Compute Console exposes additional views for Active Directory and SAML integration when its run in self-hosted mode. You then use the Prisma Cloud administrative console or the APIs to interact with this data to configure policies, to investigate and resolve alerts, to set up external integrations, and to forward alert notifications. As enterprises adopt multicloud environments, non-integrated tools create friction and slow everyone down. Prisma Cloud offers a rich set of cloud workload protection capabilities. Use pre-built and customizable policies to detect data such as PII in publicly exposed objects. Palo Alto Networks's Prisma Cloud team is looking for a seasoned and accomplished Group Architect with experience in Cloud Native technologies and Enterprise Security products. Stay informed on the new features to help isolate cloud native applications and stop lateral movement of threats across your network. Configure single sign-on in Prisma Cloud. Forward alerts to AWS SQS, Splunk and Webhooks to notify other teams for investigation and remediation. The following diagram represents the infrastructure within a region. Because they run as part of the kernel, these components are very powerful and privileged. Prisma Cloud Compute Edition is a self-hosted offering that's deployed and managed by you. Use this guide to derive quick time to value with the Compute tab capabilities available with the Prisma Cloud Enterprise Edition license. Prisma Cloud Administrators Guide (Compute), Security Assurance Policy on Prisma Cloud Compute, Prisma Cloud Enterprise Edition vs Compute Edition, Alibaba Cloud Container Service for Kubernetes (ACK), Automatically Install Container Defender in a Cluster, Default setting for App-Embedded Defender file system protection, VMware Tanzu Application Service (TAS) Defender, Deploy Prisma Cloud Defender from the GCP Marketplace, Support lifecycle for connected components, Onboard AWS Accounts for Agentless Scanning, Onboard Azure Accounts for Agentless Scanning, Onboard GCP Accounts for Agentless Scanning, Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning, Set different paths for Defender and Console (with DaemonSets), Authenticate to Console with certificates, Use Cloud Service Provider Accounts in Prisma Cloud, Scan images in Alibaba Cloud Container Registry, Scan images in Amazon EC2 Container Registry (ECR), Scan images in Azure Container Registry (ACR), Scan images in Docker Registry v2 (including Docker Hub), Scan images in Google Container Registry (GCR), Scan images in IBM Cloud Container Registry, Scan images in JFrog Artifactory Docker Registry, Scan images in OpenShift integrated Docker registry, Role-based access control for Docker Engine, Deploy WAAS for Containers Protected By App-Embedded Defender, ServiceNow alerts for Security Incident Response, ServiceNow alerts for Vulnerability Response, Best practices for DNS and certificate management. Leverage intel on more than 500 billion flow logs ingested weekly to pinpoint unusual network activities such as port scans and port sweeps and DNS-based threats such as domain generation algorithms (DGA) and cryptomining. The format of the URL is: The following screenshot shows the Compute tab on Prisma Cloud. Refer to the Compute API documentation for your automation needs. The project also features a specific standardization activity to disseminate the tools specifications into standards to support further adoption. Simplify compliance reporting. To access the Compute tab, you must log in to the Prisma Cloud administrative console; it cannot be directly addressed in the browser. Anomaly-based policies that leverage machine learning to monitor and report on suspicious or unusual activities complement traditional policy libraries for a comprehensive threat detection strategy. When a blocking rule is created, Defender moves the original runC binary to a new path and inserts a Prisma Cloud runC shim binary in its place. Prisma Cloud Enterprise Edition is a SaaS offering. Customers often ask how Prisma Cloud Defender really works under the covers. Its disabled in Enterprise Edition. In PRISMACLOUD we will harvest the consortium members cryptographic and software development knowledge to build the tool box and the services. The following screenshot shows the Prisma Cloud UI, or the so-called outer management interface. Because we also have detailed knowledge of the operations of each container, we can correlate the kernel data with the container data to get a comprehensive view of process, file system, network, and system call activity from the kernel and all the containers running on it. Leverage industry-leading ML capabilities with more than 5 billion audit logs ingested weekly. Security and DevOps teams can effectively collaborate to accelerate secure cloud native application development and deployment using a single dashboard. Defender design Oct 2022 - Present6 months. Prisma Cloud integrates with your developer tools and environments to identify cloud misconfigurations, vulnerabilities and security risks during the code and build stage. Refer to the API documentation to learn how to securely access and use the Prisma Cloud REST APIs to set up and monitor your cloud accounts. Cloud-Native Application Protection Platform (CNAPP), Cloud Infrastructure Entitlement Management (CIEM). By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Its important to make the distinction between the inner and outer interfaces because a number of of Compute components directly address the inner interface, namely: Defender, for Defender to Compute Console connectivity. Workload Protection for ARM based Cloud Instance in Prisma Cloud Copyright 2023 Palo Alto Networks. We would like to follow a microservices-based architecture where business logic is delegated to these services which can function on their own-- the share-nothing philosophy. Prisma Cloud is a comprehensive cloud-native security platform (CNSP) that provides security and compliance coverage for infrastructure, applications, data, and all cloud-native technology stacks throughout the development lifecycle. It is acomprehensive suite of security services to effectively predict, prevent, detect, and automatically respond to security and compliance risks without creating friction for users, developers, and security and network administrators. 2023 Palo Alto Networks, Inc. All rights reserved. In Compute Edition, Palo Alto Networks gives you the management interface to run in your environment. Prisma Cloud secures applications from code to cloud, enabling security and DevOps teams to effectively collaborate to accelerate secure cloud-native application development and deployment. Hosted by you in your environment. If you are looking to deploy Prisma Cloud Defenders to secure your host, container, and serverless functions, read thePrisma Cloud Administrator's Guide (Compute). To protect data in transit, the infrastructure terminates the TLS connection at the Elastic Load Balancer (ELB) and secures traffic between components within the data center using an internal certificate until it is terminated at the application node. Complete visibility and protection across any cloud, Improved efficiency and collaboration with automation, Integrated data security and entitlement controls. A tool can therefore be regarded as an abstract concept which could be realized as a piece of software, e.g., a library, which is composed of various primitives which can be parametrized in various different ways. image::prisma_cloud_arch2.png[width=800], You can find the address of Compute Console in Prisma Cloud under, https://
.cloud.twistlock.com/. "Prisma Cloud is quite simple to use. Each layer provides a dedicated project outcome with a specific exploitation path. "MKNOD", "SETFCAP" Protect web applications and APIs across cloud-native architectures. "CapAdd": [ Access Prisma Cloud Add your Cloud Accounts Add Prisma Cloud Administrators Prisma Cloud Licenses Enable and Monitor Alerts Manage Policy Investigate Incidents Integrate Prisma Cloud with Your Tools Prisma Cloud Administrator's Guide (Compute) Prisma Cloud-Cloud Native Security Platform Prisma Cloud checks container registries and continuous delivery (CD) workflows to block vulnerabilities, malware and prevent insecure deployments. Prisma Cloud leverages Dockers ability to grant advanced kernel capabilities to enable Defender to protect your whole stack, while being completely containerized and utilizing a least privilege security design. With Prisma Cloud, you can finally support DevOps agility without compromising on security. Build custom policies once that span across multicloud environments. Access is denied to users with any other role. (Choose two.) SaaS Security is an integrated CASB (Cloud Access Security Broker) solution that helps Security teams like yours meet the challenges of protecting the growing availability of sanctioned and unsanctioned SaaS applications and maintaining compliance consistently in the cloud while stopping threats to sensitive information, users, and resources. SaaS Security options include SaaS Security API (formerly Prisma SaaS) and the SaaS Security Inline add-on. Configure single sign-on in Prisma Cloud Compute Edition. VM-Series is the virtualized form factor of the Palo Alto Networks next-generation firewall. Rather than having to install a kernel module, or modify the host OS at all, Defender instead runs as a Docker container and takes only those specific system privileges required for it to perform its job. The Prisma Cloud architecture uses Cloudflare for DNS resolution of web requests and for protection against distributed denial-of-service (DDoS) attacks. Access the Compute Console, which contains the CWPP module, from the Compute tab in the Prisma Cloud UI. Learn how Prisma Cloud ingests and processes data from your cloud environment to help you identify and mitigate security risks. Avoid friction between security and development teams with code-to-cloud protection. Use powerful dashboards that highlight alerts and compromises within our console, helping you easily understand suspicious network communication and user activity. Prisma Cloud is excited to announce support for workload protection for workloads running on ARM64-based architecture instances across build, deploy and run. This site provides documentation for the full-suite of capabilities that include: Comprehensive cloud security across the worlds largest clouds. Protect against the OWASP Top 10 and secure your microservices-based web applications and APIs in cloud and on-premises environments. These layers of abstraction help to specify and analyze security properties on different levels; they also define connection points between the different disciplines involved in the creation of secure and privacy preserving cloud services: cryptographers, software engineers/developers and cloud service architects. Our team is trying to architect a graphql API using prisma cloud as our database, but we are a bit stuck on how best to architect it. To access the Compute tab, you must log in to the Prisma Cloud administrative console; it cannot be directly addressed in the browser. Integrate with SOAR tools including Cortex XSOAR for multi-step remediation playbooks. Projects are enabled in Compute Edition only. Accessing Compute in Prisma Cloud Enterprise Edition. In Compute Edition, Palo Alto Networks gives you the management interface to run in your environment. The following table summarizes the differences between the two offerings: Deployed and managed by you in your environment (self-hosted). Further, kernel modules can introduce significant stability risks to a system. It does not run as --privileged and instead takes the specific system capabilities of net_admin, sys_admin, sys_ptrace, mknod, and setfcap that it needs to run in the host namespace and interact with both it and other containers running on the system. Cannot retrieve contributors at this time. 2023 Palo Alto Networks, Inc. All rights reserved. Prisma Cloud provides an agentless architecture that requires no changes to your host, container engine, or applications. Ensure your applications meet your risk and compliance expectations. Theres no outer or inner interface; theres just a single interface, and its Compute Console. A tag already exists with the provided branch name. Console communication channels are separated, with no ability to jump channels. In this setup, you deploy Compute Console directly. By combining the power of Palo Alto Networks Enterprise Data Loss Prevention (DLP) and WildFire malware prevention service, only Prisma Cloud Data Security offers a comprehensive, integrated cloud native solution. It can only be opened from within the Prisma Cloud UI. You signed in with another tab or window. Accessing Compute in Prisma Cloud Enterprise Edition, Accessing Compute in Prisma Cloud Compute Edition. Supported by a feature called Projects. Projects is enabled in Compute Edition only. Easily investigate and auto-remediate compliance violations. Go beyond visibility and alert prioritization and stop attacks and defend against zero-day vulnerabilities. Defender enforces WAF policies (WAAS) and monitors layer 4 traffic (CNNS). Prisma Cloud is the industry's most complete Cloud Native Application Protection Platform (CNAPP), with the industry's broadest security and compliance coveragefor infrastructure, workloads, and applications, across the entire cloud native technology stackthroughout the development lifecycle and across hybrid and multicloud environments. Multicloud Data Visibility and Classification: With comprehensive visibility into the security and privacy posture of the data stored in AWS S3 and Azure Storage Blob, users immediately gain insight into any exposed or publicly accessible storage resources. The ORM that plays well with your favorite framework Easy to integrate into your framework of choice, Prisma simplifies database access, saves repetitive CRUD boilerplate and increases type safety. Palo Alto Prisma Cloud is a comprehensive platform which simplifies security across the cloud native network. Access the consolidated Admin Guide and Release Notes PDF, Use the Postman collection for API examples to help you learn about how our APIs work, Access the consolidated Release Notes for 5.0, 5.1, and 5.2. The guidelines enable you to plan for the work ahead, configure and deploy Prisma Cloud Defenders, and measure your progress. This ensures that data in transit is encrypted using SSL. Prisma Cloud Platform Cloud Code Security Cloud Security Posture Management Cloud Workload Protection Cloud Network Security Cloud Identity Security Web Application & API Security Endpoint Security Cortex XDR Security Operations Cortex XDR Cortex XSOAR Cortex Xpanse Cortex XSIAM Solutions Solutions Network Security Data Center The web GUI is powerful. Use this guide to deploy enforcers and secure your traffic and hosts with identity-based microsegmentation. It provides powerful abstractions and building blocks to develop flexible and scalable backends. To ensure the security of your data and high availability of Prisma Cloud, Palo Alto Networks makes Security a priority at every step. It includes the Cloud Workload Protection Platform (CWPP) module only. . For more information, see, Prisma Cloud Administrators Guide (Compute), Security Assurance Policy on Prisma Cloud Compute, Prisma Cloud Enterprise Edition vs Compute Edition, Alibaba Cloud Container Service for Kubernetes (ACK), Automatically Install Container Defender in a Cluster, Default setting for App-Embedded Defender file system protection, VMware Tanzu Application Service (TAS) Defender, Deploy Prisma Cloud Defender from the GCP Marketplace, Support lifecycle for connected components, Onboard AWS Accounts for Agentless Scanning, Onboard Azure Accounts for Agentless Scanning, Onboard GCP Accounts for Agentless Scanning, Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning, Set different paths for Defender and Console (with DaemonSets), Authenticate to Console with certificates, Use Cloud Service Provider Accounts in Prisma Cloud, Scan images in Alibaba Cloud Container Registry, Scan images in Amazon EC2 Container Registry (ECR), Scan images in Azure Container Registry (ACR), Scan images in Docker Registry v2 (including Docker Hub), Scan images in Google Container Registry (GCR), Scan images in IBM Cloud Container Registry, Scan images in JFrog Artifactory Docker Registry, Scan images in OpenShift integrated Docker registry, Role-based access control for Docker Engine, Deploy WAAS for Containers Protected By App-Embedded Defender, ServiceNow alerts for Security Incident Response, ServiceNow alerts for Vulnerability Response, Best practices for DNS and certificate management. Product architecture. In Prisma Cloud, click the Compute tab to access Compute. Theres no outer or inner interface; theres just a single interface, and its Compute Console. Learn how to use the Compute tab on the Prisma Cloud administrative console to deploy Prisma Cloud Defenders and secure your hosts, containers, and serverless functions. What we termed the PRISMACLOUD architecture can be seen as a recipe to bring cryptographic primitives and protocols into cloud services that empower cloud users to build more secure and more privacy-preserving applications. Take control of permissions across multicloud environments. Prisma SD-WAN CloudBlades. Again, because of their wide access, a poorly performing kernel module thats frequently called can drag down performance of the entire host, consume excessive resources, and lead to kernel panics. Enforce least-privileged access across clouds. Our setup is hybrid. Prisma Cloud uses which two runtime rules? It's actually available for the five top cloud providers: AWS, GCP, Azure, Oracle, and Alibaba Cloud. The following Compute components directly connect to the Compute conole address provided above: Defender, for Defender to Compute Console connectivity. Building the tools requires in-depth cryptographic and software development knowledge. In fact, we are using a multi-account strategy with our AWS organization. In particular, they represent a way to deliver the tools to service developers and cloud architects in an accessible and scalable way. Prisma Cloud Enterprise Edition is a SaaS offering. Prisma Cloud is deployed as a set of containers, as a service on your hosts, or as a runtime. Compute Consoles GUI cannot be directly addressed in the browser. Get Prisma Cloud From the AWS Marketplace, Get Prisma Cloud From the GCP Marketplace, Enable Access to the Prisma Cloud Console, Connect Your Cloud Platform to Prisma Cloud, Ingest Audit Logs Using Amazon EventBridge, Set Up the Prisma Cloud Role for AWSManual, Add an Azure Subscription on Prisma Cloud, Add an Azure Active Directory Tenant on Prisma Cloud, Add an Azure Active Directory Tenant With Management Groups, Add an Azure Government Tenant on Prisma Cloud, Add an Azure China Tenant on Prisma Cloud, Register an App on Azure Active Directory, Microsoft Azure APIs Ingested by Prisma Cloud, Onboard Your Google Cloud Platform (GCP) Account, Permissions and APIs Required for GCP Account on Prisma Cloud, Add Your GCP Organization to Prisma Cloud, Create a Service Account With a Custom Role for GCP, Onboard Your Oracle Cloud Infrastructure Account, Permissions Required for OCI Tenant on Prisma Cloud, Add an Alibaba Cloud Account on Prisma Cloud, Cloud Service Provider Regions on Prisma Cloud, Create and Manage Account Groups on Prisma Cloud, Set up Just-in-Time Provisioning on Google, Set up Just-in-Time Provisioning on OneLogin, Define Prisma Cloud Enterprise and Anomaly Settings, Configure Prisma Cloud to Automatically Remediate Alerts, Send Prisma Cloud Alert Notifications to Third-Party Tools, Suppress Alerts for Prisma Cloud Anomaly Policies, Assets, Policies, and Compliance on Prisma Cloud, Investigate Config Incidents on Prisma Cloud, Investigate Audit Incidents on Prisma Cloud, Use Prisma Cloud to Investigate Network Incidents, Configure External Integrations on Prisma Cloud, Integrate Prisma Cloud with Amazon GuardDuty, Integrate Prisma Cloud with AWS Inspector, Integrate Prisma Cloud with AWS Security Hub, Integrate Prisma Cloud with Azure Sentinel, Integrate Prisma Cloud with Azure Service Bus Queue, Integrate Prisma Cloud with Google Cloud Security Command Center (SCC), Integrate Prisma Cloud with Microsoft Teams, Prisma Cloud IntegrationsSupported Capabilities. In the event of a communications failure with Console, Defender continues running and enforcing the active policy that was last pushed by the management point. Access is denied to users with any other role. Gain network visibility, detect network anomalies and enforce segmentation. Find the answers on how to configure Prisma Cloud for securing your public cloud infrastructure. Compute Consoles address, whether an IP address or DNS name, is used for all interactions, namely: Defender to Compute Console connectivity. "The first aspect that is important is the fact that Prisma Cloud is cloud-agnostic. Its disabled in Enterprise Edition. Secure your spot at this immersive half-day workshop, where we'll walk you through: This UTD will help you Continuously monitor cloud storage for security threats, govern file access and mitigate malware attacks. Customers can now secure ARM64 architecture-based workloads across build, deploy and run. Prisma Cloud is designed to catch vulnerabilities at the config level and capture everything on a cloud workload, so we mainly use it to identify any posture management issues that we are having in our cloud workloads. Download the Prisma Cloud Compute Edition software from the Palo Alto Networks Customer Support Portal. Prisma SD-WAN is the industry's first next-generation SD-WAN solution that enables the cloud-delivered branch. Prisma Cloud enables architecture validation by establishing policy guardrails to detect and auto-remediate, risks across resource configurations, network architecture, and user activities. all the exciting new features and known issues. Compute Console is delivered as a container image, so you can run it on any host with a container runtime (e.g. Prisma Cloud Data Security is purpose-built to address the challenges of discovering and protecting data at the scale and velocity common in public cloud environments. Connect your Cloud Environment on Prisma Cloud, Manage Host, Container, and Serverless Deployments, Audit Log Export to External Integrations, Support for AWS Tags and Azure permissions for IAM Security, Centralized Product Resources in Knowledge Center, Ingest Audit Logs using Amazon EventBridge, AWS DNS Logs from Amazon Kinesis Data Firehose, Prisma Cloud Recommended Policies pack in default alert rule (Only for new deployments). Theres no outer or inner interface; theres just a single interface, and its Compute Console. To access the Compute Console UI, users must have the Prisma Cloud (outer management interface) System Admin role. username and password, access key, and so on), none of which Defender holds. Figure 1). If Defender replies affirmatively, the shim calls the original runC binary to create the container, and then exits. Compute Console exposes additional views for Active Directory and SAML integration when its run in self-hosted mode. Palo Alto Networks Introduces Prisma Cloud Supply Chain Security Threat modeling visualization, code repository scanning, and pipeline configuration analysis help prioritize vulnerabilities.. Prisma Cloud prevents threats across your public cloud infrastructure, APIs, and data at runtime while also protecting your applications across VMs, containers and Kubernetes, and serverless architectures. 2023 Palo Alto Networks, Inc. All rights reserved. A single unchecked buffer or other error in such a low level component can lead to the complete compromise of an otherwise well designed and hardened system. Prisma Cloud Enterprise EditionHosted by Palo Alto Networks. You must have the Prisma Cloud System Admin role. Customers often ask how Prisma Cloud Defender really works under the covers. These cloud services are then exposed to application developers who can combine them with other technologies and services into the real end-user applications. Together the tools constitute the PRISMACLOUD toolbox. Gaining deep visibility into data objects stored in the public cloud as well as entitlements and user permissions adds the level of depth required for high-fidelity alerts and a clear understanding of risk. Are you sure you want to create this branch? PRISMACLOUD Architecture In order to tackle and organize the complexity involved with the construction of cryptographically secured services, we introduce a conceptual model denoted as the PRISMACLOUD architecture, which is organized in 4 tiers (cf. Prisma Cloud Compute Edition is a self-hosted offering thats deployed and managed by you. Prisma Cloud offers a rich set of cloud workload protection capabilities. Visibility must go deeper than the resource configuration shell. In this setup, you deploy Compute Console directly. Add an Azure Subscription or Tenant and Enable Data Security, Configure Data Security for your AWS Account, Edit an AWS Account Onboarded on Prisma Cloud to Enable Data Security, Provide Prisma Cloud Role with Access to Common S3 Bucket, Configure Data Security for AWS Organization Account, Monitor Data Security Scan Results on Prisma Cloud, Use Data Policies to Scan for Data Exposure or Malware, Supported File Sizes and TypesPrisma Cloud Data Security, Disable Prisma Cloud Data Security and Offboard AWS account, Guidelines for Optimizing Data Security Cost on Prisma Cloud, Investigate IAM Incidents on Prisma Cloud, Integrate Prisma Cloud with AWS IAM Identity Center, Context Used to Calculate Effective Permissions, Investigate Network Exposure on Prisma Cloud. Collectively, . For these reasons, many modern operating systems designed for cloud native apps, like Google Container-Optimized OS, explicitly prevent the usage of kernel modules. Create custom auto-remediation solutions using serverless functions. The format of the URL is: https://app..prismacloud.io, The following screenshot shows the Compute tab on Prisma Cloud. Learn how to log in, add your cloud accounts and begin monitoring your cloud resources. It offers comprehensive visibility and threat detection across your organizations hybrid, multi-cloud infrastructure. The Palo Alto Networks CloudBlades platform enables the seamless integration of branch services into the SASE fabric, without needing to update your branch appliances or controllers, thus eliminating service disruptions and complexity. With this architecture we encapsulate the cryptographic knowledge needed on the lower layer inside the tools and their correct usage inside services. Instead of directly integrating cryptography into applications or services the PRISMACLOUD architecture introduces an additional level of abstraction: The tool layer. If Defender replies negatively, the shim terminates the request. However, once built they can be used by cloud service designers to build cryptographically secure and privacy preserving cloud services. Monitor security posture, detect threats and enforce compliance. This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 644962. Prisma SD-WAN CN-Series Compute Consoles address, whether an IP address or DNS name, is used for all interactions, namely: Defender to Compute Console connectivity. This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository. Download the Prisma Cloud Compute Edition software from the Palo . Services developers are able to transform the project results in very short term into products. They will be able to integrate the services without deeper understanding of tools and primitives and ideally without even being an IT security expert. Defender is responsible for enforcing vulnerability and compliance blocking rules. Kernel modules are compiled software components that can be inserted into the kernel at runtime and typically provide enhanced capabilities for low level functionality like process scheduling or file monitoring. Research progress on the layer of primitives leads to scientific progress and typically associated exploitation. By design, Console and Defender dont trust each other and Defender mutual certificate-based authentication is required to connect. It includes the Cloud Workload Protection Platform (CWPP) module only. Take advantage of continuous compliance posture monitoring and one-click reporting with comprehensive coverage (CIS, GDPR, HIPAA, ISO-27001, NIST-800, PCI-DSS, SOC 2, etc.) Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Prisma Cloud leverages Docker's ability to grant advanced kernel capabilities to enable Defender to protect your whole stack, while being completely containerized and utilizing a least privilege security design. Automatically resolve policy violations, such as misconfigured security groups within the Prisma Cloud console. Prisma Cloud scans the overall architecture of the AWS network to identify open ports and other vulnerabilities, then highlights them. If Defender does not reply within 60 seconds, the shim calls the original runC binary to create the container and then exits. Security and DevOps teams can effectively collaborate to accelerate secure cloud native application development and deployment using a single dashboard. Prisma Cloud leverages both agent-based and agentless approach to tap into the cloud providers APIs for read-only access to your network traffic, user activity, and configuration of systems and services, and correlates these disparate data sets to help the cloud compliance and security analytics teams prioritize risks and quickly respond to issues.