UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

All Prisma Cloud Compute users must have a unique, individual account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-253535 CNTR-PC-000510 SV-253535r960969_rule Medium
Description
Prisma Cloud Compute does not have a default account. During installation, the installer creates an administrator. This account can be removed once other accounts have been added. To ensure accountability and prevent unauthenticated access, users must be identified and authenticated to prevent potential misuse and compromise of the system.
STIG Date
Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-56987r840441_chk )
Confirm there is only one "break glass" local administrative account.

Navigate to Prisma Cloud Compute Console's Manage >> Authentication >> Users tab.

Only the administrative break glass account is allowed to have Authentication Method = Local.

For all other accounts, Authentication Method = SAML.

If any local account, except the administrative break glass account, has Authentication Method set to other than "SAML", this is a finding.
Fix Text (F-56938r840442_fix)
Navigate to Prisma Cloud Compute Console's >> Manage >> Authentication >> Users tab.

Ensure only the break glass administrator account is a "local" account.

Delete all other local accounts and use the SAML identity provider for all authentication and authorization to the Prisma Cloud Compute Console.