UCF STIG Viewer Logo

Prisma Cloud Compute must protect the confidentiality and integrity of transmitted information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-253548 CNTR-PC-001390 SV-253548r840482_rule Medium
Description
Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. Communication paths outside the physical protection of a controlled boundary are exposed to the possibility of interception and modification. Protecting the confidentiality and integrity of organizational information can be accomplished by physical means (e.g., employing physical distribution systems) or by logical means (e.g., employing cryptographic techniques). If physical means of protection are employed, then logical means (cryptography) do not have to be employed, and vice versa.
STIG Date
Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide 2022-08-24

Details

Check Text ( C-57000r840480_chk )
Navigate to Prisma Cloud Compute Console's >> Manage >> System >> General tab.

Inspect the Telemetry section.

If "Share telemetry on product usage with Palo Alto Networks" is "On", this is a finding.

If "Allow admins and operators to upload logs to Customer Support directly from Console UI" is "On", this is a finding.
Fix Text (F-56951r840481_fix)
Navigate to Prisma Cloud Compute Console's >> Manage >> System >> General tab.

In the Telemetry section:

Set "Share telemetry on product usage with Palo Alto Networks" to "Off".

Set "Allow admins and operators to upload logs to Customer Support directly from Console UI" to "Off".

Click "Save".