Skip to content

Commit 61e2e6b

Browse files
authored
Fix #122: Incorporate PM feedback. (#136)
1 parent cc00a8b commit 61e2e6b

File tree

2 files changed

+12
-3
lines changed

2 files changed

+12
-3
lines changed

admin_guide/compliance/cloud_discovery.adoc

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,10 +43,14 @@ Auto-defend utilizes rule-based policies to automatically deploy Prisma Cloud to
4343
[#_min_perms]
4444
=== Minimum permissions
4545
46-
When creating credentials, Prisma Cloud needs some set of minimum permissions to list all the various resources in use in your account.
47-
After finding those resources, Prisma Cloud needs additional permissions to retrieve those resources and inspect them for vulnerabilities and compliance issues.
46+
Prisma Cloud needs one set of minimum permissions to discover and itemize all the resources in your account.
47+
After finding those resources, Prisma Cloud typically needs an additional set of permissions to protect them (e.g. retrieve those resources and inspect them for vulnerabilities and compliance issues.
48+
49+
For example, the service account for cloud discovery uses the `ecr:DescribeRepositories` permission to list all ECR repositories in your AWS accounts.
50+
If you find a repository that's not being scanned, and you want to configure Prisma Cloud to scan it, Prisma Cloud needs another service account with deeper permissions that lets it auth with the ECR service and download images from the repository (e.g., `ecr:GetAuthorizationToken`, `ecr:BatchGetImage`, etc).
51+
The permissions required for cloud discovery to scan your accounts are documented here.
52+
Permissions required to enable protection (e.g. scanning a repo) are documented in each protection feature's respective article.
4853
49-
These are the minimum set of permissions required for each type of account:
5054
5155
==== AWS
5256

admin_guide/install/install_defender/auto_defend_host.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ After setting up auto-defend for hosts, Prisma Cloud discovers and protects unse
1111

1212
. Discover - Prisma Cloud uses cloud provider APIs to get a list of all VM instances.
1313
. Identify - Prisma Cloud identifies unprotected instances.
14+
. Verify - Ensure unprotected resources meet auto-defend prerequisites.
1415
. Install - Primsa Cloud installs Host Defender on unprotected instances using cloud provider APIs.
1516

1617

@@ -65,6 +66,10 @@ Hosts must have either wget or curl installed.
6566
Auto-defend is supported for stand-alone hosts only, not hosts that are part of clusters.
6667
For hosts that are part of clusters, use one of the cluster-native install options (e.g., DaemonSets on Kubernetes).
6768

69+
NOTE: When configuring the scope of hosts that should be auto-defended, ensure that the scope doesn't include any hosts that are part of a cluster or that run containers.
70+
Auto-defend doesn't currently check if a host is part of cluster.
71+
If you mistakenly include nodes that are part of a cluster in an auto-defend rule, and the cluster is not already protected, the auto-defend rule will deploy Host Defenders to the cluster nodes.
72+
6873

6974
[#_perms]
7075
=== Required permissions

0 commit comments

Comments
 (0)