 policies built in across more than 120 cloud services. Automatically fix common misconfigurations before they lead to security incidents. Build custom policies once that span across multi-cloud environments.

  • Compliance management

    Take advantage of continuous compliance posture monitoring and one-click reporting with comprehensive coverage (CIS, GDPR, HIPAA, ISO-27001, NIST-800, PCI-DSS, SOC 2, etc.) and support for custom reporting. Easily investigate and auto-remediate compliance violations.

  • Easy-to-use query language

    Gain security and operational insights about your deployments in public cloud environments. Perform configuration checks on resources and query network events across different cloud platforms. Turn queries into custom cloud-agnostic policies and define remediation steps and compliance implications.

  • Automated remediation

    Automatically resolve policy violations, such as misconfigured security groups within the Prisma Cloud console. Send alert notification to 14 third-party tools, including email, AWS Lambda, Security Hub, PagerDuty®, ServiceNow® and Slack®. Integrate with SOAR tools including Cortex® XSOAR for multi-step remediation playbooks.

Threat Detection

Static positive/negative or rule-based policies are an essential foundation for effective cloud security, but alone do not adequately cover the entire threat landscape. Anomaly-based policies that leverage machine learning to monitor and report on suspicious or unusual activities complement traditional policy libraries for a comprehensive threat detection strategy.

  • Network anomaly detection

    Leverage intel on more than 500 billion flow logs ingested weekly to pinpoint unusual network activities. Classify and view detailed information on suspicious IPs and investigate affected resources with powerful visualizations. Detect port scan or port sweep activities that probe a server or host for open ports.

  • User entity behavior analytics (UEBA)

    Monitor cloud environments for unusual user activities. Discover insider threats and potential account compromises. Leverage industry-leading ML capabilities with more than 5 billion audit logs ingested weekly.

  • Integrated threat detection dashboards

    Use powerful dashboards that highlight alerts and compromises within our console, helping you easily understand suspicious network communication and user activity.

Data Security

Prisma Cloud Data Security is purpose-built to address the challenges of discovering and protecting data at the scale and velocity common in public cloud environments. By combining the power of Palo Alto Networks Enterprise Data Loss Prevention (DLP) and WildFire® malware prevention service, only Prisma Cloud Data Security offers a comprehensive, integrated cloud native solution.

  • Data visibility and classification

    Get complete visibility into all S3 buckets and objects, including contents by region, owner and exposure level. Inventory data by accounts or groups. Detail any object, including metadata, in the Prisma Cloud object explorer. Detect sensitive data such as PII, financial and healthcare data, and intellectual property.

  • Data governance

    Use pre-built and customizable policies to detect data such as PII in publicly exposed objects. Enable or disable data compliance profiles for types such as PII, healthcare, financial and intellectual property based on mandates.

  • Malware detection

    Identify and protect against known and unknown file-based threats that have infiltrated S3 buckets. Flag any object that contains malware as determined by WildFire.

  • Alerting

    View alerts for each object based on data classification, data exposure and file types. Forward alerts to AWS SQS, Azure Queuing Services, Splunk and Webhooks to notify other teams for investigation and remediation.

Infrastructure-as-Code Scanning

Prisma Cloud offers software plugins for developers to proactively perform vulnerability management as well as configuration/compliance assessments of IaC templates, including AWS CloudFormation, HashiCorp Terraform and Kubernetes deployment YAMLs, to reduce risk in production environments.

  • Identify misconfigurations early in development

    Give developers and DevOps teams visibility into their infrastructure configurations directly in their development tooling.

  • Use native plugins optimized for developer toolkits

    Employ numerous plugins for IDE, SCM, CI and CD tooling used by developers. This frictionless approach enables developers to scan their IaC templates directly in the products they use to build and deploy their code.

  • Maintain DevOps inventory for centralized visibility

    In addition to complete visibility into every deployed resource, gain centralized visibility into IaC scan results, including specific details such as which policy violations failed.

  • Set global policies for development and DevOps

    Enable your security and DevOps teams to work together to improve risk posture by setting policies covering their build and deploy pipelines.

Prisma Cloud
Prisma Cloud
Prisma Cloud delivers the industry’s broadest security and compliance coverage—for applications, data, and the entire cloud native technology stack—throughout the development lifecycle and across multi- and hybrid-cloud environments.

Cloud Security Posture Management modules

Visibility, Compliance and Governance

Continuously monitor all cloud resources for misconfigurations, vulnerabilities and other security threats. Simplify compliance reporting.

Threat Detection

Pinpoint the highest risk security issues with ML-powered and threat intelligence-based detection with contextual insights.

Data Security

Continuously monitor cloud storage for security threats, govern file access and mitigate malware attacks.