{"id":104848,"date":"2020-01-16T18:00:54","date_gmt":"2020-01-17T02:00:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=104848"},"modified":"2020-03-26T09:53:03","modified_gmt":"2020-03-26T16:53:03","slug":"cloud-federal-clouds","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/01\/cloud-federal-clouds\/","title":{"rendered":"Getting Cloud Smart: Security for Hybrid and Public Federal Clouds"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cloud first has been the official U.S. federal government strategy since the early 2000s. Since then, agencies have been adopting cloud for many of the same reasons as their commercial counterparts. However, when it comes to securing hybrid and public federal clouds, agencies have historically relied upon an abundance of people and point products. This is problematic at cloud scale \u2013 more people and dozens of point products simply do not work.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In response to this challenge, I am excited to announce that Prisma Cloud has been added to Palo Alto Networks Government Cloud Services, which has achieved the designation of \"In Process\" for the Federal Risk and Authorization Management Program (FedRAMP). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This important milestone will help U.S. government agencies securely adopt public and hybrid cloud by eliminating complexity and delivering consistent security and compliance controls across the entire cloud native technology stack and software development lifecycle.<\/span><\/p>\n<p><b>Stronger Together<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Over the past two years, Palo Alto Networks has strengthened its cloud security portfolio by acquiring several industry-leading cloud security companies. These include:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Product<\/b><\/td>\n<td><b>Key capabilities<\/b><\/td>\n<td><b>DHS Continuous Diagnostics and Mitigation (CDM) Mapping<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Evident.io<\/span><\/td>\n<td><span style=\"font-weight: 400;\">API-based cloud security and compliance<\/span><\/td>\n<td>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Asset management<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">RedLock<\/span><\/td>\n<td><span style=\"font-weight: 400;\">API-based cloud threat detection and response<\/span><\/td>\n<td>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Asset management<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Identity and access management<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Network security management<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Data protection management<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Twistlock<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Container security and compliance<\/span><\/td>\n<td>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Asset management<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Network security management<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">PureSec<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Serverless security<\/span><\/td>\n<td>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Asset management<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Identity and access management<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><div style=\"max-width:100%\" data-width=\"1673\"><span class=\"ar-custom\" style=\"padding-bottom:55.71%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-104850 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2.png\" alt=\"Unified Prisma Cloud Enterprise dashboard, for use with federal clouds\" width=\"1673\" height=\"932\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2.png 1673w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-230x128.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-500x279.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-768x428.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-1536x856.png 1536w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-510x284.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-72x40.png 72w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-539x300.png 539w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image2-874x487.png 874w\" sizes=\"auto, (max-width: 1673px) 100vw, 1673px\" \/><\/span><\/div><\/p>\n<p><b>Figure 1 - Unified Prisma Cloud Enterprise dashboard<\/b><\/p>\n<p><span style=\"font-weight: 400;\">All of the above technologies have been integrated into a unified cloud native security platform, <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\"><span style=\"font-weight: 400;\">Prisma Cloud<\/span><\/a> (Figure 1)<span style=\"font-weight: 400;\">. <\/span><b>Building on this good news is that many government organizations are already benefiting from Prisma capabilities today. <\/b><span style=\"font-weight: 400;\">They are implementing VM-Series virtual firewalls, Twistlock and PureSec (<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cloud-prisma-cloud-compute-edition\/\">now Prisma Cloud Compute Edition<\/a>, part of Prisma Cloud) to secure network traffic, protect containers and serverless functions and enable DevSecOps. Agencies who use Agile software development practices have integrated Prisma Cloud Compute Edition into their continuous integration workflows to find and fix security problems before they ever make it into production. These powerful capabilities allow developers to see vulnerability status every time they run a build (Figure 2), without having to run a separate tool or use a different interface. Security teams can set policies that act as quality control gates to ensure only remediated images progress down the pipeline into production.<\/span><\/p>\n<p><div style=\"max-width:100%\" data-width=\"1688\"><span class=\"ar-custom\" style=\"padding-bottom:68.13%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-104864 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-1.png\" alt=\"Prisma Cloud Compute securing the C\/CD pipeline\" width=\"1688\" height=\"1150\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-1.png 1688w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-1-230x157.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-1-500x341.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-1-768x523.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-1-1536x1046.png 1536w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-1-440x300.png 440w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-1-59x40.png 59w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/image1-1-874x595.png 874w\" sizes=\"auto, (max-width: 1688px) 100vw, 1688px\" \/><\/span><\/div><\/p>\n<p><strong>Figure 2 - Prisma Cloud Compute Edition securing the C\/CD pipeline<\/strong><\/p>\n<p><b>Flexible Deployment Options<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Prisma Cloud Cloud Compute Edition has the flexibility to run locally in Federal data centers and\/or in any tenant of the major cloud platforms including Alibaba, Azure, GCP and AWS. This also means that data sovereignty issues are typically not in play as the platforms can be installed by customers directly in their cloud tenant. When combined with VM-Series virtual firewalls, agencies are able to reap the benefits of Prisma Cloud today while the cloud-delivered service works toward a FedRAMP Moderate Agency Authorization.\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Platform<\/b><\/td>\n<td><b>Data Sovereignty<\/b><\/td>\n<td><b>FedRAMP applicable<\/b><\/td>\n<td><b>SaaS Option?<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Prisma Cloud Enterprise - Government Cloud Services Edition (formerly RedLock and Evident)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Ability to run in specific regions<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Yes<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Prisma Cloud Compute -\u00a0 (formerly Twistlock and PureSec)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Ability to run on-premises or in any cloud tenant<\/span><\/td>\n<td><span style=\"font-weight: 400;\">No\u00a0<\/span><\/td>\n<td><span style=\"font-weight: 400;\">No<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">VM-Series virtual firewalls<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Ability to run on-premises<\/span><\/p>\n<p><span style=\"font-weight: 400;\">or in any cloud tenant\u00a0\u00a0<\/span><\/td>\n<td><span style=\"font-weight: 400;\">No\u00a0\u00a0<\/span><\/td>\n<td><span style=\"font-weight: 400;\">No<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">With <\/span><span style=\"font-weight: 400;\">Palo Alto Networks cloud capabilities, agencies can achieve their missions while improving their cyber resilience with a preventive approach, accelerated incident response and better management of the increasing volume, variety and velocity of cyberattacks across cloud environments.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learn more about how Palo Alto Networks and its cloud products, including Prisma Cloud, can help <a href=\"https:\/\/www.paloaltonetworks.com\/security-for\/government\/federal\">secure federal networks<\/a>.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prisma Cloud has been added to Palo Alto Networks Government Cloud Services, increasing our security offerings for hybrid and public federal clouds. <\/p>\n","protected":false},"author":623,"featured_media":104878,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[484,6768],"tags":[6640,123],"coauthors":[6679],"class_list":["post-104848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","category-secure-the-cloud","tag-fedramp","tag-government2"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/CS-trusting-the-cloud-r2d1-1200x627-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/623"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=104848"}],"version-history":[{"count":12,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104848\/revisions"}],"predecessor-version":[{"id":108471,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104848\/revisions\/108471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/104878"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=104848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=104848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=104848"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=104848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}