Remove tag prisma-access
article thumbnail

The GitHub Actions Worm: Compromising GitHub Repositories Through the Actions Dependency Tree

Prisma Clud

Get an in-depth look at the attack vectors, technical details and a real-world demo in this blog post highlighting our latest research. Is the GITHUB_TOKEN as accessible as other secrets? This token, in other words, can be accessed from any job in the workflow, even if the workflow doesn’t reference it. Reference a tag.

Malware 144
article thumbnail

Unpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflows

Prisma Clud

As we discussed in the previous blog post, Third-Party GitHub Actions: Effects of an Opt-Out Permission Model , the permissive nature of GitHub Actions workflows is prevalent throughout the open-source community and private projects on GitHub. Figure 3: Pyupio/safety’s action.yaml file pulls a mutable image with the ‘latest’ tag.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Our Latest Open Source Innovation, Yor: Automated IaC Tag and Trace

Palo Alto Networks

To make that process easier to navigate, many organizations leverage cloud tagging as a scalable way to attribute cloud resources to organizational owners. Tags can simplify operational tasks, cost allocation, access control, automation and risk management. Introducing Yor for Automatic IaC Tagging.

article thumbnail

Manage a Remote SOC: Playbooks for Monitoring Remote User Activity

Palo Alto Networks

In this installment of our Manage a Remote SOC series , we want to share some soon-to-be-released Cortex XSOAR playbooks leveraging our Prisma Access integration to help you monitor traffic and maintain connectivity uptime for all of your remote users. These playbooks can: Whitelist egress IPs in your cloud services automatically.

article thumbnail

Cloud-Native Abstraction and Automation

Palo Alto Networks

Examples of abstracted solutions include Terraform for infrastructure provisioning, Ansible for configuration management, and Cloud-Native Application Protection Platform’s (CNAPP), like Prisma Cloud that supports all cloud service providers. The post Cloud-Native Abstraction and Automation appeared first on Palo Alto Networks Blog.

Cloud 48
article thumbnail

Securing Golden Images at Build Using Prisma Cloud

Prisma Clud

As shown in figure 1, when the build process begins, Packer first connects to HashiCorp Vault to get the Prisma Cloud credentials and other sensitive information. Let’s walk through a demo of how you can use Prisma Cloud and HashiCorp Packer to secure your golden images. Navigate to Compute → Manage → Collections and Tags.

Cloud 52
article thumbnail

Prisma Cloud Integration With AWS IAM Identity Center and AWS Tag Support

Prisma Clud

Prisma Cloud helps AWS customers have a deeper view into entitlements and enforce consistent, least-privilege access for all users accessing AWS infrastructure. The cloud infrastructure entitlement management ( CIEM ) capabilities built into Prisma Cloud help customers reduce identity risks. Why AWS IAM Identity Center?

AWS 52