Prisma Cloud Reference Architecture Compute
Prisma Cloud Reference Architecture Compute
(Compute)
For Hosts, Containers, and Serverless Deployments
paloaltonetworks.com/documentation
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2020-2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
January 9, 2020
Platform Components........................................................................................ 9
Console........................................................................................................................................................ 11
Graphical Interface.......................................................................................................................11
API.................................................................................................................................................... 11
Defender......................................................................................................................................................12
Intelligence Stream................................................................................................................................... 13
The twistcli tool.........................................................................................................................................14
Connectivity Flows................................................................................................................................... 15
Firewalls.......................................................................................................................................... 15
Istio...................................................................................................................................................15
Load Balancers.............................................................................................................................. 16
High Availability.........................................................................................................................................17
Operational Concerns...................................................................................... 19
System Requirements.............................................................................................................................. 21
Monitoring...................................................................................................................................................22
Backup..........................................................................................................................................................23
Encryption................................................................................................................................................... 24
Container Secrets..............................................................................................55
Secrets Injection........................................................................................................................................ 57
Security Data..................................................................................................... 59
Event Driven Messaging......................................................................................................................... 61
Kubernetes Audits.................................................................................................................................... 62
Log Files...................................................................................................................................................... 63
API Calls...................................................................................................................................................... 64
iv TABLE OF CONTENTS
Objectives
This document provides guidance to Enterprise and Security Architects on how to deploy
Prisma Cloud and integrate with systems commonly found in the enterprise stack and across
the elements of their cloud workloads.
5
6 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Objectives
© 2020 Palo Alto Networks, Inc.
Solution Overview
Prisma Cloud protects your cloud native assets anywhere they operate---whether you’re running
containers, serverless functions, non-container hosts, or any combination of them. Advanced threat
intelligence and machine learning enable protection of your entire cloud native stack, whether it runs in the
public cloud, private cloud, or air-gapped environment.
Prisma Cloud provides an agentless architecture that requires no changes to your host, container engine,
or applications. Prisma Cloud is deployed as a set of containers, as a service on your hosts, or as a runtime
component of your serverless function. For environments that do not support deployment of Prisma Cloud
as a privileged peer, we offer runtime application self protection (RASP) capabilities.
Upon deployment, Prisma Cloud immediately begins working to secure your container and cloud
environment. Prisma Cloud supports discovery of assets within your cloud environment, allowing you to
easily identify assets which are not protected and add them.
Prisma Cloud is easily integrated into your container build process with support for continuous integration
(CI) systems and registry/serverless repository scanning capabilities.
Prisma Cloud offers on premise and Software as a Services (SaaS) options for deployment.
> Console
> Defender
> Intelligence Stream
> The twistcli tool
> Connectivity Flows
> High Availability
9
10 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Platform Components
© 2020 Palo Alto Networks, Inc.
Console
Prisma Cloud Compute Console serves as the user interface within Prisma Cloud. The graphical user
interface (GUI) lets you define policy, configure and control your Prisma Cloud deployment, and view the
overall health (from a security perspective) of your container environment. Console also provides an API
for customers that want to control Prisma Cloud programmatically to build out their own integrations or
custom tooling. The API is thoroughly documented. Endpoints are provided for all features, functions, and
controls offered in the GUI.
Prisma Cloud Compute Console is offered as an on premise deployment or as a Softeware as a Services
(SaaS). Security capabilities are identical across the two options, however customers may opt for one
deployment model or another based on their individual architecture needs.
For an on premise deployment, regardless of how Console is installed and where it operates, Console
requires access to persistent storage. Console can be deployed using either your orchestrator’s native HA
capabilities or Prisma Cloud’s built-in high availability (HA) capabilities.
When installing Prisma Cloud Compute, install Console first, then install Defender. Defender is the
component of Prisma Cloud that runs on each host, more detail is provided below. Defender can be
installed from the deployment tabs in Console’s graphical user interface. Defender, as the initiator of the
connection, requires network connectivity to the Console.
Prisma Cloud provides automation in the product that generates the required artifacts for common
orchestration platforms such as Kubernetes, Openshift and Swarm. Prisma Cloud can also generate Helm
charts to ease deployment for organizations who have adopted Helm as their packaging standard.
Graphical Interface
In an on premise installation Console’s graphical user interface can be accessed using a web browser on
ports 8081 (HTTP) or 8083 (HTTPS). We recommend that you access Console over HTTPS so that sensitive
information, such as admin passwords, is encrypted while in transit. By default, self-signed certificates are
used to secure access to Console but you can configure your own certificate to prove your server’s identity
to browser clients. For more information on this topic, see our support article here.
When using Prisma Cloud Compute, the graphical interface is accessable directly from the left hand
navigation within your Prisma Cloud tenant by selecting the Compute tab.
API
The Prisma Cloud API is REST-based and can be accessed over HTTP or HTTPS on ports 8081 and 8083
respectively. For more information about the Prisma Cloud API, see the support article here.
No customer data ever leaves your network or environment. Prisma Cloud does not gather
data from our customers unless you choose to opt in and contribute.
If you operate in an air-gapped environment, data in the Intelligence Stream can be downloaded and
transferred to Console using the *twistcli *tool we ship with the product using whatever operational
processes you wish to put in place.
Firewalls
Customers typically place Console in a management security zone or other segregated part of their
network. Some customers might also want to place a firewall between Console and Defender. Prisma Cloud
can interoperate with firewalls wherever necessary, provided the required TCP ports are open.
When using Prisma Cloud Compute Saas Console customers will need to provide connectivity from their
deployed Defenders to the SaaS Console through the firewalls.
Istio
When Defender DaemonSets are deployed with Istio monitoring enabled, Prisma Cloud can discover the
service mesh and show you the RBAC capabilities for each service (e.g. this pod can read service X using
REST/grpc on the following endpoints). Services integrated with Istio display the Istio logo.
19
20 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Operational Concerns
© 2020 Palo Alto Networks, Inc.
System Requirements
Before deploying Prisma Cloud Console, Defenders, and registry scanners, be sure that your hosts meet the
minimum requirements detailed here.
25
26 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Supported Schedulers and Deployment
Patterns
© 2020 Palo Alto Networks, Inc.
Prisma Cloud Container Images
You can either download and manage all Prisma Cloud container images by yourself or you can access them
from our hosted registry.
When you download our software from the Palo Alto Networks Customer Support Portal (CSP), you get a
tarball that can be used to install Prisma Cloud. You can also pull the images from the Prisma Cloud Registry,
for more information see here.
You can push the Prisma Cloud images to your own private registry, and manage them as you see fit. The
Console image is delivered as a .tar.gz file in the release tarball. After Console is installed, the Defender
image is accessible from the dashboard under Manage \> Defenders \> Deploy, where deployment scripts
retrieve the Defender image from Console using the /api/v1/images/twistlock\_defender.tar.gz API
endpoint.
You can also retrieve Prisma Cloud images from our hosted registry, which is available to all current
customers with a valid access token. This option simplifies a lot of workflows, especially the initial install
flow.
PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Supported Schedulers and Deployment Patterns 27
© 2020 Palo Alto Networks, Inc.
Prisma Cloud on Kubernetes
Prisma Cloud supports deploying Console and Defenders into Kubernetes clusters.
The Prisma Cloud Console is installed as a replication controller with persistent storage, allowing the
Console to be resilient to node failures.
Defenders are deployed to Kubernetes nodes using DaemonSets. DaemonSets make Defender deployment
simple and automatic, regardless of how large your cluster or how frequently you add nodes to it. With
DaemonSets, rather than manually installing Prisma Cloud Defenders on each node, Prisma Cloud generates
a configuration file that you load into your Kubernetes Master. Kubernetes uses the configuration to ensure
that every node in the cluster runs a Defender. As new nodes are added, Defenders are automatically
installed on them. Deploying Defenders with DaemonSets guarantees that every node in your environment
is protected, without having to manually intervene when node membership changes.
The diagram below illustrates a basic Prisma Cloud deployment on Kubernetes:
PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Supported Schedulers and Deployment Patterns 29
© 2020 Palo Alto Networks, Inc.
Notes on Installing Defender as a DaemonSet:
When installing the Prisma Cloud Defender as a DaemonSet, we recommend you use the twistcli to
generate a daemonset.yaml as described on the Support Site here.
Google GKE
You can install Prisma Cloud Console as a ReplicationController and Defenders as a DaemonSet in GKE.
More details on this configuration can be found in our Support Site here.
Amazon EKS
You can install Prisma Cloud Console as a ReplicationController and Defenders as a DaemonSet in EKS.
More details on this configuration can be found in our Support Site here.
IBM IKS
You can install Prisma Cloud Console as a ReplicationController and Defenders as a DaemonSet in IKS.
More details on this configuration can be found in our Support Site here.
PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Supported Schedulers and Deployment Patterns 31
© 2020 Palo Alto Networks, Inc.
Prisma Cloud on OpenShift
Prisma Cloud supports deploying Console and Defenders into an OpenShift cluster.
OpenShift makes Defender deployment simple and automatic, regardless of how large your cluster is or
how frequently you add nodes to it. With DaemonSet pods, rather than installing Prisma Cloud Defenders
on each node individually, Prisma Cloud generates a configuration file that you load into your OpenShift
master. OpenShift uses this configuration to ensures that every node in the cluster runs a Defender. As
new nodes are added, Defenders are installed on them as well. Deploying Defenders with DaemonSets
guarantees that every node in your environment is protected, without having to manually intervene when
membership changes.
The diagram below illustrates a basic Prisma Cloud deployment on OpenShift:
PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Supported Schedulers and Deployment Patterns 33
© 2020 Palo Alto Networks, Inc.
Prisma Cloud on Docker Swarm
Prisma Cloud supports installation on Docker Swarm using Swarm-native features. You deploy Console as
a service with the number of replicas limited to 1 and rely on Swarm to provide built-in high availability.
You also deploy Defender as a global service. The global service guarantees that Defender is automatically
deployed to each worker node in the cluster.
The diagram below illustrates a basic Prisma Cloud deployment on Docker Swarm:
PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Supported Schedulers and Deployment Patterns 35
© 2020 Palo Alto Networks, Inc.
Automating Prisma Cloud Installs for Other
Environments
To enable deployment across environments we host our Prisma Cloud images in a repository designed for
reliability and availability. This repository is accessible using your Access Token supplied as part of your
license. More information on accessing our hosted registry is available here.
Details on deployment will vary according to the environment but the high level steps are much like the
other deployments above.
The Console image can be pulled from Prisma Cloud. It can be started on your platform with persistent
storage, appropriate [network connectivity](#_orv6kpdgllhm) and configured using the Web UI.
The Console is also available as a SaaS deployment as part of your Prisma Cloud subscription.
Defender deployments will vary but as the Defender is usually pulled from the Console it’s as simple as
calling the API. Detailed instructions can be found here.
> Visibility
37
38 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Cloud Discovery and Service Account
Monitoring
© 2020 Palo Alto Networks, Inc.
Visibility
As cloud platforms continue to add new services, it’s becoming more difficult and impractical to ensure the
apps running on them are protected. Consider that you might be using multiple cloud platforms, and that
you have many separate accounts per platform, such as different accounts per business unit or geography.
You could easily have hundreds of combinations of providers, accounts, and regions where cloud native
services are deployed.
Cloud Platform Compliance helps you centrally discover all the cloud-native services used in AWS, Azure,
and Google Cloud, across all regions and accounts. Cloud Provider Compliance continuously monitors these
accounts, detects when new services are added, and reports which services are unprotected. It can help you
mitigate risks introduced by rogue deployments, abandoned environments, and environments not protected
by Prisma Cloud.
Kubernetes has a rich RBAC model based around the notion of service and cluster roles. This model is
fundamental to the secure operation of the entire cluster because these roles control access to resources
and services within namespaces and across the cluster. While these service accounts can be manually
inspected with kubectl, this manual approach can be difficult to visualize and understand service account
scope at scale.
Prisma Cloud Radar provides a discovery and monitoring tool for service accounts. Every service account
associated with a resource in a cluster can easily be inspected. For each account, Prisma Cloud shows
detailed metadata describing the resources it has access to and the level of access it has to each of them.
This visualization makes it easy for security staff to understand role configuration, assess the level of access
provided to each service account, and mitigate risks associated
PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Cloud Discovery and Service Account Monitoring 39
© 2020 Palo Alto Networks, Inc.
40 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Cloud Discovery and Service Account
Monitoring
Multitenancy and Scale
Prisma Cloud supports multitenancy and unlimited scale. We accomplish this with our Projects
capabilities.
> Projects
41
42 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Multitenancy and Scale
© 2020 Palo Alto Networks, Inc.
Projects
Prisma Cloud support two types of Projects: Tenant projects and Scale projects. For more information refer
to the guide below or access our documentation on the feature here.
Multi-tenancy is a feature of on on premise Console deployment. If you are using a SaaS Console, you may
have multiple tenants provisioned through your SaaS subscription.
Configuration of Projects
Detailed setup instructions can be found here. In essence, you deploy the Console you want to become
the Central Console and connect that to another Console via the User Interface. Prisma Cloud will then
configure it appropriately.
By default, the master and its supervisor Consoles communicate over port 8083. You can configure a
different port by setting MANAGEMENT\_PORT\_HTTPS in twistlock.cfg at install time. All Consoles must
use the same value for MANAGEMENT\_PORT\_HTTPS.
45
46 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Role Based Access Control (RBAC)
© 2020 Palo Alto Networks, Inc.
Access Prisma Cloud
The Prisma Cloud Console can be accessed via the graphical user interface and the application programming
interface (API).
The Prisma Cloud Console supports the following authentication methods:
• Username / Password
• Lightweight Directory Access Protocol (LDAP)
• Security Assertion Markup Language v2.0 (SAML2.0)
• X.509 smart cards
Prisma Cloud can apply password complexity rules for user accounts created within Prisma Cloud. For the
authentication of external identities, Prisma Cloud supports LDAP and SAML 2.0. LDAP authentication
supports the OpenLDAP and Active Directory directories. Prisma Cloud Console can be configured as
an SAML 2.0 Service Provider. The SAML 2.0 Identity Providers that have been successfully federated
with the Prisma Cloud Console are Okta, G Suite, Ping, Shibboleth and Azure Active Directory. Smart
card authentication to the Prisma Cloud Console requires configuring Prisma Cloud with the smart card’s
chain of trust and matching the smart card’s SubjectAlternativeName’s PrincipalName value to user’s
corresponding Prisma Cloud username.
Prisma Cloud supports group based authorization and defines the following roles:
Defender Manager Read-only access to all rules and data. Can install /
uninstall Prisma Cloud Defenders Used for
Automating Defender installs via Bearer Token or
Basic Auth
Group membership can be assigned within the Prisma Cloud Console, as an SAML 2.0 role claim, or LDAP
group membership value.
PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Role Based Access Control (RBAC) 47
© 2020 Palo Alto Networks, Inc.
48 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Role Based Access Control (RBAC)
Integration with the CI Pipeline
Engineering teams can integrate Prisma Cloud vulnerability and compliance scanning
capabilities into their development process. Prisma Cloud provides a native Jenkins plugin, as
well as a stand-alone command-line tool called twistcli, for integration with your continuous
integration (CI) pipeline.
49
50 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Integration with the CI Pipeline
© 2020 Palo Alto Networks, Inc.
Build-time Inspection
Prisma Cloud CI integration enables automatic scans of your custom Docker images at build time. Scans can
detect vulnerabilities and compliance issues before your images are pushed to the registry and deployed
into production. Thresholds can be specified to fail builds of images that have issues that exceed a specified
severity.
The results of the scans via Jenkins or twistcli are available in the Console.
55
56 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Container Secrets
© 2020 Palo Alto Networks, Inc.
Secrets Injection
Prisma Cloud can be configured to retrieve secrets from your secrets store and inject them into the
containers that need them. Prisma Cloud supports a variety of secrets stores:
• AWS Systems Parameter Store
• AWS Secrets Manager
• Azure Key Vault
• CyberArk Enterprise Password Vault
• Hashicorp Vault
Prisma Cloud securely retrieves secrets from your designated secrets store and can inject them as either
environment variables or files into the containers you designate. Prisma Cloud provides a granular rule-
driven system for defining how and where secrets are injected. To protect your secrets, configure your rules
restrictively, using the principle of least-privilege access. For more information about configuring Prisma
Cloud to perform secrets injection, see this support article.
59
60 PRISMA CLOUD REFERENCE ARCHITECTURE (COMPUTE) | Security Data
© 2020 Palo Alto Networks, Inc.
Event Driven Messaging
Prisma Cloud provides comprehensive event driven alerting capabilities that allow customers to integrate
Prisma Cloud with assets they may already have investments in. Prisma Cloud has integrations with the
following:
• Generic Webhook Provider
• Email
• Jira
• Slack
• PagerDuty
• Google Cloud Security Command Center
• AWS Security Hub
• IBM Security Advisor
For more information see our push alerts documentation.