To retrieve Prisma Cloud Console images using basic authentication, the correct procedure involves accessing the registry at registry.paloaltonetworks.com and authenticating using 'docker login'. After authentication, the images can be retrieved using 'docker pull.' This process ensures that the console images are obtained from the correct source and follows the proper steps for basic authentication.
Run policies monitor resources, and check for potential issues after these cloud resources are deployed. Build policies enable you to check for security misconfigurations in the IaC templates and ensure that these issues do not get into production.
When the security team chooses to Relearn on an image, the existing model is retained, and any new behavior observed during the new learning period will be added to the existing model. This process is additive, meaning the existing static and behavioral modeling remains in place while new information gets incorporated.
To prevent alerts from being generated by traffic originating from trusted internal networks, use the 'Trusted Alert IP Addresses' setting. This allows you to add IP address ranges or CIDR blocks that represent your trusted internal networks. Alerts will not be generated for traffic from these trusted addresses, effectively reducing false positives and helping to focus on real threats.
The SecOps lead should use the Incident Explorer page and Monitor > Events > Container Audits to investigate the runtime aspects of the attack. Incident Explorer provides a detailed view of security incidents, and Container Audits allow for monitoring and investigating events related to container activities. These are the most appropriate tools for examining suspicious runtime behavior and potential data exfiltration attempts.