* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * IaC # Palo Alto Networks ## IaC [![How To Prevent the 5 Most Common Software Supply Chain Weaknesses](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/05/Hive-Mind.jpg)](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/common-software-supply-chain-weaknesses/) [How To Prevent the 5 Most Common Software Supply Chain Weaknesses \-----------------------------------------------------------------](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/common-software-supply-chain-weaknesses/) Learn the basics of software supply chain security and 7 best practices to protect yourself against common software supply chain weaknesses. [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) Jun 13, 2023 By [Chris Tozzi](https://www.paloaltonetworks.com/blog/author/chris-tozzi/?ts=markdown "Posts by Chris Tozzi") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** ![Visualizing Your CI/CD Ecosystem From an Attacker’s Perspective](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/03/Explaining.jpg) [Application Security](https://www.paloaltonetworks.com/blog/category/application-security/?ts=markdown), [AppSec](https://www.paloaltonetworks.com/blog/cloud-security/category/appsec/?ts=markdown) ## [Visualizing Your CI/CD Ecosystem From an Attacker's Perspective](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/visualizing-ci-cd-ecosystem-from-attackers-perspective/) Discover key CI/CD security insights and challenges our threat researchers uncovered as they explored the interconnected nature of CI/CD ecosystems and engineered CI/CD graphs. Jun 07, 2023 By [Leon Goldberg](https://www.paloaltonetworks.com/blog/author/leon-goldberg/?ts=markdown "Posts by Leon Goldberg") ![Shift Left Secrets Security: How to Prioritize Secrets Risks](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2021/08/state-of-hybrid-workforce-security-nav-promo-card-583x630-1.jpg) [Application Security](https://www.paloaltonetworks.com/blog/category/application-security/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [Shift Left Secrets Security: How to Prioritize Secrets Risks](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/shift-left-secrets-security-risk-prioritization/) Exposed credentials in your repositories can lead to unauthorized network access. Learn how to detect and remediate your exposed secrets with Checkov.... Jun 01, 2023 By [Steve Giguere](https://www.paloaltonetworks.com/blog/author/steve-giguere/?ts=markdown "Posts by Steve Giguere") ![Top 6 Considerations for Integrating Cloud Security and GitOps](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/01/Man-working-1.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Top 6 Considerations for Integrating Cloud Security and GitOps](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/6-considerations-for-integrating-cloud-security-and-gitops/) Learn how to leverage GitOps to continuously enforce cloud security guardrails as infrastructure is developed, delivered, and deployed. Apr 27, 2023 By [Taylor Smith](https://www.paloaltonetworks.com/blog/author/taylor-smith/?ts=markdown "Posts by Taylor Smith") ![The Top 5 Secrets Management Mistakes and How to Avoid Them](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/08/ASM-products-compare.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/category/devsecops/?ts=markdown) ## [The Top 5 Secrets Management Mistakes and How to Avoid Them](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/5-secrets-management-mistakes/) Learn 5 common secrets management mistakes developers make while working with passwords, API keys, tokens, and other secrets. Apr 13, 2023 By [Nick Sirris](https://www.paloaltonetworks.com/blog/author/nick-sirris/?ts=markdown "Posts by Nick Sirris") ![Enhanced Pull Request Comments: Empower Developers to Ship Code That’s Secure by Default](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/04/Getting-it-Done-1.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/category/devsecops/?ts=markdown) ## [Enhanced Pull Request Comments: Empower Developers to Ship Code That's Secu...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/pull-request-comments-enhancements/) Discover how pull request comments put security in the hands of developers with Prisma Cloud Apr 04, 2023 By [Jonathan Bregman](https://www.paloaltonetworks.com/blog/author/jonathan-bregman/?ts=markdown "Posts by Jonathan Bregman") ![Top 5 DevSecOps Tools to Help You Ship Secure Code Fast](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/01/Brainstorm.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/category/devsecops/?ts=markdown) ## [Top 5 DevSecOps Tools to Help You Ship Secure Code Fast](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/top-5-devsecops-tools-ship-secure-code-fast/) Learn the top 5 DevSecOps tools you need to ship secure code fast and discover how to empower your team with frictionless, consolidated security. Mar 17, 2023 By [Guy Eisenkot](https://www.paloaltonetworks.com/blog/author/guy-eisenkot/?ts=markdown "Posts by Guy Eisenkot") and [Jonathan Bregman](https://www.paloaltonetworks.com/blog/author/jonathan-bregman/?ts=markdown "Posts by Jonathan Bregman") ![How to Think About DevSecOps for a Secure Future](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2021/02/Man-Showing-Server-Room.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/category/devsecops/?ts=markdown) ## [How to Think About DevSecOps for a Secure Future](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/how-to-think-about-devsecops-for-a-secure-future/) Despite the technological advances of recent years (or perhaps because of them), the number of threats on the internet continues to rise. In fact, a 2022 survey from ThoughtLab found that the number of breaches... Feb 16, 2023 By [Glenn Wilson](https://www.paloaltonetworks.com/blog/author/glenn-wilson/?ts=markdown "Posts by Glenn Wilson") ![It’s Not All Bad! Using Cloud Drift for Teachable Moments](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/04/Smiling-Man-2.jpg) [Code Security](https://www.paloaltonetworks.com/blog/cloud-security/category/code-security/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/category/devsecops/?ts=markdown) ## [It's Not All Bad! Using Cloud Drift for Teachable Moments](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/using-cloud-drift-for-teachable-moments/) Stack Overflow's 2021 Developer Survey found that 54% of developers use AWS, yet only 7% use Terraform. That means that far more developers have adopted provisioning, managing and decommissioning cloud infrastr... Feb 14, 2023 By [Taylor Smith](https://www.paloaltonetworks.com/blog/author/taylor-smith/?ts=markdown "Posts by Taylor Smith") ![The Key to DevSecOps Success: Cross-Team Knowledge Sharing](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/06/In-All-Seriousness.jpg) [Code Security](https://www.paloaltonetworks.com/blog/cloud-security/category/code-security/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/category/devsecops/?ts=markdown) ## [The Key to DevSecOps Success: Cross-Team Knowledge Sharing](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/the-key-to-devsecops-success-cross-team-knowledge-sharing/) A good DevSecOps strategy goes beyond having the right tools and processes in place: it requires consistent and crucially, bi-directional feedback and learning. Both security and e... Feb 02, 2023 By [Taylor Smith](https://www.paloaltonetworks.com/blog/author/taylor-smith/?ts=markdown "Posts by Taylor Smith") ![From Manifest to Workload: Embedding Kubernetes Security at Each Phase of the DevOps Lifecycle](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2023/01/ASM-cyber-resilience.jpg) [Code Security](https://www.paloaltonetworks.com/blog/cloud-security/category/code-security/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/category/devsecops/?ts=markdown) ## [From Manifest to Workload: Embedding Kubernetes Security at Each Phase of t...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/devops-lifecycle-embedding-kubernetes-security/) Part of the answer is to identify and address security risks within the various components of Kubernetes itself as well as their configurations. You can do this by, for example, va... Jan 24, 2023 By [Chris Tozzi](https://www.paloaltonetworks.com/blog/author/chris-tozzi/?ts=markdown "Posts by Chris Tozzi") ![Exposed Credentials Across the DevSecOps Pipeline: 5 Places Secrets Hide in Plain Sight](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/10/iStock-1194430859-edit-1280x1280-1.jpeg) [Code Security](https://www.paloaltonetworks.com/blog/cloud-security/category/code-security/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/category/devsecops/?ts=markdown) ## [Exposed Credentials Across the DevSecOps Pipeline: 5 Places Secrets Hide in...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/exposed-credentials-across-the-devsecops-pipeline/) Developers leverage hardcoded credentials to seamlessly access or authenticate the services needed to build and deploy applications. While this practice streamlines development, it... Jan 17, 2023 By [Julia Benson](https://www.paloaltonetworks.com/blog/author/julia-benson/?ts=markdown "Posts by Julia Benson") ![Crawl, Walk, Run: Operationalizing Your IaC Security Program](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/11/Right-There.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Crawl, Walk, Run: Operationalizing Your IaC Security Program](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/how-to-implement-an-infrastructure-as-code-security-program/) Learn how to operationalize your infrastructure as code security program with our rollout timeline and guidance for your first ninety days. Jan 10, 2023 By [Mike Urbanski](https://www.paloaltonetworks.com/blog/author/mike-urbanski/?ts=markdown "Posts by Mike Urbanski") ![How To Prevent the IaC Misconfiguration Snowball Effect](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/12/Skyscraper-with-a-Twist.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [How To Prevent the IaC Misconfiguration Snowball Effect](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/iac-misconfiguration-snowball-effect/) See why one infrastructure as code (IaC) misconfiguration can snowball into thousands of security alerts, and learn how proactive, embedded IaC security can help you mitigate this problem. Jan 03, 2023 By [Payton O'Neal](https://www.paloaltonetworks.com/blog/author/payton-oneal/?ts=markdown "Posts by Payton O’Neal") ![Infrastructure Security Advantages of Leveraging Kubernetes](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/11/F-WFH.jpg) [Containers](https://www.paloaltonetworks.com/blog/category/containers/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [Infrastructure Security Advantages of Leveraging Kubernetes](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/advantages-of-kubernetes-infrastructure-security/) Kubernetes offers several built-in security features as well as the opportunity to shift infrastructure security left and embrace DevSecOps. Nov 22, 2022 By [Faith Kilonzi](https://www.paloaltonetworks.com/blog/author/faith-kilonzi/?ts=markdown "Posts by Faith Kilonzi") ![Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App to Infra](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2021/08/Cityscape.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App ...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/infrastructure-as-code-security-and-appsec-streamlined-devsecops/) Learn how to get streamlined DevSecOps when you consolidate AppSec and infrastructure as code security. Nov 15, 2022 By [Chris Tozzi](https://www.paloaltonetworks.com/blog/author/chris-tozzi/?ts=markdown "Posts by Chris Tozzi") ![6 Key Kubernetes DevSecOps Principles: People, Processes, Technology](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/10/WFH-Woman-1.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [6 Key Kubernetes DevSecOps Principles: People, Processes, Technology](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/kubernetes-devsecops-principles/) Learn 6 key principles to keep in mind when developing a Kubernetes DevSecOps strategy---from embedding the right processes across the application lifecycle to measuring the right KP... Nov 08, 2022 By [Faith Kilonzi](https://www.paloaltonetworks.com/blog/author/faith-kilonzi/?ts=markdown "Posts by Faith Kilonzi") ![9 Essential Infrastructure Security Considerations for Kubernetes](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2021/07/Zero-Trust.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [9 Essential Infrastructure Security Considerations for Kubernetes](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/kubernetes-infrastructure-security-considerations/) Learn 9 security best practices to keep in mind while building out your Kubernetes architecture with Infrastructure as Code (IaC). Oct 20, 2022 By [Chris Tozzi](https://www.paloaltonetworks.com/blog/author/chris-tozzi/?ts=markdown "Posts by Chris Tozzi") ![Secure Vulnerable Images Found in IaC Templates With Prisma Cloud](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/01/Getting-it-Done.jpg) [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) ## [Secure Vulnerable Images Found in IaC Templates With Prisma Cloud](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/secure-vulnerable-images-in-iac-templates-with-prisma-cloud/) Learn how to proactively identify and scan vulnerable images sourced in IaC and CI/CD files with Prisma Cloud's new Image Referencer capability. Oct 18, 2022 By [Taylor Smith](https://www.paloaltonetworks.com/blog/author/taylor-smith/?ts=markdown "Posts by Taylor Smith") ![Full-Stack Code Visibility With Prisma Cloud Software Bill of Materials (SBOM) Generation](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2021/10/Should-be-Mac.jpg) [Code Security](https://www.paloaltonetworks.com/blog/cloud-security/category/code-security/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/category/devsecops/?ts=markdown) ## [Full-Stack Code Visibility With Prisma Cloud Software Bill of Materials (SB...](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/full-stack-visibility-with-software-bill-of-materials-generation/) Learn how to get visibility into risk exposure and prevent supply chain attacks with software bill of materials (SBOM) generation capabilities. Oct 05, 2022 By [Taylor Smith](https://www.paloaltonetworks.com/blog/author/taylor-smith/?ts=markdown "Posts by Taylor Smith") ![AppSec and CloudSec 101: Blurring the Lines Between Cloud-Native App Layers](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/uploads/2022/08/So-Tall.jpg) [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [DevSecOps](https://www.paloaltonetworks.com/blog/cloud-security/category/devsecops/?ts=markdown) ## [AppSec and CloudSec 101: Blurring the Lines Between Cloud-Native App Layers](https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/application-infrastructure-security-101-blurring-cloud-native-app-layers/) Get tips for leveraging infrastructure as code to maintain cohesive application and infrastructure security for your cloud-native teams. Sep 28, 2022 By [Chris Tozzi](https://www.paloaltonetworks.com/blog/author/chris-tozzi/?ts=markdown "Posts by Chris Tozzi") Load more blogs Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language