* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * [Cybersecurity](https://origin-researchcenter.paloaltonetworks.com/blog/category/cybersecurity-2/) * The Cybersecurity Canon: ... # The Cybersecurity Canon: Tallinn Manual on the International Law Applicable to Cyber Warfare [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2015%2F07%2Fthe-cybersecurity-canon-tallinn-manual-on-the-international-law-applicable-to-cyber-warfare%2F) [](https://twitter.com/share?text=The+Cybersecurity+Canon%3A+Tallinn+Manual+on+the+International+Law+Applicable+to+Cyber+Warfare&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2015%2F07%2Fthe-cybersecurity-canon-tallinn-manual-on-the-international-law-applicable-to-cyber-warfare%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2015%2F07%2Fthe-cybersecurity-canon-tallinn-manual-on-the-international-law-applicable-to-cyber-warfare%2F&title=The+Cybersecurity+Canon%3A+Tallinn+Manual+on+the+International+Law+Applicable+to+Cyber+Warfare&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/2015/07/the-cybersecurity-canon-tallinn-manual-on-the-international-law-applicable-to-cyber-warfare/&ts=markdown) \[\](mailto:?subject=The Cybersecurity Canon: Tallinn Manual on the International Law Applicable to Cyber Warfare) Link copied By [Robert Clark](https://www.paloaltonetworks.com/blog/author/robert-clark/?ts=markdown "Posts by Robert Clark") Jul 09, 2015 9 minutes [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [cyber warfare](https://www.paloaltonetworks.com/blog/tag/cyber-warfare/?ts=markdown) [cybersecurity canon](https://www.paloaltonetworks.com/blog/tag/cybersecurity-canon/?ts=markdown) [Robert Clark](https://www.paloaltonetworks.com/blog/tag/robert-clark/?ts=markdown) [Tallinn Manual](https://www.paloaltonetworks.com/blog/tag/tallinn-manual/?ts=markdown) [](https://www.paloaltonetworks.com/threat-research/cybercanon.html) [![cybersec canon red](https://www.paloaltonetworks.com/blog/wp-content/uploads/2015/07/cybersec-canon-red-500x218.png)](https://www.paloaltonetworks.com/threat-research/cybercanon.html) *We modeled the Cybersecurity Canon after the Baseball or Rock \& Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. [Please write a review and nominate your favorite](https://paloaltonetworks.com/threat-research/cybercanon/nominate-a-book.html).* *The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Please do so!* **Book Review by [Canon Committee Member, Robert Clark](https://www.paloaltonetworks.com/threat-research/cybercanon/cyber-security-canon-bios.html):** *Tallinn Manual on the International Law Applicable to Cyber Warfare* ### Executive Summary The director of this project states it best: *\[T\]he product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five* *'* *black-letter rules* *'* *(95 rules) governing such conflicts. It addresses topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality. An extensive commentary accompanies each rule, which sets forth each rule's basis in treaty and customary law, explains how the Group of Experts interpreted applicable norms in the cyber context, and outlines any disagreements within the group as to each rule's application.*\[1\] Key to understanding this application of international law to cyberspace operations is understanding what the*Tallinn Manual* is not. It is not a commentary on cyber activities that occur below the level of a 'use of force' as set forth in the UN Charter, such as cyber criminality; moreover, it only comments on the legality of cyber intelligence activities as they relate to the issues of 'use of force' or 'armed attack.' \[2\] Also, the *Tallinn Manual* recognizes that cyber espionage and theft of intellectual property pose real and serious threats to all states, as well as corporations and private individuals, but it is not the aim of the authors to address such matters. \[3\] Cybersecurity Canon candidate books are supposed to be essential to the cybersecurity practitioner. As a practicing computer network operational attorney, this book is not only required reading: it is malpractice if you don't read it. Similarly, for technologists and cybersecurity practitioners, it is a must read, particularly after the redefining of computer network defense roles due to the Sony cyberattack. \[4\] To understand the various authorities of the multiple disciplines involved in computer network defense requires, first and foremost, an understanding of the incidents, intrusions, use of force, and yes, attacks that occur in cyberspace. The*Tallinn Manual* provides an essential education into these legal differences. ### About the People The*Tallinn Manual* was drafted by an "International Group of Experts," including distinguished legal academics and practitioners, supported by a team of technical experts. \[5\] A select group of peer reviewers offered comments on the various drafts, as did a number of states that were willing to informally and unofficially do so. \[6\] The initial criticism of the*Tallinn Manual* focuses on the fact that \[T\]he legal experts that wrote it have distinctly American and Old European backgrounds.\[7\] Similarly, others noted the absence and criticism of China or the Russian Federation. \[8\] The Russian authorities have taken a very guarded view of the *Manual*. Moscow thinks its publication is a step toward legitimizing the concept of cyberwars. \[9\] Moreover, it is hard to overlook that there was a complete lack of scientists from the former Warsaw Pact countries among the legal experts partaking in the project. It seems that despite there being a NATO competence centre in Tallinn, the leaders of the project seem to think that there is not much competence in international law in the area. Even if we excluded the Baltic states -- was it really impossible to find top-level legal experts from Poland, Hungary, the Czech Republic or Slovakia who could have had a say on the topics of the legality of the use of armed force, international humanitarian law, and the responsibility of the state? \[10\] This criticism did note: *\[N\]obody is forbidding other countries from starting their own science projects or telling the scientists who were not invited to Tallinn not to write and express their opinions. \[11\] A point emphasized by the "Experts" as they "assessed that there has been huge interest in the Manual since it came out, but that the Manual reflected* *"* *all reasonable positions* *"* *on the issues it took up and that there were only a few amendments worth pondering.*\[12\] ### The Story The main tenet of the*Tallinn Manual* is that cyber warfare is governed by international law already in force, particularly the rules that regulate the commencement of an armed attack (jus ad bellum, UN charter, mostly effective since 1945) and the rules that regulate the conduct of armed conflict (jus in bello, including, for example, The Hague Convention of 1899 and the Geneva Convention of 1949, the latter with the 1977 amendment protocols). \[13\] (The *Manual* has a great compendium of international law of armed conflict or international humanitarian law.) \[14\] The *Manual* consists of 95 rules and accompanying commentary. The rules set forth the International Group of Experts' conclusions (black-letter rules) as to the broad principles and specific norms that apply in cyberspace. The accompanying commentary indicates the rules' legal basis, applicability in international and non-international armed conflicts, and normative content. Also included are differing or opposing positions among the Experts. This is important because several complex issues produced debates amongst the Experts. The*Manual's* editors attempted to capture all of the views expressed in the deliberations, as well as other reasonable positions that they were aware of from outside the group. \[15\] While covering all of the salient portions of the*Manual* is far beyond the scope of this review, I will concur with other reviewers who noted: *Particular attention was paid to terminology. An array of terms has been employed in, and beyond the legal literature: computer network attack, computer network exploitation, cyber attack, cyber operation, cyberspace operation, cyber incident, cyber terrorism, cyber conflict etc. To circumvent this semantic inconsistency, the Tallinn Manual operates with four key notions. First, a* *"* *cyber operation* *"* *connotes the employment of cyber capabilities for achieving a particular objective, and is one of the few terms that is not derived from a legal term with a concrete meaning. Next, a* *"* *cyber use of force* *"* *and* *"* *cyber armed attack* *"* *are cyber operations that rise to the levels of a use of force, and armed attack, in the way those terms are used in Articles 2(4) and 51 of the UN Charter, respectively. Lastly, a* *"* *cyber attack* *"* *carries the meaning of an attack, as defined in Article 49(1) of Additional Protocol I to the Geneva Conventions; its usage is restricted to the law of armed conflict analysis. This consolidation of legal terminology allows for a reduced number of terms to be used consistently throughout the book, contributing to the clarity of the positions expressed therein.*\[16\] ### Conclusion The *Tallinn* *Manual* is not just a worthy book for the Canon candidate list; it is a must for induction into the Canon proper, both for lawyers and policymakers (non-techies) and for techies in the community. As pointed out: *\[T\]he Manual is designed as a reference tool for State legal advisors, policymakers, and operational planners, although scholars and students will hopefully find it useful as well. NATO CCD COE has launched a three-year follow-on project,* *'* *Tallinn 2.0,* *'* *that will expand the scope of the Tallinn Manual. The Tallinn Manual is strictly an expression of opinions of the International Group of Experts, and, as such, does not represent the official positions of the Centre or NATO. This will also be the status of Tallinn 2.0* *.*\[17\] Still, others observe: *\[T\]he intense interest in developing clearer international norms to regulate different facets of cyber activity is running up against two hard facts. The first is that some states, especially those with sophisticated cyber capacities, such as the United States, are content to state at a general level that they will apply existing, general international rules to cyber. But these states have limited incentives to reveal in any detail HOW they apply those norms. The second is that the major cyber players (Russia, China, and the United States) remain on different conceptual pages as to how to proceed.*\[18\] Whatever the focus and direction Tallinn 2.0 takes, this version is a must read, and when 2.0 is released, at least I'll have more material to include in the Canon process! ### Sources 1. See, Excerpt From: Schmitt (Editor). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, 2013, loc 3 of 7915, Kindle Ed. 2. See, Excerpt From: Schmitt (Editor). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, 2013, p. 3 of 282, Kindle Ed. 3. See, Excerpt From: Schmitt (Editor). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, 2013, p. 4 of 282, Kindle Ed. 4. DHS Chief to Companies: Prepare Yourselves for Cyber Attacks, [http://www.weeklystandard.com/blogs/dhs-chief-companies-prepare-yourselves-cyber-attacks\_821904.html](http://www.weeklystandard.com/blogs/dhs-chief-companies-prepare-yourselves-cyber-attacks_821904.html) 5. Michael N. Schmitt, International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed, 54 Harvard Journal of International Law 13, 2012, p. 14--15, [http://www.harvardilj.org/wp-content/uploads/2012/12/HILJ-Online\_54\_Schmitt.pdf](http://www.harvardilj.org/wp-content/uploads/2012/12/HILJ-Online_54_Schmitt.pdf). 6. Michael N. Schmitt, International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed, 54 Harvard Journal of International Law 13, 2012, p 15, [http://www.harvardilj.org/wp-content/uploads/2012/12/HILJ-Online\_54\_Schmitt.pdf](http://www.harvardilj.org/wp-content/uploads/2012/12/HILJ-Online_54_Schmitt.pdf). 7. Lauri Mälksoo, The Tallinn Manual as an international event found at [http://www.diplomaatia.ee/en/article/the-tallinn-manual-as-an-international-event/](http://www.diplomaatia.ee/en/article/the-tallinn-manual-as-an-international-event/). 8. See Lauri Mälksoo, The Tallinn Manual as an international event found at [http://www.diplomaatia.ee/en/article/the-tallinn-manual-as-an-international-event/](http://www.diplomaatia.ee/en/article/the-tallinn-manual-as-an-international-event/) citing For example see Elena Chernenko, Virtual'nyi front, Kommersant Vlast' 27.05.2013,[http://www.kommersant.ru/doc/2193838](http://www.kommersant.ru/doc/2193838), p14; Ashley Deeks, Tallinn 2.0 and a Chinese View on the Tallinn Process, May 31, 2015 found at [http://www.lawfareblog.com/2015/05/tallinn-2-0-and-a-chinese-view-on-the-tallinn-process/](http://www.lawfareblog.com/2015/05/tallinn-2-0-and-a-chinese-view-on-the-tallinn-process/). 9. Elena Chernenko, Russia warns against NATO document legitimizing cyberwars May 29, 2013, Kommersant-‐Vlast found at [http://rbth.com/international/2013/05/29/russia\_warns\_against\_nato\_document\_ legitimizing\_cyberwars\_26483.html](http://rbth.com/international/2013/05/29/russia_warns_against_nato_document_legitimizing_cyberwars_26483.html). 10. Lauri Mälksoo, The Tallinn Manual as an international event found at [http://www.diplomaatia.ee/en/article/the-tallinn-manual-as-an-international-event/](http://www.diplomaatia.ee/en/article/the-tallinn-manual-as-an-international-event/). 11. Id. 12. Ashley Deeks, Tallinn 2.0 and a Chinese View on the Tallinn Process, May 31, 2015 found at [http://www.lawfareblog.com/2015/05/tallinn-2-0-and-a-chinese-view-on-the-tallinn-process/](http://www.lawfareblog.com/2015/05/tallinn-2-0-and-a-chinese-view-on-the-tallinn-process/). 13. Lauri Mälksoo, The Tallinn Manual as an international event found at [http://www.diplomaatia.ee/en/article/the-tallinn-manual-as-an-international-event/](http://www.diplomaatia.ee/en/article/the-tallinn-manual-as-an-international-event/). 14. See, Excerpt From: Schmitt (Editor). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, 2013, loc 209 - 351 of 7915, Kindle Ed. 15. Liis Vihul, The Tallinn Manual on the International Law applicable to Cyber Warfare Published on April 15, 2013 found at [http://www.ejiltalk.org/the-tallinn-manual-on-the-international-law-applicable-to-cyber-warfare/](http://www.ejiltalk.org/the-tallinn-manual-on-the-international-law-applicable-to-cyber-warfare/). 16. Id. 17. Id. 18. Ashley Deeks, Tallinn 2.0 and a Chinese View on the Tallinn Process, May 31, 2015 found at [http://www.lawfareblog.com/2015/05/tallinn-2-0-and-a-chinese-view-on-the-tallinn-process/](http://www.lawfareblog.com/2015/05/tallinn-2-0-and-a-chinese-view-on-the-tallinn-process/). ### References Michael N. Schmitt (Editor). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, 2013. 300 p. *** ** * ** *** ## Related Blogs ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Cybersecurity Canon Candidate Book Review: "Abundance: The Future Is Better Than You Think](https://origin-researchcenter.paloaltonetworks.com/blog/2018/09/cybersecurity-canon-candidate-book-review-abundance-future-better-think/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### The Cybersecurity Canon - American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road](https://origin-researchcenter.paloaltonetworks.com/blog/2018/01/cybersecurity-canon-american-kingpin-epic-hunt-criminal-mastermind-behind-silk-road/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### We're Down to the Last Two Contestants In the 2018 Cybersecurity Canon People's Choice Awards!](https://origin-researchcenter.paloaltonetworks.com/blog/2017/10/last-two-contestants-2018-cybersecurity-canon-peoples-choice-awards/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### 2018 Cybersecurity Canon People's Choice Awards: The Final Four](https://origin-researchcenter.paloaltonetworks.com/blog/2017/10/2018-cybersecurity-canon-peoples-choice-awards-final-four/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### 2018 Cybersecurity Canon People's Choice Awards: Vote Now for Round 3](https://origin-researchcenter.paloaltonetworks.com/blog/2017/10/2018-cybersecurity-canon-peoples-choice-awards-vote-now-round-3/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### 2018 Cybersecurity Canon People's Choice Awards -- Round 2: Did Your Favorites Make the Cut?](https://origin-researchcenter.paloaltonetworks.com/blog/2017/10/2018-cybersecurity-canon-peoples-choice-awards-round-2-favorites-make-cut/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language