Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[24.12.1 RN] Action Plans & Secrets #1024

Merged
merged 3 commits into from
Dec 12, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,11 @@ The LGA features are not available on all stacks and are subject to change by th
|FEATURE
|DESCRIPTION

// |*Enhanced Remediation*
//RLP-144840

// |

|tt:[Update] *Asset Inventory and Compliance*
//RLP-152449

Expand All @@ -27,31 +32,6 @@ The LGA features are not available on all stacks and are subject to change by th
* In *Compliance*, the asset-level filters are applied on asset count and show all compliances with counts as per the filters. It will still display compliance with 0 count if none of the assets get filtered. You can apply the compliance-level filters to filter by compliance.


|*Search for Assets with Secrets*
//RLP-151640

|The *Secrets* attributes within the *Investigate > Asset* search help you prioritize and find assets with secret exposure risks. Along with *Finding* and *Vulnerability*, you can now also use *Secret* as a security context to identify Attack Paths in your environment. You can create custom policies based on the specific asset query.

In order to use the *Secrets* attributes, make sure you have enabled *Agentless Scanning* during onboarding.

image::secrets-2.png[]
//<autosuggest screenshot>

You can view your search results in both Table and Graph modes. In the Table mode, a new *View by: Secret* allows you to view all the secret detections that match the query.

image::secrets-1.png[]

In the Graph mode, each Secrets node is a representation of all the secret detections for that specific asset.

image::secrets-3.png[]
//<ap graph screenshot>

To see all matching secret detections for the given asset, click on the *Secrets* node and then click *View Details*.
//additional information on the Secrets detected.

image::secrets-4.png[]


|*Tag-based RBAC with Resource Lists*
//RLP-143394

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,14 +33,46 @@ tt:[24.12.1]

|Secure your cloud assets with enhanced efficiency with https://docs.prismacloud.io/en/enterprise-edition/content-collections/administration/action-plans[Prisma Cloud Action Plans]. Action Plans programmatically group multiple alerts related to a single affected asset into one actionable plan. Every Action Plans include a summary as well as specific remediation steps, tailored to effectively maximize risk reduction.

* *Prioritization*: Action Plans group together alerts and assets that can be secured through a single fix, ensuring your security team spends time on the most effective outcomes. Actions are prioritize based on security context and Prisma Cloud alerts.
* *Execution and Delegation*: Leverage your integrations on Prisma Cloud to help delegate security fixes to your team through Jira tickets and/or Slack messages with a single click.
* *Detailed Visibility*: Ensure that every alert resolved or asset impacted is visible in one location, and provide detailed context to your security teams.
* *Security Fix Efficiency*: Using machine learning and generative models, Action Plans help summarize tasks acrossthe various alerts that impact the same asset, ensuring that there is a comprehensive plan to reduce alerts with the least number of required steps.
* *Prioritization*—Action Plans group together alerts and assets that can be secured through a single fix, ensuring your security team spends time on the most effective outcomes. Actions are prioritized based on security context and Prisma Cloud alerts.
* *Execution and Delegation*—Leverage your integrations on Prisma Cloud to help delegate security fixes to your team through Jira tickets and/or Slack messages with a single click.
* *Detailed Visibility*—Ensure that every alert resolved or asset impacted is visible in one location, and provide detailed context to your security teams.
* *Security Fix Efficiency*—Using machine learning and generative models, Action Plans help summarize tasks across the various alerts that impact the same asset, ensuring that there is a comprehensive plan to reduce alerts with the least number of required steps.

NOTE: Action Plans is released in a phased rollout and will be available on all Prisma Cloud stacks by December 23, 2024.

image::action-plans-rn.gif[]


|*Search for Assets with Secrets*

tt:[Secure the Infrastructure]

tt:[24.12.1]

//RLP-151640

|The *Secrets* attributes within the *Investigate > Asset* search help you prioritize and find assets with secret exposure risks. Along with *Finding* and *Vulnerability*, you can now also use *Secrets* as a security context to identify Attack Paths in your environment. You can create custom policies based on the specific asset query.

In order to use the *Secrets* attributes, make sure you have enabled *Agentless Scanning* during onboarding.

image::secrets-2.png[]
//<autosuggest screenshot>

You can view your search results in both Table and Graph modes. In the Table mode, a new *View by: Secret* allows you to view all the secret detections that match the query.

image::secrets-1.png[]

In the Graph mode, each Secrets node is a representation of all the secret detections for that specific asset.

image::secrets-3.png[]
//<ap graph screenshot>

To see all matching secret detections for the given asset, click on the *Secrets* node and then click *View Details*.
//additional information on the Secrets detected.

image::secrets-4.png[]


|*AISPM Compliance with OWASP Top 10 for LLM and NIST AI 600-1*

tt:[Secure the Data]
Expand All @@ -50,6 +82,7 @@ tt:[24.12.1]

|To empower your organization to proactively address the unique security, ethical, and regulatory challenges associated with AI deployments, Prisma Cloud AISPM now includes enhanced risk identification and compliance capabilities for AI and ML systems that aligns with two critical standards - OWASP Top 10 for Large Language Models (LLM) and NIST AI 600-1.


|===

[#changes-in-existing-behavior]
Expand Down
Loading