Skip to content

Commit

Permalink
[24.12.1 RN] Action Plans & Secrets
Browse files Browse the repository at this point in the history
  • Loading branch information
arane26 committed Dec 12, 2024
1 parent e9c7310 commit 12e750c
Show file tree
Hide file tree
Showing 2 changed files with 45 additions and 29 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,11 @@ The LGA features are not available on all stacks and are subject to change by th
|FEATURE
|DESCRIPTION

// |*Enhanced Remediation*
//RLP-144840

// |

|tt:[Update] *Asset Inventory and Compliance*
//RLP-152449

Expand All @@ -27,31 +32,6 @@ The LGA features are not available on all stacks and are subject to change by th
* In *Compliance*, the asset-level filters are applied on asset count and show all compliances with counts as per the filters. It will still display compliance with 0 count if none of the assets get filtered. You can apply the compliance-level filters to filter by compliance.
|*Search for Assets with Secrets*
//RLP-151640

|The *Secrets* attributes within the *Investigate > Asset* search help you prioritize and find assets with secret exposure risks. Along with *Finding* and *Vulnerability*, you can now also use *Secret* as a security context to identify Attack Paths in your environment. You can create custom policies based on the specific asset query.

In order to use the *Secrets* attributes, make sure you have enabled *Agentless Scanning* during onboarding.

image::secrets-2.png[]
//<autosuggest screenshot>

You can view your search results in both Table and Graph modes. In the Table mode, a new *View by: Secret* allows you to view all the secret detections that match the query.

image::secrets-1.png[]

In the Graph mode, each Secrets node is a representation of all the secret detections for that specific asset.

image::secrets-3.png[]
//<ap graph screenshot>

To see all matching secret detections for the given asset, click on the *Secrets* node and then click *View Details*.
//additional information on the Secrets detected.

image::secrets-4.png[]


|*Tag-based RBAC with Resource Lists*
//RLP-143394

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,13 +33,48 @@ tt:[24.12.1]

|Secure your cloud assets with enhanced efficiency with https://docs.prismacloud.io/en/enterprise-edition/content-collections/administration/action-plans[Prisma Cloud Action Plans]. Action Plans programmatically group multiple alerts related to a single affected asset into one actionable plan. Every Action Plans include a summary as well as specific remediation steps, tailored to effectively maximize risk reduction.

* *Prioritization*: Action Plans group together alerts and assets that can be secured through a single fix, ensuring your security team spends time on the most effective outcomes. Actions are prioritize based on security context and Prisma Cloud alerts.
* *Execution and Delegation*: Leverage your integrations on Prisma Cloud to help delegate security fixes to your team through Jira tickets and/or Slack messages with a single click.
* *Detailed Visibility*: Ensure that every alert resolved or asset impacted is visible in one location, and provide detailed context to your security teams.
* *Security Fix Efficiency*: Using machine learning and generative models, Action Plans help summarize tasks acrossthe various alerts that impact the same asset, ensuring that there is a comprehensive plan to reduce alerts with the least number of required steps.
* *Prioritization*Action Plans group together alerts and assets that can be secured through a single fix, ensuring your security team spends time on the most effective outcomes. Actions are prioritized based on security context and Prisma Cloud alerts.
* *Execution and Delegation*Leverage your integrations on Prisma Cloud to help delegate security fixes to your team through Jira tickets and/or Slack messages with a single click.
* *Detailed Visibility*Ensure that every alert resolved or asset impacted is visible in one location, and provide detailed context to your security teams.
* *Security Fix Efficiency*Using machine learning and generative models, Action Plans help summarize tasks acrossthe various alerts that impact the same asset, ensuring that there is a comprehensive plan to reduce alerts with the least number of required steps.
image::action-plans-rn.gif[]

[NOTE]
====
Action Plans is released in a phased rollout and will be available on all Prisma Cloud stacks by December 23, 2024.
====


|*Search for Assets with Secrets*

tt:[Secure the Infrastructure]

tt:[24.12.1]

//RLP-151640

|The *Secrets* attributes within the *Investigate > Asset* search help you prioritize and find assets with secret exposure risks. Along with *Finding* and *Vulnerability*, you can now also use *Secret* as a security context to identify Attack Paths in your environment. You can create custom policies based on the specific asset query.

In order to use the *Secrets* attributes, make sure you have enabled *Agentless Scanning* during onboarding.

image::secrets-2.png[]
//<autosuggest screenshot>

You can view your search results in both Table and Graph modes. In the Table mode, a new *View by: Secret* allows you to view all the secret detections that match the query.

image::secrets-1.png[]

In the Graph mode, each Secrets node is a representation of all the secret detections for that specific asset.

image::secrets-3.png[]
//<ap graph screenshot>

To see all matching secret detections for the given asset, click on the *Secrets* node and then click *View Details*.
//additional information on the Secrets detected.

image::secrets-4.png[]


|*AISPM Compliance with OWASP Top 10 for LLM and NIST AI 600-1*

Expand All @@ -50,6 +85,7 @@ tt:[24.12.1]

|To empower your organization to proactively address the unique security, ethical, and regulatory challenges associated with AI deployments, Prisma Cloud AISPM now includes enhanced risk identification and compliance capabilities for AI and ML systems that aligns with two critical standards - OWASP Top 10 for Large Language Models (LLM) and NIST AI 600-1.


|===

[#changes-in-existing-behavior]
Expand Down

0 comments on commit 12e750c

Please sign in to comment.