From c554ae73bf66452246d666bf0a48ab7e09ef8891 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E2=80=9Crcaballeromx=E2=80=9D?= <“rcaballero@paloaltonetworks.com”> Date: Fri, 26 Jan 2024 17:09:47 -0800 Subject: [PATCH 01/15] [Runtime Security PCCE] O'Neal Update 2 Release Notes --- docs/en/compute-edition/32/rn/book.yml | 2 + .../32/rn/book_point_release.yml | 4 +- .../release-notes-32-02.adoc | 205 ++++++++++++++++++ 3 files changed, 209 insertions(+), 2 deletions(-) create mode 100644 docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc diff --git a/docs/en/compute-edition/32/rn/book.yml b/docs/en/compute-edition/32/rn/book.yml index 811e5f70ec..0594923e1d 100644 --- a/docs/en/compute-edition/32/rn/book.yml +++ b/docs/en/compute-edition/32/rn/book.yml @@ -18,6 +18,8 @@ dir: release-information topics: - name: Prisma(TM) Cloud Compute Edition Release Information file: release-information.adoc + - name: 32.02 Release Notes + file: release-notes-32-02.adoc - name: 32.01 Release Notes file: release-notes-32-01.adoc - name: 32.00 Release Notes diff --git a/docs/en/compute-edition/32/rn/book_point_release.yml b/docs/en/compute-edition/32/rn/book_point_release.yml index 578f273964..7ed7072dca 100644 --- a/docs/en/compute-edition/32/rn/book_point_release.yml +++ b/docs/en/compute-edition/32/rn/book_point_release.yml @@ -2,7 +2,7 @@ kind: book title: Prisma Cloud Compute Edition Release Notes author: Prisma Cloud team -version: 32.01 +version: 32.02 ditamap: prisma-cloud-compute-edition-release-notes dita: techdocs/en_US/dita/prisma/prisma-cloud/32/prisma-cloud-compute-edition-release-notes --- @@ -12,7 +12,7 @@ dir: release-information topics: - name: Prisma(TM) Cloud Compute Edition Release Information file: release-information.adoc - - name: 32.01 (Build 32.01.128) + - name: 32.02 (Build 32.02.127) file: release-notes-32-01.adoc --- kind: chapter diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc new file mode 100644 index 0000000000..e645fb82d8 --- /dev/null +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -0,0 +1,205 @@ +:toc: macro +== 32.02 Release Notes + +The following table outlines the release particulars: + +[cols="1,4"] +|=== +|Build +|32.02.128 + +|Code name +|O'Neal - Update 2, 32.02 + +|Release date +|January 28th, 2024 + +|Type +|Maintenance Release + +|SHA-256 +|a4790f3e94509fb1d80b0ff5a3567ac57295fd52b976b7f67d34ab268f9636ee + +|=== + +Review the https://docs.paloaltonetworks.com/prisma/prisma-cloud/32/prisma-cloud-compute-edition-admin/install/system_requirements[system requirements] to learn about the supported operating systems, hypervisors, runtimes, tools, and orchestrators. + +// You can download the release image from the Palo Alto Networks Customer Support Portal, or use a program or script (such as curl, wget) to download the release image directly from our CDN: + +// LINK + +toc::[] + +[#upgrade] +=== Upgrade from Previous Releases + +[#upgrade-defender] +==== Upgrade Defender Versions 22.06 and Earlier + +With the `v32.00` release, https://docs.paloaltonetworks.com/prisma/prisma-cloud/32/prisma-cloud-compute-edition-admin/welcome/support_lifecycle[Defender versions supported (n, n-1, and n-2)] are `v32.00`, `v31.00`, and `v30.00`. + +To prepare for this update, you must upgrade your Defenders from version `v22.06` (Kepler) or earlier to a later version. +Failure to upgrade Defenders will result in disconnection of any Defender version below `v22.12` such as `v22.06`. + +[#upgrade-console] +==== Upgrade the Prisma Cloud Console + +With the `v32.00` release, the https://docs.paloaltonetworks.com/prisma/prisma-cloud/32/prisma-cloud-compute-edition-admin/welcome/support_lifecycle[supported Console versions (n, n-1, and n-2)] are `v32.00`, `v31.00`, and `v30.00`. + +You can upgrade the Prisma Cloud console directly from any version for n-1 to n. +With `v30.00` as n-1 and `v31.00` as n, you can for example go directly from `v30.01.153` to `v31.00.129`. + +You have to upgrade any version of `v22.00` to `v30.00` before upgrading to `v31.00`. +For example, you can upgrade from `v22.12.693` to `v30.02.123` and then upgrade to `v32.00.159`. + +//[#cve-coverage-update] +//=== CVE Coverage Update + +[#api-changes] +=== API Changes and New APIs + +//CWP-51321 +* Collections that were added using the https://pan.dev/prisma-cloud/api/cwpp/post-collections/[Add a New Collection] did not display as expected in the Console. This issue has been resolved by making all request body fields, except `name`, optional. Any field that is not provided will default to the wildcard value '*'. + +[#enhancements] +=== Enhancements + +[cols="40%a,60%a"] +|=== + +|FEATURE +|DESCRIPTION + +//CWP-52181 +|*Agentless Scanning* +|Enabled the scan of non-running hosts by default. +Agentless scanning now scans non-running hosts by default for all newly added accounts. +This change does not effects existing accounts. + +//CWP-49984 +|*Registry Scanning* +|Improved registry scanning by adding the following two new fields to sort the registry scans: registry scan status and registry last scan time.A new unified progress indicator shows the status of all scanning and pending registries. + +//CWP-55308 +|*Cloud Account Management* +|Introduced the *Account Import Status* filter on the *Cloud Accounts* page in *Runtime Security*. +This feature includes three statuses: + +* *Local accounts:* cloud accounts created in Runtime Security only (and not in the Prisma Cloud console) +* *Manually imported accounts:* cloud accounts that were manually imported from Prisma Cloud console to Runtime Security in the past prior to the Lagrange release (end of 2022) +* *Auto-imported accounts:* Originating from Prisma Cloud console and seamlessly imported into Runtime Security. + +|=== + +// [#new-features-core] +// === New Features in Core + + +//[#new-features-host-security] +//=== New Features in Host Security + +//[#new-features-serverless] +//=== New Features in Serverless + +//[#new-features-waas] +//=== New Features in WAAS + +// [#api-changes] +// === API Changes and New APIs + + + +[#breaking-api-changes] +=== Breaking Changes in API + +//CWP-36043 / CWP-53875 +*Deprecated APIs for Code Security Module for Scanning* + +The Code Repository Scanning feature is deprecated as Prisma Cloud offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. + +The following Code Scan endpoints are deprecated: + +* `/api/v32.00/coderepos` - *GET* - returns code repositories scan results +* `/api/v32.00/coderepos/scan` - *POST* - triggers a scan for all code repositories +* `/api/v32.00/coderepos/stop` - *POST* - stops the current active scan +* `/api/v32.00/coderepos/download `- *GET* - downloads code repository scan results +* `/api/v32.00/coderepos/progress` - *GET* - returns the code repositories scan progress +* `/api/v32.00/coderepos/discover` - *GET* - discovers the available repositories for a credential according to the given credential ID +* `/api/v32.00/coderepos-ci` - *POST* - adds a CI code repo scan result +* `/api/v32.00/coderepos-ci` - *GET* - returns CI code repositories scan results +* `/api/v32.00/coderepos-ci/download` - *GET* - downloads CI code repository scan result +* `/api/v32.00/policies/vulnerability/coderepos` - *GET* - returns the code repository vulnerability policy +* `/api/v32.00/policies/vulnerability/coderepos/impacted` - *GET* - returns a list of repositories that the policy rule applies to +* `/api/v32.00/policies/vulnerability/ci/coderepos` - *GET* - returns the CI code repo vulnerabilities policy +* `/api/v32.00/policies/compliance/coderepos` - *GET* - returns the code repository compliance policy +* `/api/v32.00/policies/compliance/coderepos/impacted` - *GET* - returns a list of repositories that the policy rule applies to +* `/api/v32.00/policies/compliance/ci/coderepos `- *GET* - returns the CI code repository compliance policy +* `/api/v32.00/policies/vulnerability/coderepos` - *PUT* - sets the given access/vulnerability or compliance policy +* `/api/v32.00/policies/vulnerability/ci/coderepos` - *PUT* - sets the given access/vulnerability or compliance policy +* `/api/v32.00/policies/compliance/coderepos` - *PUT* - sets the given access/vulnerability or compliance policy +* `/api/v32.00/policies/compliance/ci/coderepos`- *PUT* - sets the given access/vulnerability or compliance policy +* `/api/v32.00/settings/coderepos` - *PUT* - sets the code repository scan settings +* `/api/v32.00/settings/coderepos` - *GET* - returns the code repository scan settings +* `/api/v32.00/coderepos/webhook/{" + id + "}"` - *POST* - handles events from code repositories + +[#end-support] +=== End of Support Notifications + +[cols="30%a,70%a"] +|=== + +//CWP-36043 / CWP-50985 +|*Code Security Module for Scanning* +|The Code Repository Scanning feature is deprecated as Prisma Cloud offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. + +|=== + +[#addressed-issues] +=== Addressed Issues + +[cols="40%a,60%a"] +|=== + +|*FIXED VERSION* +|*DESCRIPTION* +//CWP-46155 +|tt:[Fixed in 32.02] +|Agentless scanning now supports scanning of Podman container images deployed to hosts with the default storage driver. + +//CWP-46167 +|tt:[Fixed in 32.02] +|Fixed an issue where scanning scripts that contain binary data caused memory consumption issues. + +//CWP-47706 - Waiting on inputs +// |tt:[Fixed in 32.02] +// | + +//CWP-47945 (API Waiting on inputs) +|tt:[Fixed in 32.02] +| + +//CWP-48097 +|tt:[Fixed in 32.02] +|Fixed an issue causing some TAS blobstore controllers not to be listed. + +//CWP-48530 +|tt:[Fixed in 32.02] +|Fixed an issue where during configuration of Tanzu blobstore scanner, the did not filter for scanners coming from the selected cloud controller. Now, when you provide a cloud controller in the Tanzu blobstore scan configuration, only suitable scanners are available to select in the scanner dropdown. +Fixed an issue found during configuration of the Tanzu blobstore scanner. The configuration didn't filter the scanners from the selected cloud controller correctly. Now, when you provide a cloud controller in the Tanzu blobstore scan configuration, only suitable scanners are available to select in the scanner dropdown. + +//CWP-52027 +|tt:[Fixed in 32.02] +|Fixed an issue where users could not see credentials stored in the Runtime Security credential store, when creating a new System Admin role while specifying cloud accounts only onboarded under Runtime Security. + +//CWP-54804 +|tt:[Fixed in 32.02] +|Added support for installing serverless defender on AWS with NodeJS runtime, using layer based deployment type and ES modules type. +|=== + +//[#backward-compatibility] +//=== Backward Compatibility for New Features + +//[#change-in-behavior] +//=== Change in Behavior + +//==== Breaking fixes compare with SaaS RN From 1092827c9e3294a402c9c61ad434a5b37405cbf4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E2=80=9Crcaballeromx=E2=80=9D?= <“rcaballero@paloaltonetworks.com”> Date: Fri, 26 Jan 2024 17:32:10 -0800 Subject: [PATCH 02/15] Remove PCEE only issue --- .../rn/release-information/release-notes-32-02.adoc | 12 +++--------- 1 file changed, 3 insertions(+), 9 deletions(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index e645fb82d8..978870045c 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -26,7 +26,7 @@ Review the https://docs.paloaltonetworks.com/prisma/prisma-cloud/32/prisma-cloud // You can download the release image from the Palo Alto Networks Customer Support Portal, or use a program or script (such as curl, wget) to download the release image directly from our CDN: -// LINK +LINK toc::[] @@ -55,11 +55,9 @@ For example, you can upgrade from `v22.12.693` to `v30.02.123` and then upgrade //[#cve-coverage-update] //=== CVE Coverage Update -[#api-changes] -=== API Changes and New APIs +// [#api-changes] +// === API Changes and New APIs -//CWP-51321 -* Collections that were added using the https://pan.dev/prisma-cloud/api/cwpp/post-collections/[Add a New Collection] did not display as expected in the Console. This issue has been resolved by making all request body fields, except `name`, optional. Any field that is not provided will default to the wildcard value '*'. [#enhancements] === Enhancements @@ -187,10 +185,6 @@ The following Code Scan endpoints are deprecated: |Fixed an issue where during configuration of Tanzu blobstore scanner, the did not filter for scanners coming from the selected cloud controller. Now, when you provide a cloud controller in the Tanzu blobstore scan configuration, only suitable scanners are available to select in the scanner dropdown. Fixed an issue found during configuration of the Tanzu blobstore scanner. The configuration didn't filter the scanners from the selected cloud controller correctly. Now, when you provide a cloud controller in the Tanzu blobstore scan configuration, only suitable scanners are available to select in the scanner dropdown. -//CWP-52027 -|tt:[Fixed in 32.02] -|Fixed an issue where users could not see credentials stored in the Runtime Security credential store, when creating a new System Admin role while specifying cloud accounts only onboarded under Runtime Security. - //CWP-54804 |tt:[Fixed in 32.02] |Added support for installing serverless defender on AWS with NodeJS runtime, using layer based deployment type and ES modules type. From ab089a1ed07ea60640a3c28aa2d81cbbb66d0232 Mon Sep 17 00:00:00 2001 From: anaghapamidi <94159219+anaghapamidi@users.noreply.github.com> Date: Mon, 29 Jan 2024 18:34:01 +0530 Subject: [PATCH 03/15] Committing out blurb CWP-55308. Awaiting fix version change from Ori --- .../release-information/release-notes-32-02.adoc | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index 978870045c..ccd186e8ff 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -78,14 +78,14 @@ This change does not effects existing accounts. |*Registry Scanning* |Improved registry scanning by adding the following two new fields to sort the registry scans: registry scan status and registry last scan time.A new unified progress indicator shows the status of all scanning and pending registries. -//CWP-55308 -|*Cloud Account Management* -|Introduced the *Account Import Status* filter on the *Cloud Accounts* page in *Runtime Security*. -This feature includes three statuses: - -* *Local accounts:* cloud accounts created in Runtime Security only (and not in the Prisma Cloud console) -* *Manually imported accounts:* cloud accounts that were manually imported from Prisma Cloud console to Runtime Security in the past prior to the Lagrange release (end of 2022) -* *Auto-imported accounts:* Originating from Prisma Cloud console and seamlessly imported into Runtime Security. +// //CWP-55308 +// |*Cloud Account Management* +// |Introduced the *Account Import Status* filter on the *Cloud Accounts* page in *Runtime Security*. +// This feature includes three statuses: + +// * *Local accounts:* cloud accounts created in Runtime Security only (and not in the Prisma Cloud console) +// * *Manually imported accounts:* cloud accounts that were manually imported from Prisma Cloud console to Runtime Security in the past prior to the Lagrange release (end of 2022) +// * *Auto-imported accounts:* Originating from Prisma Cloud console and seamlessly imported into Runtime Security. |=== From 3a0b723879a261ede963c30c2b78a7acbca5fbc7 Mon Sep 17 00:00:00 2001 From: anaghapamidi <94159219+anaghapamidi@users.noreply.github.com> Date: Mon, 29 Jan 2024 18:38:58 +0530 Subject: [PATCH 04/15] Updated and Made fixes to Adderessed Issues --- .../release-information/release-notes-32-02.adoc | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index ccd186e8ff..71d366dd1d 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -148,7 +148,7 @@ The following Code Scan endpoints are deprecated: //CWP-36043 / CWP-50985 |*Code Security Module for Scanning* -|The Code Repository Scanning feature is deprecated as Prisma Cloud offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. +|The Code Repository Scanning feature is deprecated as Prisma Cloud offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. |=== @@ -166,15 +166,15 @@ The following Code Scan endpoints are deprecated: //CWP-46167 |tt:[Fixed in 32.02] -|Fixed an issue where scanning scripts that contain binary data caused memory consumption issues. +|Fixed an issue where scanning scripts that contain binary data caused memory consumption issues. //CWP-47706 - Waiting on inputs // |tt:[Fixed in 32.02] // | -//CWP-47945 (API Waiting on inputs) +//CWP-47945 |tt:[Fixed in 32.02] -| +|Improved the detection of vulnerabilities on supported Windows OS workloads to fix false negative and false positive alerts related to Windows feeds. //CWP-48097 |tt:[Fixed in 32.02] @@ -182,12 +182,16 @@ The following Code Scan endpoints are deprecated: //CWP-48530 |tt:[Fixed in 32.02] -|Fixed an issue where during configuration of Tanzu blobstore scanner, the did not filter for scanners coming from the selected cloud controller. Now, when you provide a cloud controller in the Tanzu blobstore scan configuration, only suitable scanners are available to select in the scanner dropdown. -Fixed an issue found during configuration of the Tanzu blobstore scanner. The configuration didn't filter the scanners from the selected cloud controller correctly. Now, when you provide a cloud controller in the Tanzu blobstore scan configuration, only suitable scanners are available to select in the scanner dropdown. +|Fixed an issue found during configuration of the Tanzu blobstore scanner. The configuration didn't filter the scanners from the selected cloud controller correctly. Now, when you provide a cloud controller in the Tanzu blobstore scan configuration, only the suitable scanners are available in the scanner dropdown. //CWP-54804 |tt:[Fixed in 32.02] |Added support for installing serverless defender on AWS with NodeJS runtime, using layer based deployment type and ES modules type. + +//CWP-52027 +|tt:[Fixed in 32.02] +|Fixed an issue where users could not see credentials stored in the Runtime Security credential store, when creating a new System Admin role while specifying cloud accounts only onboarded under Runtime Security. + |=== //[#backward-compatibility] From 693042262833b3c864c46f8bf9ce06633a6a9d8e Mon Sep 17 00:00:00 2001 From: anaghapamidi <94159219+anaghapamidi@users.noreply.github.com> Date: Mon, 29 Jan 2024 19:02:38 +0530 Subject: [PATCH 05/15] Update the build number --- .../32/rn/release-information/release-notes-32-02.adoc | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index 71d366dd1d..b97c951592 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -6,8 +6,7 @@ The following table outlines the release particulars: [cols="1,4"] |=== |Build -|32.02.128 - +|32.02.127 |Code name |O'Neal - Update 2, 32.02 From f4f841584da46a59ea39980d0be3f0fb32f1a0b9 Mon Sep 17 00:00:00 2001 From: anaghapamidi <94159219+anaghapamidi@users.noreply.github.com> Date: Mon, 29 Jan 2024 19:04:32 +0530 Subject: [PATCH 06/15] Update to blurbs based on Gdoc --- .../32/rn/release-information/release-notes-32-02.adoc | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index b97c951592..a0bbdf53cf 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -112,9 +112,10 @@ This change does not effects existing accounts. //CWP-36043 / CWP-53875 *Deprecated APIs for Code Security Module for Scanning* -The Code Repository Scanning feature is deprecated as Prisma Cloud offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. +The Code Repository Scanning feature in Prisma Cloud Compute is no longer available as Prisma Cloud (Cloud Application Security) offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. + +Also, the following Prisma Cloud Compute (CWPP) code scan endpoints have been sunset (removed): -The following Code Scan endpoints are deprecated: * `/api/v32.00/coderepos` - *GET* - returns code repositories scan results * `/api/v32.00/coderepos/scan` - *POST* - triggers a scan for all code repositories @@ -147,7 +148,7 @@ The following Code Scan endpoints are deprecated: //CWP-36043 / CWP-50985 |*Code Security Module for Scanning* -|The Code Repository Scanning feature is deprecated as Prisma Cloud offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. +|The Code Repository Scanning feature is deprecated as Prisma Cloud offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. |=== From d735f1ecec8c4afcaf32d12490ba89517fc99375 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E2=80=9Crcaballeromx=E2=80=9D?= <“rcaballero@paloaltonetworks.com”> Date: Mon, 29 Jan 2024 17:26:00 -0800 Subject: [PATCH 07/15] Address feedback --- .../rn/release-information/release-notes-32-02.adoc | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index a0bbdf53cf..a5be6d729c 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -71,11 +71,16 @@ For example, you can upgrade from `v22.12.693` to `v30.02.123` and then upgrade |*Agentless Scanning* |Enabled the scan of non-running hosts by default. Agentless scanning now scans non-running hosts by default for all newly added accounts. -This change does not effects existing accounts. +This change does not affect existing accounts. //CWP-49984 |*Registry Scanning* -|Improved registry scanning by adding the following two new fields to sort the registry scans: registry scan status and registry last scan time.A new unified progress indicator shows the status of all scanning and pending registries. +|Improved registry scanning by adding the following two new fields to sort the registry scans: registry scan status and registry last scan time. +A new unified progress indicator shows the status of all scanning and pending registries. + +//CWP-47706 +|*Vulnerability Management* +|Improved the detection of vulnerabilities on supported Windows OS workloads to fix false negative and false positive alerts related to Windows feeds. // //CWP-55308 // |*Cloud Account Management* @@ -84,7 +89,7 @@ This change does not effects existing accounts. // * *Local accounts:* cloud accounts created in Runtime Security only (and not in the Prisma Cloud console) // * *Manually imported accounts:* cloud accounts that were manually imported from Prisma Cloud console to Runtime Security in the past prior to the Lagrange release (end of 2022) -// * *Auto-imported accounts:* Originating from Prisma Cloud console and seamlessly imported into Runtime Security. +// * *Auto-imported accounts:* cloud accounts that originated from Prisma Cloud console and seamlessly imported into Runtime Security. |=== @@ -131,7 +136,7 @@ Also, the following Prisma Cloud Compute (CWPP) code scan endpoints have been su * `/api/v32.00/policies/vulnerability/ci/coderepos` - *GET* - returns the CI code repo vulnerabilities policy * `/api/v32.00/policies/compliance/coderepos` - *GET* - returns the code repository compliance policy * `/api/v32.00/policies/compliance/coderepos/impacted` - *GET* - returns a list of repositories that the policy rule applies to -* `/api/v32.00/policies/compliance/ci/coderepos `- *GET* - returns the CI code repository compliance policy +* `/api/v32.00/policies/compliance/ci/coderepos`- *GET* - returns the CI code repository compliance policy * `/api/v32.00/policies/vulnerability/coderepos` - *PUT* - sets the given access/vulnerability or compliance policy * `/api/v32.00/policies/vulnerability/ci/coderepos` - *PUT* - sets the given access/vulnerability or compliance policy * `/api/v32.00/policies/compliance/coderepos` - *PUT* - sets the given access/vulnerability or compliance policy From 0834fd2ea2734306dcc51a26eb52cb63ad0f2934 Mon Sep 17 00:00:00 2001 From: manukumar6 <108253187+manukumar6@users.noreply.github.com> Date: Tue, 30 Jan 2024 12:36:26 +0530 Subject: [PATCH 08/15] Updated the RN for CWP-53875 --- .../release-notes-32-02.adoc | 45 +++++++++---------- 1 file changed, 22 insertions(+), 23 deletions(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index a5be6d729c..6d74b49d78 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -121,29 +121,28 @@ The Code Repository Scanning feature in Prisma Cloud Compute is no longer availa Also, the following Prisma Cloud Compute (CWPP) code scan endpoints have been sunset (removed): - -* `/api/v32.00/coderepos` - *GET* - returns code repositories scan results -* `/api/v32.00/coderepos/scan` - *POST* - triggers a scan for all code repositories -* `/api/v32.00/coderepos/stop` - *POST* - stops the current active scan -* `/api/v32.00/coderepos/download `- *GET* - downloads code repository scan results -* `/api/v32.00/coderepos/progress` - *GET* - returns the code repositories scan progress -* `/api/v32.00/coderepos/discover` - *GET* - discovers the available repositories for a credential according to the given credential ID -* `/api/v32.00/coderepos-ci` - *POST* - adds a CI code repo scan result -* `/api/v32.00/coderepos-ci` - *GET* - returns CI code repositories scan results -* `/api/v32.00/coderepos-ci/download` - *GET* - downloads CI code repository scan result -* `/api/v32.00/policies/vulnerability/coderepos` - *GET* - returns the code repository vulnerability policy -* `/api/v32.00/policies/vulnerability/coderepos/impacted` - *GET* - returns a list of repositories that the policy rule applies to -* `/api/v32.00/policies/vulnerability/ci/coderepos` - *GET* - returns the CI code repo vulnerabilities policy -* `/api/v32.00/policies/compliance/coderepos` - *GET* - returns the code repository compliance policy -* `/api/v32.00/policies/compliance/coderepos/impacted` - *GET* - returns a list of repositories that the policy rule applies to -* `/api/v32.00/policies/compliance/ci/coderepos`- *GET* - returns the CI code repository compliance policy -* `/api/v32.00/policies/vulnerability/coderepos` - *PUT* - sets the given access/vulnerability or compliance policy -* `/api/v32.00/policies/vulnerability/ci/coderepos` - *PUT* - sets the given access/vulnerability or compliance policy -* `/api/v32.00/policies/compliance/coderepos` - *PUT* - sets the given access/vulnerability or compliance policy -* `/api/v32.00/policies/compliance/ci/coderepos`- *PUT* - sets the given access/vulnerability or compliance policy -* `/api/v32.00/settings/coderepos` - *PUT* - sets the code repository scan settings -* `/api/v32.00/settings/coderepos` - *GET* - returns the code repository scan settings -* `/api/v32.00/coderepos/webhook/{" + id + "}"` - *POST* - handles events from code repositories +* `/api//coderepos` - *GET* +* `/api//coderepos/scan` - *POST* +* `/api//coderepos/stop` - *POST* +* `/api//coderepos/download`- *GET* +* `/api//coderepos/progress` - *GET* +* `/api//coderepos/discover` - *GET* +* `/api//coderepos-ci` - *POST* +* `/api//coderepos-ci` - *GET* +* `/api//coderepos-ci/download` - *GET* +* `/api//policies/vulnerability/coderepos` - *GET* +* `/api//policies/vulnerability/coderepos/impacted` - *GET* +* `/api//policies/vulnerability/ci/coderepos` - *GET* +* `/api//policies/compliance/coderepos` - *GET* +* `/api//policies/compliance/coderepos/impacted` - *GET* +* `/api//policies/compliance/ci/coderepos`- *GET* +* `/api//policies/vulnerability/coderepos` - *PUT* +* `/api//policies/vulnerability/ci/coderepos` - *PUT* +* `/api//policies/compliance/coderepos` - *PUT* +* `/api//policies/compliance/ci/coderepos`- *PUT* +* `/api//settings/coderepos` - *PUT* +* `/api//settings/coderepos` - *GET* +* `/api//coderepos/webhook/{" + id + "}"` - *POST* [#end-support] === End of Support Notifications From 7e67ecc2f16974f9a547dc89c9978b6638f1dbee Mon Sep 17 00:00:00 2001 From: manukumar6 <108253187+manukumar6@users.noreply.github.com> Date: Wed, 31 Jan 2024 02:22:23 +0530 Subject: [PATCH 09/15] Update release-notes-32-02.adoc --- .../release-notes-32-02.adoc | 83 +++++++++++-------- 1 file changed, 50 insertions(+), 33 deletions(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index 6d74b49d78..62e3e6addf 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -106,53 +106,70 @@ A new unified progress indicator shows the status of all scanning and pending r //[#new-features-waas] //=== New Features in WAAS -// [#api-changes] -// === API Changes and New APIs - +[#api-changes] +=== API Changes +[cols="30%a,70%a"] +|=== +//CWP-55309 +| *API to list cloud accounts that are imported from the Prisma Cloud platform* +|You can onboard accounts and cloud credentials only through the Prisma Cloud platform Accounts page now. To support this change, the following new query parameters have been added to the https://pan.dev/prisma-cloud/api/cwpp/get-credentials/[Get All Credentials] endpoint. These parameters allow you to list cloud accounts that are imported from the Prisma Cloud platform: +* `external`: Set to `true` to retrieve credentials imported from the Prisma Cloud platform Accounts page. +* `autoImported`: Set to `true` to retrieve credentials that were automatically imported from the Prisma Cloud platform Accounts page. -[#breaking-api-changes] -=== Breaking Changes in API +//CWP-52775 +|*New request body field in the Download Serverless Layer Bundle endpoint +|The Download Serverless Layer Bundle[https://pan.dev/prisma-cloud/api/cwpp/post-images-twistlock-defender-layer-zip/] endpoint includes a new request body field: `nodeJSModuleType`, which accepts one of these values: +* `commonjs` +* `ecmascript` +The `nodeJSModuleType` field is optional and the default value is `commonjs`. -//CWP-36043 / CWP-53875 -*Deprecated APIs for Code Security Module for Scanning* +|=== -The Code Repository Scanning feature in Prisma Cloud Compute is no longer available as Prisma Cloud (Cloud Application Security) offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. -Also, the following Prisma Cloud Compute (CWPP) code scan endpoints have been sunset (removed): +// [#breaking-api-changes] +// === Breaking Changes in API +// [cols="30%a,70%a"] +// |=== -* `/api//coderepos` - *GET* -* `/api//coderepos/scan` - *POST* -* `/api//coderepos/stop` - *POST* -* `/api//coderepos/download`- *GET* -* `/api//coderepos/progress` - *GET* -* `/api//coderepos/discover` - *GET* -* `/api//coderepos-ci` - *POST* -* `/api//coderepos-ci` - *GET* -* `/api//coderepos-ci/download` - *GET* -* `/api//policies/vulnerability/coderepos` - *GET* -* `/api//policies/vulnerability/coderepos/impacted` - *GET* -* `/api//policies/vulnerability/ci/coderepos` - *GET* -* `/api//policies/compliance/coderepos` - *GET* -* `/api//policies/compliance/coderepos/impacted` - *GET* -* `/api//policies/compliance/ci/coderepos`- *GET* -* `/api//policies/vulnerability/coderepos` - *PUT* -* `/api//policies/vulnerability/ci/coderepos` - *PUT* -* `/api//policies/compliance/coderepos` - *PUT* -* `/api//policies/compliance/ci/coderepos`- *PUT* -* `/api//settings/coderepos` - *PUT* -* `/api//settings/coderepos` - *GET* -* `/api//coderepos/webhook/{" + id + "}"` - *POST* [#end-support] === End of Support Notifications - [cols="30%a,70%a"] |=== //CWP-36043 / CWP-50985 |*Code Security Module for Scanning* -|The Code Repository Scanning feature is deprecated as Prisma Cloud offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. +|The Code Repository Scanning feature is sunset (removed) in Prisma Cloud Compute Edition as the Prisma Cloud Enterprise Edition (Cloud Application Security) offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. + +//CWP-36043 / CWP-53875 +|*Sunset APIs for Code Security Module for Scanning* +|The Code Repository Scanning feature in Prisma Cloud Compute is no longer available as Prisma Cloud Enterprise Edition (Cloud Application Security) offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. + +Also, the following Prisma Cloud Compute code scan endpoints have been sunset (removed): + +* `/api//coderepos` - *GET* +* `/api//coderepos/scan` - *POST* +* `/api//coderepos/stop` - *POST* +* `/api//coderepos/download`- *GET* +* `/api//coderepos/progress` - *GET* +* `/api//coderepos/discover` - *GET* +* `/api//coderepos-ci` - *POST* +* `/api//coderepos-ci` - *GET* +* `/api//coderepos-ci/download` - *GET* +* `/api//policies/vulnerability/coderepos` - *GET* +* `/api//policies/vulnerability/coderepos/impacted` - *GET* +* `/api//policies/vulnerability/ci/coderepos` - *GET* +* `/api//policies/compliance/coderepos` - *GET* +* `/api//policies/compliance/coderepos/impacted` - *GET* +* `/api//policies/compliance/ci/coderepos`- *GET* +* `/api//policies/vulnerability/coderepos` - *PUT* +* `/api//policies/vulnerability/ci/coderepos` - *PUT* +* `/api//policies/compliance/coderepos` - *PUT* +* `/api//policies/compliance/ci/coderepos`- *PUT* +* `/api//settings/coderepos` - *PUT* +* `/api//settings/coderepos` - *GET* +* `/api//coderepos/webhook/{" + id + "}"` - *POST* |=== From 72b7a49abee87faf21d99ef3e7913254134f5c6a Mon Sep 17 00:00:00 2001 From: manukumar6 <108253187+manukumar6@users.noreply.github.com> Date: Wed, 31 Jan 2024 02:29:46 +0530 Subject: [PATCH 10/15] Updated release-notes-32-02.adoc for API RNs --- .../rn/release-information/release-notes-32-02.adoc | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index 62e3e6addf..025e3c5002 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -51,8 +51,8 @@ With `v30.00` as n-1 and `v31.00` as n, you can for example go directly from `v3 You have to upgrade any version of `v22.00` to `v30.00` before upgrading to `v31.00`. For example, you can upgrade from `v22.12.693` to `v30.02.123` and then upgrade to `v32.00.159`. -//[#cve-coverage-update] -//=== CVE Coverage Update +// [#cve-coverage-update] +// === CVE Coverage Update // [#api-changes] // === API Changes and New APIs @@ -60,7 +60,6 @@ For example, you can upgrade from `v22.12.693` to `v30.02.123` and then upgrade [#enhancements] === Enhancements - [cols="40%a,60%a"] |=== @@ -118,10 +117,10 @@ A new unified progress indicator shows the status of all scanning and pending r * `autoImported`: Set to `true` to retrieve credentials that were automatically imported from the Prisma Cloud platform Accounts page. //CWP-52775 -|*New request body field in the Download Serverless Layer Bundle endpoint +|*New request body field in the Download Serverless Layer Bundle endpoint* |The Download Serverless Layer Bundle[https://pan.dev/prisma-cloud/api/cwpp/post-images-twistlock-defender-layer-zip/] endpoint includes a new request body field: `nodeJSModuleType`, which accepts one of these values: -* `commonjs` -* `ecmascript` +* `commonjs` +* `ecmascript` The `nodeJSModuleType` field is optional and the default value is `commonjs`. |=== From 03ffa384782d23808cf4fb782b20411f80d8b590 Mon Sep 17 00:00:00 2001 From: manukumar6 <108253187+manukumar6@users.noreply.github.com> Date: Wed, 31 Jan 2024 02:32:09 +0530 Subject: [PATCH 11/15] Update release-notes-32-02.adoc --- .../32/rn/release-information/release-notes-32-02.adoc | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index 025e3c5002..258444c2ed 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -113,14 +113,18 @@ A new unified progress indicator shows the status of all scanning and pending r //CWP-55309 | *API to list cloud accounts that are imported from the Prisma Cloud platform* |You can onboard accounts and cloud credentials only through the Prisma Cloud platform Accounts page now. To support this change, the following new query parameters have been added to the https://pan.dev/prisma-cloud/api/cwpp/get-credentials/[Get All Credentials] endpoint. These parameters allow you to list cloud accounts that are imported from the Prisma Cloud platform: + * `external`: Set to `true` to retrieve credentials imported from the Prisma Cloud platform Accounts page. * `autoImported`: Set to `true` to retrieve credentials that were automatically imported from the Prisma Cloud platform Accounts page. + //CWP-52775 |*New request body field in the Download Serverless Layer Bundle endpoint* |The Download Serverless Layer Bundle[https://pan.dev/prisma-cloud/api/cwpp/post-images-twistlock-defender-layer-zip/] endpoint includes a new request body field: `nodeJSModuleType`, which accepts one of these values: + * `commonjs` * `ecmascript` + The `nodeJSModuleType` field is optional and the default value is `commonjs`. |=== @@ -142,7 +146,7 @@ The `nodeJSModuleType` field is optional and the default value is `commonjs`. |The Code Repository Scanning feature is sunset (removed) in Prisma Cloud Compute Edition as the Prisma Cloud Enterprise Edition (Cloud Application Security) offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. //CWP-36043 / CWP-53875 -|*Sunset APIs for Code Security Module for Scanning* +|*Code Security Module for Scanning APIs are Sunset* |The Code Repository Scanning feature in Prisma Cloud Compute is no longer available as Prisma Cloud Enterprise Edition (Cloud Application Security) offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. Also, the following Prisma Cloud Compute code scan endpoints have been sunset (removed): From 8fcd21c17006726808ddcaa379367f6d7b22f78d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E2=80=9Crcaballeromx=E2=80=9D?= <“rcaballero@paloaltonetworks.com”> Date: Tue, 30 Jan 2024 13:03:12 -0800 Subject: [PATCH 12/15] Improve registry scanning blurb --- .../32/rn/release-information/release-notes-32-02.adoc | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index 258444c2ed..5d05e87622 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -74,8 +74,13 @@ This change does not affect existing accounts. //CWP-49984 |*Registry Scanning* -|Improved registry scanning by adding the following two new fields to sort the registry scans: registry scan status and registry last scan time. -A new unified progress indicator shows the status of all scanning and pending registries. +|The following new fields are now displayed for registry scans: + +* Scan status—if the scan completed successfully or failed. + +* Last scan time—the time at which defender started scanning the registry. + +A new unified scan progress indicator shows the status (percentage and number) of scanning and pending registries. //CWP-47706 |*Vulnerability Management* From ee26e2792b4a331edd898b77e28f139d2e09b314 Mon Sep 17 00:00:00 2001 From: manukumar6 <108253187+manukumar6@users.noreply.github.com> Date: Wed, 31 Jan 2024 02:35:45 +0530 Subject: [PATCH 13/15] Update release-notes-32-02.adoc --- .../32/rn/release-information/release-notes-32-02.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index 5d05e87622..90382bf6ce 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -125,7 +125,7 @@ A new unified scan progress indicator shows the status (percentage and number) o //CWP-52775 |*New request body field in the Download Serverless Layer Bundle endpoint* -|The Download Serverless Layer Bundle[https://pan.dev/prisma-cloud/api/cwpp/post-images-twistlock-defender-layer-zip/] endpoint includes a new request body field: `nodeJSModuleType`, which accepts one of these values: +|The https://pan.dev/prisma-cloud/api/cwpp/post-images-twistlock-defender-layer-zip/[Download Serverless Layer Bundle] endpoint includes a new request body field: `nodeJSModuleType`, which accepts one of these values: * `commonjs` * `ecmascript` From 112898d031a4ce6f1cee88c00b38b8263a33efbf Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E2=80=9Crcaballeromx=E2=80=9D?= <“rcaballero@paloaltonetworks.com”> Date: Tue, 30 Jan 2024 13:23:18 -0800 Subject: [PATCH 14/15] Improve EoS notification --- .../32/rn/release-information/release-notes-32-02.adoc | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index 90382bf6ce..e47b0f2bd3 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -148,7 +148,9 @@ The `nodeJSModuleType` field is optional and the default value is `commonjs`. //CWP-36043 / CWP-50985 |*Code Security Module for Scanning* -|The Code Repository Scanning feature is sunset (removed) in Prisma Cloud Compute Edition as the Prisma Cloud Enterprise Edition (Cloud Application Security) offers a more comprehensive and advanced Software Composition Analysis (SCA) feature. For information about SCA in Prisma Cloud (Enterprise Edition) see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security] and in Prisma Cloud (Classic Edition) see https://docs.prismacloud.io/en/classic/appsec-admin-guide[Prisma Cloud Application Security Administrator's Guide]. +|The Code Repository Scanning feature is sunset in Prisma Cloud Compute Edition. + +It is replaced by Prisma Cloud Application Security in the Enterprise Edition, which offers more comprehensive and advanced Software Composition Analysis (SCA). For information, see https://docs.prismacloud.io/en/enterprise-edition/content-collections/application-security/application-security[Prisma Cloud Application Security]. //CWP-36043 / CWP-53875 |*Code Security Module for Scanning APIs are Sunset* From 53538b5adc90d2527ae0d9d6868530508e65bf1e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E2=80=9Crcaballeromx=E2=80=9D?= <“rcaballero@paloaltonetworks.com”> Date: Tue, 30 Jan 2024 13:30:16 -0800 Subject: [PATCH 15/15] Remove link placeholder --- .../32/rn/release-information/release-notes-32-02.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc index e47b0f2bd3..c747d83a34 100644 --- a/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc +++ b/docs/en/compute-edition/32/rn/release-information/release-notes-32-02.adoc @@ -25,7 +25,7 @@ Review the https://docs.paloaltonetworks.com/prisma/prisma-cloud/32/prisma-cloud // You can download the release image from the Palo Alto Networks Customer Support Portal, or use a program or script (such as curl, wget) to download the release image directly from our CDN: -LINK +// LINK toc::[]