You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: admin_guide/compliance/serverless.adoc
+42-3Lines changed: 42 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -148,16 +148,55 @@ Console dynamically selects an available Defender to execute the scan job.
148
148
149
149
.. Specify a function name or pattern.
150
150
+
151
-
Wildcards are supported.
151
+
NOTE: Wildcards are supported.
152
152
153
153
.. Select or xref:../authentication/credentials_store.adoc[create credentials] so that Prisma Cloud can access your account.
154
154
155
155
.. Specify a cap for the number of functions to scan.
156
156
+
157
-
Prisma Cloud scans the X most recent functions, where X is the cap value. To scan all functions, set the cap to 0.
157
+
NOTE: Prisma Cloud scans the X most recent functions, where X is the cap value. To scan all functions, set the cap to 0.
158
158
159
+
.. Select *Scan only latest versions* to only scan the latest version of each function. Otherwise, the scanning will cover all versions of each function up to the specified *cap* value.
160
+
161
+
.. Select *Scan Lambda Layers* to enable scanning the function's Layers as well.
162
+
159
163
.. Click *Add*.
160
164
161
-
. Click the save button.
165
+
. Click the *Save* button.
162
166
163
167
. To view the scan report, go to *Monitor > Compliance > Functions*.
168
+
169
+
=== View AWS Lambda Layers scan report
170
+
171
+
Prisma Cloud can scan the AWS Lambda Layers code as part of the Lambda function's code scanning.
172
+
This capability can help you determine whether the Compliance checks are associated with the function or function Layers.
173
+
Follow the steps below to view the Lambda Layers compliance scan results:
174
+
175
+
[.procedure]
176
+
. Open Console.
177
+
178
+
. Make sure you selected the *Scan Lambda layers* in the Defend > Compliance > Functions > Functions > Serverless Accounts > *Function scan scope*
179
+
+
180
+
image::function_scan_scope.png[width=700]
181
+
182
+
. Go to *Monitor > Compliance > Functions > Scanned functions*.
183
+
184
+
. Filter the table to include functions with the desired Layer by adding the *Layers* filter.
185
+
+
186
+
You can also filter the results by a specific layer name or postfix wildcards.
187
+
Example: `Layers:* OR Layers:arn:aws:lambda:*`
188
+
+
189
+
image::comp_layers_filter.png[width=700]
190
+
191
+
. Open the *Function details* dialog to view the details about the Layers and the Compliance issues associated with them:
192
+
193
+
.. Click on a specific function
194
+
195
+
.. See the Function's vulnerabilities, compliance issues and package info in the related tabs. Use the *Found in* column to determine if the component is associated with the Function or with the Function's Layers.
196
+
+
197
+
image::comp_function_details.png[width=700]
198
+
199
+
.. Use the *Layers info* tab to see the full list of the function's the Layers.
Copy file name to clipboardExpand all lines: admin_guide/vulnerability_management/serverless_functions.adoc
+42-7Lines changed: 42 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ Unlike image scanning, all function scanning is handled by Console.
45
45
.. Specify a function name.
46
46
+
47
47
NOTE: Wildcards are supported.
48
-
+
48
+
49
49
.. Select or xref:../authentication/credentials_store.adoc[create credentials] so that Prisma Cloud can access your account.
50
50
+
51
51
* AWS -- Specify either an IAM user credential (access key ID and secret access key) or IAM role.
@@ -55,19 +55,54 @@ NOTE: Wildcards are supported.
55
55
.. Specify a cap for the number of functions to scan.
56
56
+
57
57
NOTE: Prisma Cloud scans the X most recent functions, where X is the cap value. Set this value to `0` to scan all functions.
58
-
+
58
+
59
59
.. Select *Scan only latest versions* to only scan the latest version of each function. Otherwise, the scanning will cover all versions of each function up to the specified *cap* value.
60
-
+
60
+
61
+
.. Select *Scan Lambda Layers* to enable scanning the function's Layers as well.
62
+
61
63
.. Click *Add*.
62
64
63
-
. Click the yellow save button.
64
-
+
65
-
image::save_button.png[width=50]
65
+
. Click the *Save* button.
66
66
67
67
. View the scan report.
68
68
Go to *Monitor > Vulnerabilities > Functions > Scanned functions*.
69
69
70
70
71
+
=== View AWS Lambda Layers scan report
72
+
73
+
Prisma Cloud can scan the AWS Lambda Layers code as part of the Lambda function's code scanning.
74
+
This capability can help you determine whether the vulnerability issues are associated with the function or function Layers.
75
+
Follow the steps below to view the Lambda Layers scan results:
76
+
77
+
[.procedure]
78
+
. Open Console.
79
+
80
+
. Make sure you selected the *Scan Lambda layers* in the Defend > Vulnerabilities > Functions > Functions > Serverless Accounts > *Function scan scope*
81
+
+
82
+
image::function_scan_scope.png[width=700]
83
+
84
+
. Go to *Monitor > Vulnerabilities > Functions > Scanned functions*.
85
+
86
+
. Filter the table to include functions with the desired Layer by adding the *Layers* filter.
87
+
+
88
+
You can also filter the results by a specific layer name or postfix wildcards.
89
+
Example: `Layers:* OR Layers:arn:aws:lambda:*`
90
+
+
91
+
image::function_vuls_layers_filter.png[width=700]
92
+
93
+
. Open the *Function details* dialog to view the details about the Layers and the vulnerabilities associated with them:
94
+
95
+
.. Click on a specific function
96
+
97
+
.. See the Function's vulnerabilities, compliance issues and package info in the related tabs. Use the *Found in* column to determine if the component is associated with the Function or with the Function's Layers.
98
+
+
99
+
image::vul_function_details.png[width=700]
100
+
101
+
.. Use the *Layers info* tab to see the full list of the Function's Layers, and aggregated information about the Layers vulnerabilities. In case that there are vulnerabilities associated with the layer you will be able to expand the layer raw to list all the vulnerabilities.
102
+
+
103
+
image::vuls_functions_layers_info.png[width=700]
104
+
105
+
71
106
=== Authenticating with AWS
72
107
73
108
The serverless scanner is implemented as part of Console.
@@ -95,7 +130,7 @@ endif::prisma_cloud[]
95
130
[.task]
96
131
=== Scanning Azure Functions
97
132
98
-
Azure Functions are architected differently than AWS Lambda and Google Cloud Functions.
133
+
Azure Functions are architected differently than AWS Lambda and Google Cloud Functions.
0 commit comments