0% found this document useful (0 votes)
159 views

Securing Data Center Public Cloud

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
159 views

Securing Data Center Public Cloud

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Securing Data in the Private

Data Center and Public Cloud


with Zero Trust
M AY 2 0 2 0
Table of Contents

Table of Contents
Preface..................................................................................................................................................................... 1

Purpose of This Guide........................................................................................................................................... 3


Audience................................................................................................................................................................................................. 3

Related Documentation....................................................................................................................................................................... 3

Introduction...........................................................................................................................................................4

Segmenting Data and Applications ................................................................................................................... 5

Security Policy........................................................................................................................................................9
Defining Source and Destination with Zones and Dynamic Address Groups............................................................................9

Mapping IP Addresses to Users with User-ID................................................................................................................................ 11

Defining Applications with App-ID................................................................................................................................................. 17

Inspection and Analytics...................................................................................................................................................................22

Protecting Servers with Cortex XDR Agent.....................................................................................................27

Multi-Method Malware Prevention................................................................................................................................................ 27

Multi-Method Exploit Prevention...................................................................................................................................................30

Cortex XDR Agent on Internal and Public Cloud Servers..............................................................................................................31

Protecting the Public Cloud with Prisma Cloud............................................................................................. 33

Prisma Cloud Infrastructure Protection.........................................................................................................................................34

Prisma Cloud Storage Security.........................................................................................................................................................36

Summary............................................................................................................................................................... 37

Palo Alto Networks


Preface

Preface

GUIDE TYPES
Overview guides provide high-level introductions to technologies or concepts.

Reference architecture guides provide an architectural overview for using Palo Alto Networks® technologies
to provide visibility, control, and protection to applications built in a specific environment. These guides
are required reading prior to using their companion deployment guides.

Deployment guides provide decision criteria for deployment scenarios, as well as procedures for combining
Palo Alto Networks technologies with third-party technologies in an integrated design.

DOCUMENT CONVENTIONS

Notes provide additional information.

Cautions warn about possible data loss, hardware damage, or compromise of security.

Blue text indicates a configuration variable for which you need to substitute the correct value for your
environment.

In the IP box, enter 10.5.0.4/24, and then click OK.

Bold text denotes:

• Command-line commands.

# show device-group branch-offices

• User-interface elements.

In the Interface Type list, choose Layer 3.

• Navigational paths.

Navigate to Network > Virtual Routers.

• A value to be entered.

Enter the password admin.

Palo Alto Networks 1


Preface

Italic text denotes the introduction of important terminology.

An external dynamic list is a file hosted on an external web server so that the firewall can import objects.

Highlighted text denotes emphasis.

Total valid entries: 755

ABOUT PROCEDURES
These guides sometimes describe other companies’ products. Although steps and screen-shots were
up-to-date at the time of publication, those companies might have since changed their user interface,
processes, or requirements.

GETTING THE LATEST VERSION OF GUIDES


We continually update reference architecture and deployment guides. You can access the latest version of
this and all guides at this location:

https://www.paloaltonetworks.com/referencearchitectures

WHAT’S NEW IN THIS RELEASE


Palo Alto Networks made the following changes since the last version of this guide:

• Minor updates to reflect changes in product naming and branding.

Palo Alto Networks 2


Purpose of This Guide

Purpose of This Guide


This guide describes how your organization can use the Palo Alto Networks Strata, Prisma™, and
Cortex™ platforms in the design of a Zero Trust security policy to protect your sensitive data and critical
applications.

This guide provides architectural guidance on Zero Trust for solution architects and engineers who are
familiar with the platforms. Use this guide as a roadmap for architectural discussions between Palo Alto
Networks and your organization.

AUDIENCE
This design guide is written for technical readers, including system architects and design engineers, who
want to deploy the Palo Alto Networks platforms in support of a Zero Trust security model. It assumes the
reader is familiar with the basic concepts of applications, networking, virtualization, and security, as well
as a basic understanding of network, data center, and public cloud architectures.

RELATED DOCUMENTATION
The following documents support this guide:

• Zero Trust Overview—Introduces the concepts of the Zero Trust security model and how to
implement it using the Palo Alto Networks platforms.

• Securing Applications Deployed in a VMware NSX-T Data Center: Reference Architecture Guide—
Presents a detailed discussion and options to use VM-Series Virtual Next-Generation Firewalls
to bring visibility, control, and protection to their applications running on a VMware NSX-T Data
Center

• Securing Applications in Cisco ACI: Reference Architecture Guide—Presents a detailed discussion of the
available design considerations and options for the next-generation firewall in a Cisco ACI-based
private data center deployment.

• Securing Applications in Azure: Reference Architecture Guide—Presents a detailed discussion of


the available design considerations and options for the next-generation VM-Series Firewall on
Microsoft Azure.

• Securing Applications in AWS: Reference Architecture Guide—Presents a detailed discussion of the


available design considerations and options for the next-generation VM-Series Firewall on AWS.

• Securing Applications in Google Cloud: Reference Architecture Guide—Presents a detailed discussion


of the available design considerations and options for the next-generation VM-Series Firewall on
Google Cloud Platform.

Palo Alto Networks 3


Introduction

Introduction
Stories of breaches and data loss that expose private information are in the news almost every week. When
these events happen, there can be a significant personal impact on those who have information exposed,
as well as a loss of trust in the applications and companies who were breached. It doesn’t matter if the loss
occurred because of accidental exposure or malicious act, the impact to an organization that has a breach
or data loss event is real.

These events have become so common, at a rapid pace industry is developing new standards and
governments are developing new regulations that are forcing organizations to evaluate their security
posture and do everything they can to prevent these events from occurring. This process can be
challenging for several reasons:

• Location of security infrastructure—Security infrastructure requires visibility and control of the


relevant activities to prevent data breaches. Many organizations deploy security as a function at
the Internet perimeter. Although security at the Internet perimeter is important, sensitive data can
be widely dispersed within an organization and in the public cloud and accessible to users without
traversing a security device.

• Capabilities of security infrastructure—Even when relevant activities are visible to the security
infrastructure, many organizations have a security infrastructure that cannot fully characterize
relevant traffic and activities. The infrastructure must have the ability to characterize traffic and
activities based on business-relevant attributes such as application (not port and protocol) and user
and group (not IP address). It also must be able to identify and stop threats as they happen.

• Security component coordination—When threat and policy information is siloed in multiple


security devices, coordinating a comprehensive security posture to protect against breach and data
loss requires manual coordination and operation. This reduces the effectiveness of the security
infrastructure because the threats evolve faster than security operations can manually coordinate
the security infrastructure.

• Security framework—The biggest challenge for many organizations is defining a security model
that provides the required security across the organization holistically. Most security architectures
focus on the place of protection and policy that is based on what is known to be a risk.

Zero Trust is a security model developed specifically to address the security of sensitive data and critical
applications in an enterprise organization. Zero Trust remedies the deficiencies of perimeter-centric
strategies and the legacy devices and technologies used to implement them. Zero Trust policy leverages
the capabilities of an automated security platform to define policy based on what is required, reducing the
number of ways attacks can happen.

The most critical and sensitive data often resides on resources within your private data center or public
cloud environment. This guide discusses obtaining visibility and control through segmentation and
designing security policy for the private data center and public cloud environment using the Palo Alto
Networks platforms.

Palo Alto Networks 4


Segmenting Data and Applications

Segmenting Data and Applications


Securing applications and services in the Zero Trust model depends upon the ability of the next-
generation firewall to have visibility and control of the inbound traffic to the application, outbound traffic
from the application, and traffic between applications components. To provide the required visibility and
control, you should segment data and applications in the private data center and public cloud provider
behind a next-generation firewall.

The data-sensitivity level of the application does not define if it requires protection by a firewall.
Instead, it informs you on how to group applications and services with common security and traffic flow
requirements. When the data sensitivity increases, additional policies and protections are necessary,
including a stricter definition of what is permitted to access the application. Although applications of
low data-sensitivity can be grouped behind the firewall, the increased policy detail required for moderate
and high levels of data sensitivity means fewer applications can be grouped even when they are at the
same sensitivity level. In fact, an application or service that is at the highest level of sensitivity should
not be grouped with any other application. High-sensitivity services should even be separated from other
components of their application if those other components have a reduced security requirement. The
sensitivity levels are:

• Low—Applications and information whose loss of availability would have limited impact on the
organization or its customers.

• Moderate—Infrastructure, applications, and systems whose loss of integrity and availability would
impact the organization or its customers.

• High—Any information falling under statutory requirements for notification in the case of a breach.

How you create the network segments for an application depends upon the infrastructure on which it
is built. In traditional network infrastructure, the Layer 2 and Layer 3 forwarding tables define which
endpoints can communicate, and a next-generation firewall at the Layer 2 and Layer 3 boundaries is used
to control and limit the traffic. The simplest form of a network segment is a Layer 2 VLAN that doesn’t
have infrastructure Layer 3 services. Instead, the firewall provides Layer 3 services to the servers and
services through an interface (or subinterface) in the VLAN. This traditional configuration works in
almost any private data center infrastructure. However, this type of deployment can be challenging to
scale.

Palo Alto Networks 5


Segmenting Data and Applications

Figure 1  Layer 2 VLAN with next-generation firewall default router

10.5.1.1 10.5.2.1 10.5.3.1 10.5.4.1 10.5.5.1 10.5.6.1

VLAN 10 – 10.5.1.0/24 VLAN 20 – 10.5.2.0/24 VLAN 30 – 10.5.3.0/24 VLAN 40 – 10.5.4.0/24 VLAN 50 – 10.5.5.0/24 VLAN 60 – 10.5.6.0/24

To reduce the number of VLANs and firewall interfaces required in the data center as the number of
servers and services scale instead of using VLANs to create network segments, you can use virtual routing
and forwarding (VRF) instances to aggregate multiple networks while keeping them separate from others.
When using a VRF to create a network segment, the next-generation firewall integrates through Layer 3
static or dynamic routing. It is important to remember, though, that everything within a segment should
have common security and traffic flow requirements. VRFs allow the scale of the number of devices in a
segment but do not ease the challenges associated with scaling the number of segments within the data
center.

Figure 2  Layer 3 VRF with next-generation firewall integrated through OSPF

.2 .2 .2

OSPF OSPF
OSPF

10.6.0.0/24
10.5.0.0/24 10.7.0.0/24
.1 .1 .1

VLAN 51 – 10.5.1.0/24 VLAN 61 – 10.6.1.0/24 VLAN 71 – 10.7.1.0/24

VLAN 52 – 10.5.2.0/24 VLAN 62 – 10.6.2.0/24 VLAN 72 – 10.7.2.0/24

VLAN 53 – 10.5.3.0/24 VLAN 63 – 10.6.3.0/24 VLAN 73 – 10.7.3.0/24

VLAN 54 – 10.5.4.0/24 VLAN 64 – 10.6.4.0/24 VLAN 74 – 10.7.4.0/24

VRF – 10.5.0.0/16 VRF – 10.6.0.0/16 VRF – 10.7.0.0/16

Palo Alto Networks 6


Segmenting Data and Applications

Because fine-grained segmentation is difficult to achieve at scale with traditional infrastructure tools,
many organizations that have this requirement are transitioning to software-defined data center (SDDC)
infrastructure. SDDC infrastructure gives organizations that ability to define the segments not just
through attachment to a specific VLAN or VRF but also through policy that can group servers and services
dynamically based on policy and forward the traffic as appropriate to the next-generation firewall.
Examples of software-defined data center infrastructure include:

• Cisco ACI—Application profiles and endpoint groups define the groups of servers and services that
have common security requirements. Contracts, filters, and policy-based redirect ensure that the
infrastructure forwards traffic between the groups to the firewall for security policy.

• VMware NSX-T Data Center—Security tags dynamically associate virtual machines with a security
policy through security group membership. Service profiles are used in NSX security policies to
provide network introspection services in the next-generation firewall.

Software-defined data center infrastructure also makes it easier to use different firewalls for different
traffic flows. The ability to use different firewalls for north-south traffic versus east-west traffic, for
example, makes it easier to scale out the security infrastructure as the amount of traffic grows.

Little changes when the applications and services do not live in a private data center but instead live
in a public cloud provider’s infrastructure. All applications and services should be segmented behind a
next-generation firewall. One additional consideration in the public cloud is that there might be different
paths into the infrastructure for traffic sourced from the Internet versus traffic sources from within
the organization. If there are multiple paths into the infrastructure, take care to ensure all paths must
traverse a next-generation firewall before reaching the application or service.

Like with the private data center, how you accomplish the segmentation is dependent on the public cloud
provider. For example:

• Amazon Web Services—Virtual Private Cloud instances define the groups of servers and services.
Route tables direct traffic to the VM-Series firewall for security policy.

• Microsoft Azure—VNets and subnets define the groups of servers and services. User-defined routes
direct traffic to the VM-Series firewall for security policy.

• Google Cloud Platform—Virtual Private Cloud networks define the groups of servers and services.
The networks are shared in a Shared VPC host project alone with the VM-Series firewalls. Custom
default routes direct traffic to the VM-Series firewall for security policy.

Palo Alto Networks 7


Segmenting Data and Applications

Although public cloud providers use the term route table when describing how to define the traffic steering
policies, public cloud environments more closely resemble software-defined data center infrastructure.
For example, in Microsoft Azure, the user-defined routes can direct traffic leaving a subnet directly to the
firewall. The firewall does not have to have an IP address or interface attached to the subnet. This closely
resembles the way Cisco ACI works when using policy-based redirect.

Figure 3  Microsoft Azure subnets and user-defined routes

10.112.255.4 (eth1/0)

Default route Private networks

10.112.129.4 10.112.0.4
(eth1/1) (eth1/2)

Virtual Network

Mgmt Range Public Range Private Range


10.112.255.0/24 10.112.128.0/23 10.112.0.0/20

Management Public Private-FW Web Container DB


Subnet Subnet Subnet Subnet Subnet Subnet
10.112.255.0/24 10.112.129.0/24 10.112.0.0/24 10.112.1.0/24 10.112.2.0/24 10.112.3.0/24

Additional Private
Mgmt UDR Public UDR Private UDR
UDRs
Virtual
Mgmt Range
Network None None None
10.112.255.0/24
System Route

Virtual
Public Range None Network 10.112.0.4 10.112.0.4
10.112.128.0/23 System Route

Virtual Virtual
Web Range
Network Network 10.112.0.4 10.112.0.4
10.112.1.0/24
System Route System Route

Virtual Virtual Container


Private Range
None None Network 10.112.0.4 Network 10.112.0.4 Range
10.112.0.0/20 System Route System Route 10.112.2.0/24
Virtual Virtual
DB Range
Network 10.112.0.4 10.112.0.4 Network
10.112.3.0/24
System Route System Route

Internet Internet Internet


10.112.0.4 10.112.0.4
0.0.0.0/0 System Route System Route

Palo Alto Networks 8


Security Policy

Security Policy
The concept of least privileged access forms the basis of a Zero Trust security policy. You can define least-
privileged access by using the following set of the questions:

• Where—From where is the access sourced?

• Who—Who are the individuals or groups who must have access?

• What—What data and services are being accessed?

• How—How are the users accessing the data and services?

DEFINING SOURCE AND DESTINATION


WITH ZONES AND DYNAMIC ADDRESS GROUPS
Primarily, the next-generation firewall applies Zero Trust security policy to network segments through
zones. A zone is a group of one or more firewall interfaces that connect to the network segments that
separate the different applications, services, and private and public connectivity. Zones do not contain
security policy. Instead, Zero Trust security policies use zones to define at a basic level which network
segments can communicate. Zones are used instead of referencing interfaces directly because they give
a level of abstraction that allows you to define common policy in Panorama™ that applies to multiple
firewalls, independent of how the firewalls are physically connected to the infrastructure. In the private
data center and public cloud environments, this abstraction is especially important when there is a mix of
PA-Series and VM-Series firewalls.

Every Zero Trust policy should include zone information to identify where traffic should be coming from
and going to. Zone names are arbitrary, with conventions of “trust” and “untrusted” commonly used
in examples to describe connections to private and public network segments on perimeter firewalls. In
the Zero Trust model, it is best to name the zones descriptively based on the connected functionality
instead of a label denoting policy. As the number of network segments and zones increases, this naming
convention makes policy easier to maintain.

Dynamic Address Groups


In some environments, especially software-defined data centers and public cloud providers where
infrastructure policy defines network segments, not VLANs and VRFs, multiple private segments might
connect to the firewall on a single interface and zone. This is possible because the infrastructure policy
ensures the two segments can’t communicate without going through the firewall, even though they share
a common IP network. In these environments, the firewall can use dynamic address groups to define and
separate the private segments so that separate policy can still be applied even though they share a zone.

Dynamic address groups allow you to create an object on the firewall that contains the devices
known to be in a network segment and automatically adapts to adds, moves, or deletions of devices.

Palo Alto Networks 9


Security Policy

Dynamic address groups use tags to determine which IP addresses are members of the group. In most
infrastructures, the firewall polls the software-defined data center or public cloud provider for application
server IP addresses and their associated tags through the VM Monitoring Agent. In some instances, like
Cisco ACI and Microsoft Azure, IP addresses and tags are dynamically registered on the firewall through
Panorama Plugins.

Because the members of a dynamic address group are automatically updated when application
administrators make changes, you can use address groups to adapt to those changes without relying on
the firewall administrator to make policy changes and commit them.

Figure 4  Dynamic address groups in the public cloud and software defined data center

AWS Instances

Dynamic Address
Group Definition
Sharepoint Servers
10.1.1.2 10.1.6.4 10.3.7.6
VM-Monitoring DB Servers
XML API
Admin Se rvers

Public Web Se rvers

10.4.2.2 10.4.3.8 10.4.9.1


Public Web Se rvers DB Servers 10.4.2.2

10.1.1.2
Admin Se rvers Sharepoint Servers
10.8.7.3 Learned Group
Membership
Sharepoint Servers DB Servers

10.6.3.2 10.8.5.7 10.8.7.3

Using Zones and Dynamic Address Groups in Policy


In the private data center, the number of network segments you define to group your applications and
services drives the number of zones and dynamic address groups on the firewall. From a Zero Trust
security policy perspective, zones are the most basic form of check on if access is allowed and the first
building block of a least privileged access policy. When designing a Zero Trust security policy to protect an
application, for each of the other zones on the firewall consider if any device in those network segments
should be able to initiate communication with the application and vice versa. As the level of sensitivity of a
zone increases, the number of zones that can communicate with it should decrease. For example:

• Low—All private zones

• Moderate—Private zones that have regular employees

• High—Only zones that contain front-end application services

Palo Alto Networks 10


Security Policy

Table 1  Using zones and dynamic address groups in the security policy

Destination
Source zone Source address Destination zone address Action

WAN Organization IPs Services DNS DAG Permit


Application A DHCP DAG
Application B NTP DAG
Application C
Services inbound from internal Application D

Services DNS DAG Internet Any Permit


Services outbound to internet NTP DAG

Low inbound from internal WAN Organization IPs Application A Any Permit

Low outbound to internet Application A Any Internet Any Permit

WAN Contractor IPs Application B Any Deny


IoT IPs
Moderate inbound from internal contractors

Moderate inbound from internal WAN Organization IPs Application B Any Permit

Moderate outbound to internet Application B Any Internet Any Permit

High inbound from moderate Application B Any Application C Any Permit

High inbound from moderate Application B Any Application D Any Permit

Interzone-Default — — — — Deny

MAPPING IP ADDRESSES TO USERS WITH USER-ID


Although zones and dynamic address groups help define the source and destination of a traffic flow, alone
they don’t have enough detail to properly define a least-privileged access policy. Designing a Zero Trust
security policy to protect applications and services relies heavily on being able to identify who should
be able to use that application or service. Zones and IP addresses help inform the security policy about
the location of a user, but with the mobility of users, they are ineffective identifiers of the user’s group
membership. To provide context to IP addresses, User-ID™ on the next-generation firewall dynamically
maps IP addresses to users and their associated group membership and allows you to define security and
authentication policy based on specific users or groups.

User-ID integrates with a wide range of user repositories and terminal service environments. Depending
on your environment, you can configure multiple techniques for user and group mapping. However, not
all integrations provide the same level of dependability and timeliness. When users move around the
network or go remote as they leave the network, it is important that the firewall has the most accurate
representation of the IP address to user mapping. In fact, a Zero Trust security policy works the best when
the IP-to-user mapping is in place before any inbound traffic from the users reaches the firewall.

Palo Alto Networks 11


Security Policy

Local Users in the Campus and Remote Site


For local users, User-ID integration into WLAN and wired authentication and authorization servers
provides high fidelity IP-to-user mappings. When endpoints move around inside the network, the
infrastructure authenticates each move before allowing access to the network. Authentication is also
independent of the endpoint operating system. This gives the AAA servers very timely and accurate IP
address and user information. The integration of User-ID and the AAA servers vary based on the vendor.
Some integrations, like Aruba ClearPass, rely on the AAA server pushing IP and user information to the
firewall through the firewall’s User-ID API. Other integrations, like with Cisco ISE, rely on the AAA server
sending RADIUS account information to the firewall though SYSLOG, which User-ID then parses for
username and address information.

Figure 5  Infrastructure User-ID source

Internal Data Center Public Cloud

Infrastructure Authentication

WLAN
Campus
Controller
Access
Switching

Palo Alto Networks 12


Security Policy

However, although authentication of WLAN is very common, authentication of wired connections has less
adoption. In environments without authentication of wired users, GlobalProtect™ internal gateways are a
high-fidelity source of User-ID information for endpoints on the wired networks. Although GlobalProtect
is primarily used to attach remote users to a next-generation firewall so they have the same level of
security as on-site users, GlobalProtect internal gateways are primarily used to identify internal users
without terminating user traffic.

Figure 6  AAA and GlobalProtect internal gateway

Internal Data Center Public Cloud

GlobalProtect Internal Infrastructure


Gateway Authentication

WLAN
Campus
Controller
Access
Switching

If AAA server or GlobalProtect isn’t a viable User-ID source for an organization, another (but lower
fidelity) choice is Active Directory domain controller monitoring. User-ID monitors domain log-on events
and uses them to associate IP addresses with users. Active Directory monitoring is a lower fidelity User-
ID source for two reasons. First, Active Directory log-on events do not happen every time an endpoint
changes its IP address, and with a default configuration, the endpoints can go up to ten hours before
renewing their login with Active Directory. Second, endpoints must be joined to the Active Directory
domain, which can be challenging when there are MacOS, iOS, and Android endpoints in the organization.
Even though Active Directory is a very common integration that allows User-ID to bring visibility of the
user into traffic logs, because of these challenges, in a Zero Trust security policy, higher-fidelity sources
of User-ID are strongly recommended.

Figure 7  Active Directory User-ID source

Internal Data Center Public Cloud

Active Directory

Palo Alto Networks 13


Security Policy

Remote Users
Remote users must connect to Prisma Access or an on-premises GlobalProtect gateway in order to access
private applications and services from the Internet. Prisma Access creates the IP-to-user mapping when
the GlobalProtect app connects to a security processing node. At this point, the service knows both the
client’s username from the authentication process as well as their internal IP address assignment from
the connection process. These services are the best source of IP-to-user mapping.

Because Prisma Access applies policy on the security processing node to which the user connect, there is
no requirement for the redistribution of User-ID between nodes in the service. However, redistribution is
required when next-generation firewall policy at locations outside of Prisma Access, such as data center
edge, use User-ID.

Service connections provide a central point for internal firewalls to pull User-ID information from Prisma
Access. The internal firewalls might pull User-ID information from multiple sources, so it is important
to remember that the latest IP-to-user mapping overrides all previous entries. Some sources of User-ID,
such as Active Directory, are not as high-fidelity as Prisma Access. To avoid a lower fidelity source from
overriding the Prisma Access user-mapping, you should exclude the IP address range used in Prisma
Access from other User-ID sources.

Figure 8  User-ID redistribution

Prisma Access

Security
Processing Sanctioned
Internet
Node

Corporate Tolerated
Mobile Users Access Node

User-ID Fil e Dropper


Re distribution

Untolerated

Internal Data Center

Headquarte rs

Palo Alto Networks 14


Security Policy

Considerations for User-ID in a Public Cloud Environment


User-ID is just as important for a Zero Trust security policy in a public cloud environment as in the private
data center. However, there are a few design considerations.

First, configure a Zero Trust security policy that includes User-ID for connections originating within
your organization and entering your public cloud environment through your private connection (Azure
Express Route, AWS Direct Connect, etc). Deriving IP-to-user mappings for connections entering from the
Internet can be extremely challenging.

Second, network address translation can have a detrimental effect on being able to map IP addresses to
users. Although User-ID supports mapping multiple IP addresses to a single user, it cannot map more
than one user to an IP address. If traffic from multiple users entering the firewall in a cloud environment
has been translated to a single address (for example by a load balancer), then the next-generation firewall
can’t distinguish between the users. To combat this, many load balancers support inserting X-Forwarded-
For (XFF) fields in HTTP headers. XFF allows the firewall to identify the originating IP address of a
client connecting to a web application. If you are hosting non-HTTP applications in the public cloud
environment, consider resiliency designs that do not translate the source IP address of private traffic
destined to the firewall.

Validating User-ID with Authentication Policies

Authentication policy enables you to authenticate users before evaluating the security policy to determine
if they are allowed access. Authentication policies are useful tools in a couple of different scenarios:

• Authenticating unknown users—Invariably a user will eventually need to reach an application


protected with a Zero Trust security policy and be unable to because of a missing IP-to-user
mapping. Authentication policies can be used on traffic of “unknown users” from the public zone
to an application zone. The authentication policy can use several authentication sources, including
SAML single sign-on. Once authenticated through the captive portal, the firewall updates the
IP-to-user mapping.

• Validating User-ID before allowing access to sensitive applications—For your most sensitive
applications and services, you should use authentication policies to validate that the expected user
is initiating the traffic to the application. Authentication policies that match the traffic from specific
users to the application zone can force a multi-factor authentication of the user before allowing
access and ensure that the originator isn’t using stolen credentials. The MFA is done transparently
to the application and is especially useful for administrative access that doesn’t natively support or
is difficult to configure for MFA.

Palo Alto Networks 15


Security Policy

Using User-ID in Policy


Although IP-to-user mapping is critical to being able to implement a Zero Trust security policy, in most
instances the policy will not be described by specific users. Instead, for ease of management, a Zero Trust
security policy typically uses group information to describe who can access an application or service.
To determine group membership, regardless of the source of the IP-to-user mapping, after the firewall
gathers user information, User-ID uses LDAP to integrate with the directory service in order to obtain
group information for that user.

Authentication policies and User-ID provide important detail to the Zero Trust security policy. To protect
applications and services in the private data center and public cloud, security rules for traffic inbound
from the internal network should be limited to the appropriate user groups. When the level of sensitivity
for an application increases, fewer users should have access to the application. For the most sensitive
applications, enforce multi-factor authentication policies before the security policy evaluation of user
information.

Figure 9  MFA authentication for high-sensitivity segments

3
2

4
Highly Sensitive Data

In most cases, the Zero Trust security policy for outbound traffic to the Internet initiated from the
application servers should not evaluate User-ID. Servers typically do not have active users and instead
should be identified through dynamic address groups.

Table 2  Authentication policy

Source zone Source user Destination zone Action

Force authentication if unknown user attempts WAN unknown Application B Captive Portal
traffic to web application

Force MFA for administrators that want access to WAN group.admins Application C MFA
application

Palo Alto Networks 16


Security Policy

Table 3  Security policy with User-ID

Destination Destination
Source zone Source user Source address zone address Action

WAN Any Organization Services DNS DAG Permit


Application A IPs DHCP DAG
Application B NTP DAG
Application C
No user required for services Application D

No user required for traffic Services Any DNS DAG Internet Any Permit
from servers NTP DAG

WAN known-user Organization Application A Any Permit


All known users IPs

WAN Any Contractor Application B Any Deny


IPs
No user used to block IoT IPs

WAN group. Organization Application B Any Permit


Permit Employee group employees IPs

Permit admin group WAN group.admins Admins IPs Application C Any Permit

Interzone-Default — — — — — Deny

DEFINING APPLICATIONS WITH APP-ID


For a Zero Trust security policy to be able to protect applications and services, those applications and
services must be described in the policy. Zones, dynamic address groups, and User-IDs all help apply
policy based on a network segment or IP address, but they do not describe the application traffic itself,
just where it is coming from, where it is going to, and who initiated it. Traditionally, the security policy
describes application traffic as a set of TCP or UDP ports numbers. However, this is a coarser descriptor,
especially with the movement to HTTP and HTTPS based applications that all would share the same TCP
port numbers. App-IDs bring the visibility and control of the applications traversing the firewall that is
required to define Zero Trust security policies.

The App-ID™ traffic classification system in the next-generation firewall identifies the applications (and
their functions) when the traffic traverses the firewall. App-IDs identify applications through several
techniques—regardless of the traffic port or protocol—even when it is encrypted, tunneled, or uses
evasive tactics.

App-IDs identify applications traversing the next-generation-firewall, including both client to server
applications as well as intra-component applications. Palo Alto Networks dynamically updates the list of
App-IDs, based upon input from partners and customers, as well as market trends.

Palo Alto Networks 17


Security Policy

When an application has multiple functions that might need to be treated differently in policy (for
example, editing, uploading and downloading), the functionality may be covered by multiple App-IDs.
There are three types of App-IDs:

• Container App-ID—Groups multiple App-IDs related to a single application (Example in Figure 10:
boxnet)

• Base App-ID—Identifies the core functionality of the application (Example in Figure 10:
boxnet-base)

• Functional App-ID—Identify specified functionality of the application (Examples in Figure 10:


boxnet-sharing, boxnet-editing, and so on)

For most applications with multiple App-IDs, the base App-ID matches the vast majority of traffic for that
application and the functional App-IDs depend upon it.

Figure 10  Container App-ID, base App-ID, and functional App-IDs

App-IDs are as unique as the applications they describe. Some applications have App-IDs that differentiate
between consumer and enterprise-level logins to an application. Other applications have App-IDs that
provide visibility when a user renames a folder or uses screen-sharing.

App-ID functionality is always enabled in the next-generation-firewall and is classifying all traffic, not
just HTTP/S traffic, all of the time. Because App-IDs look at all the traffic passing through the next-
generation firewall (business applications, consumer applications, and network protocols), you do not
need to configure an App-ID to look for specific traffic. Instead, App-ID is used in the Zero Trust security
policy to further define the least-privileged access by including application identification in with defining
policy based on where the traffic is coming from (zones, dynamic address groups), as well as who initiated
it (User-ID).

Palo Alto Networks 18


Security Policy

Using App-ID in policy


Use App-ID to control the traffic inbound traffic into the segment. For segments that contain multiple
low sensitivity applications, use dynamic address groups to microsegment the application resources.
Instead of allowing DNS and NTP into all servers in a shared services segment, limit DNS traffic to the DNS
address group in the shared services segment and NTP to the NTP address group.

Table 4  Security Policy with App-ID

Destination Destination
Source zone Source user Source address zone address App-ID

WAN Any Organization IPs Services DNS DAG DNS


Application A DHCP DHCP
Application B DAG NTP
Anyone can access Application C NTP DAG
infrastructure Application
services D

Services Any DNS DAG Internet Any dns


NTP DAG ntp
Services can access
the internet for
lookups

WAN known- Organization IPs Application A Any web-browsing


user
Internal users can
access internal
web servers

Application A Any Any Internet Any apt-get

Web servers can do


software updates

WAN Any Contractor IPs Application B Any Any


IoT IPs

Block contractors
from exchange
servers

WAN group. Organization IPs Application B Any mapi-over-http


employees ms-exchange
Employees can
rpc-over-http
contact exchange
activesync
servers

Application B Any Any Application C Any mssql-db


Exchange servers
can contact SQL
servers

Palo Alto Networks 19


Security Policy

About Decryption
App-ID uses traffic payload information to identify applications. Because many applications encrypt
the traffic between client and server, to have granular visibility and control to the application, the next-
generation firewall must decrypt the traffic. The next-generation firewall can decrypt and inspect both
inbound and outbound SSL/TLS connections traversing the firewall.

Inbound Decryption

Use SSL Inbound Inspection to decrypt and inspect inbound SSL traffic from internal endpoints to private
servers in the data center and public cloud. SSL Inbound Inspection requires that you import the server
certificate and key on to the firewall. Because it has the server certificate and key, the firewall can access
the SSL session between the server and the client and decrypt and inspect traffic transparently. After
traffic is decrypted, the firewall can apply security policies to the decrypted traffic, detecting malicious
content and controlling applications running over this secure channel.

Outbound Decryption

With SSL Forward Proxy, the firewall can decrypt outbound traffic from servers in the data center and
public cloud encrypted using SSL/TLS.

To secure the connection, SSL uses certificates to establish trust between the client and server.
Certificates that are signed by a trusted certificate authority are installed on the firewall and used to
establish the firewall as a trusted third party to your internal server during the connection setup. Your
PKI infrastructure must trust the firewall’s SSL certificate, or you must deploy the SSL certificate on each
server in your data center that will be participating in sessions decrypted by the firewall.

The next-generation firewall preserves the integrity of the SSL/TLS session by using the cryptographic
settings of the original SSL/TLS negotiation as mandated by the client and the server. It does not change
the cryptographic parameters after the session has been negotiated. Further, to reduce risks associated
with older versions of the protocols, PAN-OS® allows you to specify the supported SSL/TLS protocol
versions and cipher suites. CRL/OCSP checks ensure that certificates presented during SSL decryption are
valid.

Figure 11  SSL forward proxy

SSL Negotiation

Client Server

SSL Tunnel SSL Tunnel

Palo Alto Networks 20


Security Policy

Using Decryption in Policy

Decryption is policy-based. Such policies can be used to decrypt, inspect, and control both inbound
and outbound SSL and SSH connections. Decryption policies allow you to specify traffic for decryption
according to destination, source, or URL category. Because the App-ID of the session is determined in part
by the payload of the packets, it cannot be used to define decryption policies.

The best-practice security policy dictates that you decrypt all traffic except sensitive categories, such
as Health, Finance, and Government. However, that practice is not always possible or desired by
organizations, even when they lose fine-grained application granularity and threat and file blocking.
When you can’t decrypt everything, but still want those capabilities for a SaaS application, you can
decrypt the application by integrating the IP and domain information that many SaaS vendors publish
into the decryption policy dynamically or through static definitions.

The ability to decrypt or not decrypt depends not just on the firewall decryption policy but also on the
design of the client software. Even when the operating system and web browser trust the certificate of the
next-generation firewall, instances may exist where the client application software does not. Some client
applications have a copy of the server certificate information built-in, which is called a pinned certificate.
When the firewall attempts to negotiate the SSL/TLS session and sends its certificate to the client, the
client compares the stored information with the information in the certificate. Because the information
doesn’t match, the client does not complete the connection. SSL/TLS sessions for client applications
that use certificate pinning cannot be decrypted by the next-generation firewall or any other decryption
vendor.

The client applications that use certificate pinning vary. Some SaaS applications ensure all standalone
clients (those that are outside of the web browser) use pinned certificates. Other SaaS applications may
have the macOS client pinned, but not the Windows client. In a few instances, it may even depend on the
hardware on which the client is running.

Because clients with pinned certificates won’t connect when the firewall attempts to decrypt their traffic,
it is best to avoid such clients. In most cases, accessing the SaaS application through a web-browser
instead of the standalone client allows the use of the application and provides you with granular
application control, as well as threat and file blocking. If you must use a client application that has a
pinned certificate, you must exclude the entire application from decryption. For such an application,
you lose the granular App-IDs and content security for all clients, even web-browser clients. You can use
server certificate information and URLs to exclude servers from SSL decryption.

Palo Alto Networks 21


Security Policy

INSPECTION AND ANALYTICS


The Zero Trust model prevents threats in traffic allowed by the least privileged access policy through
inspection and analytics. Inspection is used to identify malware, vulnerabilities, data exfiltration, and
threats previously identified by the platforms. Analytics are used to identify previously unknown threats
to the organization.

Inspection

Antivirus Security Profiles

In the next-generation firewall, preventing known malware is the function of security profiles,
specifically the antivirus profile. Antivirus profiles protect against downloading files that contain viruses,
worms, trojans, and spyware. Using a stream-based malware prevention engine, the antivirus solution
provides protection without significantly impacting the performance of the firewall. This profile scans for
a wide variety of malware in executables, Office and PDF files, HTML, and JavaScript, including support
for scanning inside compressed files and data encoding schemes.

The two sources of malware signature information for the next-generation firewall are antivirus
and WildFire® content updates. Antivirus content updates are released by Palo Alto Networks daily.
However, malware can propagate globally in a much shorter timeframe. WildFire reduces the window
of vulnerability through content updates that are released every five minutes. Firewalls with an active
WildFire license can retrieve the latest WildFire signatures. If you do not have a WildFire subscription,
signatures are made available within 24-48 hours as part of the antivirus update for firewalls with an
active Threat Prevention license.

The antivirus profile can protect FTP, HTTP, IMAP, POP3, SMB, and SMTP traffic. In an antivirus profile,
you can configure the action for each protocol and specify how the firewall responds to a threat event. In
a Zero Trust security policy, you should configure all Inbound, Outbound and East-West rules (regardless
of sensitivity level) so that the traffic is scanned for known antivirus signatures. The best practice
antivirus profile uses the default action when it detects traffic that matches either an antivirus signature
or a WildFire signature. The default action differs for each signature and follows the most up-to-date
recommendation from Palo Alto Networks for how to best prevent malware from propagating.

Palo Alto Networks 22


Security Policy

Figure 12  Best practice antivirus policy

Anti-Spyware Security Profiles

Anti-spyware profiles block spyware on compromised servers from contacting external command-and-
control systems. To prevent infected servers from sending malicious traffic to command and control
systems anti-spyware, you should enable profiles on all rules allowing outbound traffic to the Internet.
Because traffic from internal servers destined to the Internet should be well known, Anti-spyware profiles
on traffic inbound to and outbound from applications servers should be as strict as possible.

In addition, enable the DNS Sinkhole action on the profile so that the firewall generates responses to DNS
queries for known malicious domains. DNS sinkholing causes the malicious domain name to resolve to an
IP address that you define in policy and helps to identify infected hosts because any host that attempts to
connect to the sinkhole IP address is most likely infected with malware.

Vulnerability Protection Security Profiles

The next-generation firewall’s vulnerability protection and intrusion-prevention capabilities detect and
block exploit attempts and evasive techniques at both the network and application layers, including port
scans, buffer overflows, remote code execution, protocol fragmentation, and obfuscation.

In a Zero Trust security policy, configure all Inbound, Outbound and East-West rules (regardless of
sensitivity level) so that the firewall resets critical and high severity threat. Leave low and informational
threats to the default action.

Palo Alto Networks 23


Security Policy

URL Filtering

Most attacks and exposure to malicious content occurs during the normal course of web-browsing
activities, which requires the ability to allow safe, secure web access for all users. URL filtering with
PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links
in emails, phishing sites, HTTP-based command and control, malicious sites, and pages that carry
exploit kits.

Although the web-browsing App-ID should rarely be enabled for outbound connections from servers
destined to the Internet, enable URL filtering on all rules allowing traffic to the Internet from within the
data center or public cloud. At a minimum the following categories should be blocked in the URL filtering
profile:

• Malware

• Phishing

• Hacking

• Proxy avoidance and anonymizers

Because traffic to the Internet from servers should be well known, you should block as many additional
URL categories as possible. Limiting URLs to a specific whitelist should also be considered for moderately
sensitive servers.

File Blocking

File-blocking profiles allow you to identify specific file types that you want to want to block or monitor.
For inbound and east-west traffic, block files that are known to carry threats or for which the application
has no use. At a minimum, these include batch files, DLLs, Java class files, help files, Windows shortcuts
(.lnk), and torrent files. Additionally, to stop the exfiltration of data, outbound rules should only allow file
types that are known to be required by the application.

Analytics
WildFire identifies previously unknown malware and generates signatures that the next-generation
firewall, Prisma SaaS, and Cortex XDR Agent use to detect and block malware.

When a Palo Alto Networks firewall detects an unknown sample (a file or a link included in a POP or
SMTP email), the firewall can automatically forward the sample to WildFire for analysis. Deciding which
samples to forward to WildFire for analysis is the function of the WildFire Analysis Security Profile. Like
all security profiles, the WildFire analysis profile is applied to a rule in the security policy. Each rule can
have a unique profile.

For outbound traffic to the Internet, use the default WildFire Analysis profile to define the traffic that
the firewall should forward for WildFire analysis. The default WildFire Analysis profile ensures complete
WildFire coverage for all traffic that the security policy rule allows. It specifies that all supported file types

Palo Alto Networks 24


Security Policy

across all applications are forwarded for WildFire analysis, regardless of whether the files are uploaded
or downloaded. The file types that the next-generation firewall supports for forwarding to WildFire
include Android APK, Adobe Flash, Java JAR, Microsoft Office (such as DOCX, PPTX, and XLXS), portable
executable (PE), and Adobe PDF, as well as macOSX Mach-O, DMG, PKG, and application bundles.

Before forwarding the sample to WildFire, the firewall analyzes the structure and content of the sample
and generates a hash. Because WildFire analyzes content from thousands of customers globally and
through multiple places in the organization, the next-generation firewall then checks to determine
if WildFire has already seen the hash. If it has, the firewall applies the default action defined for the
signature (allow, alert, or block) and does not upload the file for analysis. If the sample remains unknown
after comparing it against known WildFire signatures, the firewall forwards it to WildFire for analysis.

WildFire renders a verdict on the sample based on the properties, behaviors, and activities the sample
displays when analyzed and executed in WildFire. The verdict identifies a sample as malicious, grayware,
phishing, or benign. WildFire then generates signatures to recognize the newly-discovered malware, and
it makes the latest signatures globally available through WildFire content updates every five minutes and
the antivirus content updates within 24 to 48 hours.

Samples that firewalls submit for WildFire analysis are displayed, along with WildFire verdict, in the
WildFire Submissions log. For each WildFire entry, you can open an expanded log view, which displays
log details and the WildFire analysis report for the sample. For all samples, the WildFire analysis report
displays file and session details. For malware samples, the WildFire analysis report also includes details
on the file attributes and behavior that indicated the file was malicious.

Figure 13  WildFire analysis report

Palo Alto Networks 25


Security Policy

Any sessions that had a verdict of Malicious should be investigated further because the firewall does not
cache the sample and wait for the result of the analysis before forwarding the traffic to the user. There
will be a small period between when the first sample of malware is seen on a Palo Alto Networks security
device and when the signatures are created and available globally for prevention. During this period
between submission and signatures’ availability to the next-generation firewalls, Cortex XDR Agent
endpoint protection is critical to ensuring prevention on the endpoint.

Logging to Cortex Data Lake


Investigating historical or real-time security-relevant events depends heavily on the data captured in
the firewall logs. The right data gives you the ability to derive actionable intelligence. It lets you identify
known attacks that occurred in the past in order to understand what they took, added, or modified; to
identify known attacks occurring presently and what they are targeting; and to identify known indicators
of possible future attacks. It gives you this past, present, future view of known attacks to disclose, clean
up, or lock down as needed. It also provides the ability to analyze this rich data source for previously
unknown attack techniques, new vectors, and previously unidentified targets allowing you or others to
develop new indicators of compromise, preventions, and remediation techniques. From this data, you can
also develop an understanding of your adversaries and their playbooks and adapt your security posture to
best match that of those who target your data.

Cortex Data Lake (is a cloud-based log collector service designed to collect logs; perhaps more accurately,
it is designed to collect data. Cortex Data Lake collects and stores large amounts of log data, helping to
solve challenges around security-relevant log storage and retention. That data can then be the basis for
developing and delivering a whole new set of security applications. It also serves as the foundation for the
hub .

Cortex Data Lake acts as a centralized logging destination instead of dedicated logging to a Log Collector
appliance or retaining logs on the local firewall itself. Cortex Data Lake leverages a secure, multi-tenant
cloud model to provide high availability and fault tolerant data protection. The cloud-based service
provides massive search capabilities at scale. Using secure SSL/TLS connections, logs are sent by one or
more firewalls and Prisma Access to Cortex Data Lake. These secure connections are established between
the service and the sender by using a signed certificate provided by Cortex Data Lake itself. These sessions
are re-negotiated periodically to change the encryption key in use. Firewalls also encrypt the logs before
sending them over a secured session.

Palo Alto Networks 26


Protecting Servers with Cortex XDR Agent

Protecting Servers with Cortex XDR Agent


Cortex XDR Agent advanced endpoint protection stops threats on the server and coordinates enforcement
with cloud and network security to prevent successful cyberattacks. Cortex XDR Agent minimizes server
infections by blocking malware, exploits, and ransomware.

Attackers often blend two primary attack methods to compromise organizations: targeting application
vulnerabilities through exploits and deploying malicious files—including ransomware. These methods
can be used individually or in various combinations, but they are fundamentally different in nature:

• Exploits are the results of techniques used against a system that are designed to gain access through
vulnerabilities in the operating system or application code.

• Malware is a file or code that infects, explores, steals, or conducts virtually any behavior an attacker
wants.

• Ransomware is a form of malware that holds valuable files, data, or information for ransom, often
by encrypting data, with the attacker holding the decryption key.

Due to the fundamental differences between malware and exploits, effective prevention requires an
approach that protects against both. Cortex XDR Agent combines multiple methods of prevention at
critical phases within the attack lifecycle to halt the execution of malicious programs and stop the
exploitation of legitimate applications.

MULTI-METHOD MALWARE PREVENTION


Cortex XDR Agent prevents the execution of malicious files with an approach tailored to combating both
traditional and modern attacks. Additionally, administrators can utilize periodic scanning to identify
dormant threats, comply with regulatory requirements, and accelerate incident response with endpoint
context.

Palo Alto Networks 27


Protecting Servers with Cortex XDR Agent

The primary prevention capabilities include:

• WildFire threat intelligence—In addition to third-party feeds, Cortex XDR Agent leverages the
intelligence obtained from tens of thousands of subscribers to the WildFire cloud-based threat
analysis service to continuously aggregate threat data and maintain the collective immunity of all
users across endpoints, networks and cloud applications.

◦ Cortex XDR Agent queries WildFire with the hash of any Windows or macOS executable file,
DLL, or Office file before the file runs to assess its standing within the global threat community.
WildFire returns a near-instantaneous verdict on whether the file is malicious or benign. If the
file is unknown, Cortex XDR Agent proceeds with additional prevention techniques to determine
whether it is a threat that should be terminated.

◦ If the file is deemed malicious, Cortex XDR Agent automatically terminates the process and
optionally quarantines it.

• Local analysis via machine learning—If a file remains unknown after the initial hash lookup
and has not been identified by administrators, Cortex XDR Agent uses local analysis via machine
learning on the endpoint—trained by the rich threat intelligence of WildFire—to determine
whether the file can run, even before receiving a verdict from the deeper WildFire inspection. By
examining hundreds of file characteristics in real time, local analysis can determine whether a file
is likely malicious or benign without relying on signatures, scanning, or behavioral analysis.

• WildFire inspection and analysis—In addition to local analysis, Cortex XDR Agent sends unknown
files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware.
WildFire brings together the benefits of independent techniques for high-fidelity and evasion-
resistant discovery that go beyond legacy approaches. These techniques include:

◦ Static analysis via machine learning—A more powerful version of local analysis, based in the
cloud, that detects known threats by analyzing the characteristics of samples before execution.

◦ Dynamic analysis—A custom-built, evasion-resistant virtual environment in which previously


unknown submissions are detonated to determine real-world effects and behavior.

◦ Bare metal analysis—A hardware-based analysis environment specifically designed for


advanced threats that exhibit highly evasive characteristics and can detect virtual analysis.

If WildFire determines a file to be a threat, it automatically creates and shares a new prevention control
with Cortex XDR Agent and other components of the platform in as few as five minutes, ensuring the
threat is immediately classified as malicious and prevented, should it be encountered again.

Palo Alto Networks 28


Protecting Servers with Cortex XDR Agent

Additional prevention capabilities include:

• Granular child process protection—Cortex XDR Agent prevents script-based and fileless attacks by
default with out-of-the-box, fine-grained controls over the launching of legitimate applications,
such as script engines and command shells, and continues to grow these controls through regular
content updates directly from the Palo Alto Networks threat research team, Unit 42. Administrators
have additional flexibility and control with the ability to whitelist or blacklist child processes, along
with command-line comparisons, to increase detection without negatively impacting process
performance or shutting them down.

• Behavior-based ransomware protection—In addition to existing multi-method prevention


measures—including exploit prevention, local analysis and WildFire—Cortex XDR Agent monitors
the system for ransomware behavior. Upon detection, it immediately blocks attacks and prevents
encryption of customer data.

• Scanning—Administrators can scan endpoints and attached removable drives for dormant
malware, with an option to automatically quarantine it for remediation when found. Periodic or
on-demand scanning can be configured as part of a security profile on one or more endpoints.

• Admin override policies—Cortex XDR Agent enables organizations to define policies based on
the hash of an executable file to control what is or isn’t allowed to run in their environments.
This not only reduces the attack surface but eliminates negative impact on homegrown or heavily
customized applications.

• Malware quarantine—Particularly useful in preventing the inadvertent dissemination of malware


in organizations where network- or cloud-based data storage and SaaS applications automatically
sync files across multiple users and systems, Cortex XDR Agent immediately quarantines malicious
executable files, DLLs, and Office files in order to prevent propagation or execution attempts of
infected files.

• Grayware classification—Cortex XDR Agent enables organizations to identify non-malicious but


otherwise undesirable software, such as adware, and prevent it from running in their environments.

• Execution restrictions—Cortex XDR Agent enables organizations to easily define policies to restrict
specific execution scenarios in order to reduce the attack surface of any environment. For example,
Cortex XDR Agent can prevent the execution of files from the Outlook “temp” directory or a
particular file type from a USB drive.

Palo Alto Networks 29


Protecting Servers with Cortex XDR Agent

MULTI-METHOD EXPLOIT PREVENTION


Rather than relying on signatures or behavior-based detection to identify exploit-based attacks,
Cortex XDR Agent targets the techniques any exploit-based attack must use to manipulate a software
vulnerability. By preventing the techniques instead of identifying each attack, Cortex XDR Agent can
protect unpatched systems, unsupported legacy systems, and zero-day exploits. Cortex XDR Agent
delivers exploit prevention using multiple methods:

• Pre-exploit protection—Cortex XDR Agent prevents the vulnerability-profiling techniques that


exploit kits use prior to launching attacks. By blocking these techniques, Cortex XDR Agent prevents
attackers from targeting vulnerable endpoints and applications, effectively preventing the attacks
before they begin.

• Technique-based exploit prevention—Cortex XDR Agent prevents known, zero-day and unpatched
vulnerabilities by blocking the exploitation techniques attackers use to manipulate applications.
Although there are thousands of exploits, they typically rely on a small set of exploitation
techniques that change infrequently. Cortex XDR Agent blocks these techniques, thereby preventing
exploitation attempts before they can compromise endpoints.

• Kernel exploit prevention—Cortex XDR Agent prevents exploits that leverage vulnerabilities in the
operating system kernel to create processes with escalated (i.e., system-level) privileges. Cortex
XDR Agent also protects against new exploit techniques used to execute malicious payloads, such
as those seen in 2017’s WannaCry and NotPetya attacks. By blocking processes from accessing the
injected malicious code from the kernel, Cortex XDR Agent can prevent the attack early in the attack
lifecycle without affecting legitimate processes. This enables Cortex XDR Agent to block advanced
attacks that target or stem from the operating system itself.

By blocking the techniques common to all exploit-based attacks, Cortex XDR Agent provides customers
three important benefits:

• Protects unpatchable applications and shadow IT—Providing a positive work experience is critical
to the productivity of any organization, but running unsupported legacy applications or granting
users the flexibility to download and run programs as they please introduces risk. Cortex XDR Agent
enables organizations to run any applications, including those developed in-house, no longer
receiving updates or security support, or running in their environment without IT’s awareness,
without opening the network to the threat of exploit-based attacks.

• Eliminates the urgency to patch applications as soon as possible—Organizations using Cortex XDR
Agent can apply security patches when it is appropriate for the business and after sufficient testing.
Cortex XDR Agent prevents the exploitation of application vulnerabilities regardless of when an
organization applies security patches issued by application vendors.

• Prevents zero-day exploits from succeeding—Because Cortex XDR Agent blocks the limited set of
exploitation techniques zero-day exploits typically use, Cortex XDR Agent protects organizations
against attacks that utilize zero-day exploits.

Palo Alto Networks 30


Protecting Servers with Cortex XDR Agent

CORTEX XDR AGENT ON INTERNAL AND PUBLIC CLOUD SERVERS


Cortex XDR Agent advanced endpoint protection stops threats on the server and minimizes server
infections by blocking exploits, malware and ransomware. Like with the next-generation firewall, you can
use a Zero Trust policy in Cortex XDR Agent to extend the least-privileged access model to protecting the
server operating system.

Figure 14  Cortex XDR Agent protecting servers

Remote and Mobile Users

Public Cloud

Cortex XDR

WildFire

Cortex Data
Lake

Data Center
IoT Devices Contractors

Internal Users Privileged Use rs

HQ

Because attackers most often target application vulnerabilities when attempting to compromise servers,
the Cortex XDR Agent exploit-prevention profile is key to extending the Zero Trust security model to
servers and blocking the core techniques used by zero-day exploits.

Palo Alto Networks 31


Protecting Servers with Cortex XDR Agent

In Cortex XDR, enable the following exploit protection capabilities on the Windows and Linux server
agents:

• Known Vulnerable Processes Protection—Common applications in the operating system can


contain bugs and vulnerabilities that an attacker can exploit. By enabling this capability, Cortex
XDR Agent protects these processes from attacks that try to exploit known process vulnerabilities.

• Exploit Protection for Additional Processes—Extend protection from exploitation attempts to the
processes that the known-vulnerable process-protection doesn’t cover. Add processes that interact
with the sensitive data or end-users to this list.

• Operating System Exploits Protection—Attackers leverage the operating system itself to


accomplish malicious actions. Enable this capability in order to allow the Cortex XDR Agent to
protect the operating system mechanisms, such as privilege escalation, and prevents attackers from
using them for malicious purposes.

Like traffic flows, the applications that run on the servers in your private data center and public cloud
environment should be well defined. Use restriction profiles to reduce the avenues from which an attacker
can compromise your servers. For your highest sensitivity Windows servers, define restriction policy that
restricts:

• The locations from which executable files can run.

• Access to all network locations except for those that the application explicitly requires.

• The executable files that users can launch from external drives.

• The executable files that users can launch from optical disc drives.

Windows servers should also have the following malware protection capabilities enabled:

• Ransomware protection— Targets encryption-based activity associated with ransomware in order


to analyze and halt ransomware before any data loss occurs.

• Prevent malicious child process execution—Prevents script-based attacks used to deliver malware
by blocking known targeted processes from launching child processes that attackers commonly use
to bypass traditional security approaches.

• Portable executables and DLLs examination—Analyze and prevent malicious executable and DLL
files from running. Whitelist the files and executable signers that your application requires.

The Cortex XDR Management Service provides granular control over service-protection settings and
security of the Cortex XDR Agent running on the servers. This default protection prevents attempts to
disable or make changes to Cortex XDR Agent processes, services, registry keys and values, and files.

Cortex XDR Management Service sends all of its logs to Cortex Data Lake for storage and to be used as
data for security analytics applications running on the Hub. Cortex XDR Agent logs provide detail on the
processes and activities that generate and receive traffic that was logged by the next-generation firewall.

Palo Alto Networks 32


Protecting the Public Cloud with Prisma Cloud

Protecting the Public Cloud


with Prisma Cloud
The policies and capabilities used to secure data and applications in the public cloud are effectively
the same as those used in the private data center. One major area of difference is that you do not
have complete control over the infrastructure. This is troublesome because a single mistake in the
configuration of the cloud environment can leave it open to attack and loss of sensitive data. Another area
of difference is that the data stored in the public cloud environment is at greater risk of exposure than
data in the private data center. When high and moderate sensitivity data and applications live in the public
cloud, you must secure the cloud infrastructure and govern the data stored in the cloud environment
as part of Zero Trust. Prisma Cloud helps secure your public cloud environments and provide data
governance to public cloud storage.

Figure 15  Prisma Cloud

Prisma Cloud

Continuous Security &


Compliance Monitoring

API

Public Cloud

Palo Alto Networks 33


Protecting the Public Cloudwith Prisma Cloud

PRISMA CLOUD INFRASTRUCTURE PROTECTION


Prisma Cloud provides cloud infrastructure protection across the following areas:

• Multi-cloud security—Provides a consistent implementation of security best practices across your


public cloud environments. Prisma Cloud requires no agents, proxies, software, or hardware for
deployment and integrates with a variety of threat intelligence feeds. Prisma Cloud includes pre-
packaged polices to secure multiple public cloud environments.

• Continuous compliance—Maintain continuous compliance across CIS, NIST, PCI, FedRAMP, GDPR,
ISO, and SOC 2 by monitoring API-connected cloud resources across multiple cloud environments
in real time. Compliance documentation is generated with one-click exportable, fully prepared
reports.

• Cloud forensics—Go back in time to the moment a resource was first created and see
chronologically every change and by whom. Prisma Cloud provides forensic investigation and
auditing capabilities of potentially compromised resources across your public cloud environment,
as well as other public cloud environments. Historical information extends back to initial creation
of each resource and the detailed change records includes who made each change.

• DevOps and automation—Enable secure DevOps without adding friction by setting architecture
standards that provide prescribed policy guardrails. This methodology permits agile development
teams to maintain their focus on developing and deploying apps to support business requirements.

Prisma Cloud connects to your cloud via APIs and aggregates raw configuration data, user activities, and
network traffic to analyze and produce concise actionable insights. Prisma Cloud performs a five-stage
assessment of your cloud workloads. Contributions from each stage progressively improve the overall
security posture for your organization:

• Discovery—Prisma Cloud continuously aggregates configuration, user activity, and network


traffic data from disparate cloud APls. It automatically discovers new workloads as soon as they are
created.

• Contextualization—Prisma Cloud correlates the data and applies machine learning to understand
the role and behavior of each cloud workload.

• Enrichment—The correlated data is further enriched with external data sources—such as


vulnerability scanners, threat intelligence tools, and SIEMs—to deliver critical insights.

• Risk assessment—Prisma Cloud scores each cloud workload for risk based on the severity of
business risks, policy violations, and anomalous behavior. Risk scores are then aggregated,
enabling you to benchmark and compare risk postures across different departments and across the
entire environment.

• Visualization—The entire cloud infrastructure environment is visualized with an interactive


dependency map that moves beyond raw data to provide context.

Palo Alto Networks 34


Protecting the Public Cloudwith Prisma Cloud

Prisma Cloud Threat Defense


Prisma Cloud enables you to visualize your entire public cloud environment, down to every component
within the environment. The platform dynamically discovers cloud resources and applications by
continuously correlating configuration, user activity, and network traffic data. Combining this deep
understanding of the public cloud environment with data from external sources, such as threat
intelligence feeds and vulnerability scanners, enables Prisma Cloud to produce context around risks.

Prisma Cloud is prepackaged with policies that adhere to industry-standard best practices. You can also
create custom policies based on your organization’s specific needs. The platform continuously monitors
for violations of these policies by existing resources as well any new resources that are dynamically
created. You can easily report on the compliance posture of your public cloud environment to auditors.

Prisma Cloud automatically detects user and entity behavior within the public cloud environment and
management plane. The platform establishes behavior baselines, and it flags any deviations. The platform
computes risk scores—similar to credit scores—for every resource, based on the severity of business risks,
violations, and anomalies. This quickly identifies the riskiest resources and enables you to quantify your
overall security posture.

Prisma Cloud provides the following visibility, detection, and response capabilities:

• Host and container security—Configuration monitoring and vulnerable image detection.

• Network security—Real-time network visibility and incident investigations. Suspicious/malicious


traffic detection.

• User and credential protection—Account and access key compromise detection. Anomalous insider
activity detection. Privileged activity monitoring.

• Configurations and control plane security—Compliance scanning. Storage, snapshots and image
configuration monitoring. Security group and firewall configuration monitoring. IP address
management configuration monitoring.

Continuous Monitoring
The dynamic nature of the cloud creates challenges for risk and compliance professionals tasked with
measuring and demonstrating adherence to security and privacy controls.

View the collected continuous security-monitoring data collected in Prisma Cloud and verify compliance
of your resources to HIPAA, GPDR PCI, NIST, and SOC2 standards. This capability eliminates the manual
component of compliance assessment.

Prisma Cloud provides security and compliance teams with a view into the risks across all their cloud
accounts, services, and regions by automating monitoring, inspection, and assessment of your cloud
infrastructure services. With real-time visibility into the security posture of your environment, you can
identify issues that do not comply with your organization’s required controls and settings and send
automated alerts.

Palo Alto Networks 35


Protecting the Public Cloudwith Prisma Cloud

PRISMA CLOUD STORAGE SECURITY


After your data leaves your network and is stored in the public cloud environment’s storage, in-line
network security devices can’t see access and changes to the data. The Zero Trust security model requires
visibility and control over sensitive data regardless of the data’s location. Building on the Zero Trust
protections at the internet perimeter, Prisma Cloud Storage Security secures the data stored in public
cloud buckets and containers.

Prisma Cloud Storage Security connects directly to storage service’s API. This connection provides
visibility and control over the data. Prisma Cloud Storage Security automatically assesses risk through
content, activity, and security control policies. Content policies scan the content of data for information
that is critical, sensitive, or subject to compliance and assign a risk value. You can mitigate the risk
automatically or manually by quarantining, changing share access, or alerting the owner or an
administrator.

Prisma Cloud Storage Security can manage AWS S3, Google Cloud Storage, and Microsoft Azure, giving you
consistent visibility and control across each.

Palo Alto Networks 36


Summary

Summary
Breaches and data loss have serious consequences for organizations and their customers. Zero Trust is a
security model developed specifically to address the security of sensitive data and critical applications in
an enterprise organization. Zero Trust policy leverages the Palo Alto Networks platforms’ capabilities and
functionality, including:

• PA-Series and VM-Series firewalls provide the inline protection required to segment data from
other applications and endpoints in the network.

• Cortex XDR Agent advanced endpoint protection inspects system process execution and file system
behavior through local and dynamic analysis.

• Prisma Cloud inspects asset accessibility and risk through API integrations into the public cloud
storage services.

• Cortex Data Lake serves as the central cloud-based repository for all security platform data and
logs.

Palo Alto Networks 37


You can use the feedback form to send comments
about this guide.

HEADQUARTERS
Palo Alto Networks Phone: +1 (408) 753-4000
3000 Tannery Way Sales: +1 (866) 320-4788
Santa Clara, CA 95054, USA Fax: +1 (408) 753-4001
http://www.paloaltonetworks.com [email protected]

© 2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our
trademarks can be found at http://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned
herein may be trademarks of their respective companies. Palo Alto Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.

B-000230P-1-20a

You might also like