Prisma Cloud Privacy
Prisma Cloud Privacy
Prisma Cloud
The purpose of this document is to provide customers of Palo Alto Networks with information needed
to assess the impact of this service on their overall privacy posture by detailing how Personal Data is
captured, processed, and stored by and within the service.
1. Product Summary
Prisma® Cloud is a Cloud-Native Application Protection Platform (CNAPP) that leverages both agent-
based and agentless approach to tap into the cloud providers’ APIs for read-only access to customers’
network traffic, user activity, configuration of systems and services, and correlates these different data
sets to help the cloud compliance and security analytics teams prioritize risks and quickly respond to
issues.
Prisma Cloud’s full-suite provides four (4) different categories of capabilities, composed of different
modules:
1. Cloud Security Posture Management (CSPM): Monitors posture, detects and responds to
threats, and maintains compliance across multi-cloud environments. CSPM includes the
following modules:
● Visibility, Compliance, and Governance module
○ Threat Detection functionality (included in the Visibility, Compliance, and
Governance module)
● Data Security module
If you request customer support for Prisma Cloud, more information on Personal Data processed is
available in the “Support Services, Customer Success and Focused Services Privacy Data Sheet”
available in our Trust Center.
The Threat Detection functionality supports different categories of policies. Personal Data is collected
from various sources, such as audit and network flow logs. Threat Detection processes Personal Data
collected from the Visibility, Compliance, and Governance module (described in Section 2.2) to deliver
Threat Detection capabilities.
Category of
Type of Personal Data Example(s) Purpose of Processing
Personal Data
The Data Security module provides exposure analysis, data classification, malware scanning, and
governance for cloud storage services. This module identifies and detects confidential and sensitive
data by scanning objects (a file and any metadata that describes that file) in your Amazon S3 bucket
and Azure Blob storage for which you have enabled access.
Personal Data will be processed from the Visibility, Compliance, and Governance module (described
in Section 2.2) to deliver Data Security capabilities. The Data Security module also leverages Palo Alto
Networks Data Loss Prevention and WildFire® services for analysis.
IMPORTANT: The type of Personal Data processed by the Data Security module will depend on the
Personal Data (if any) contained in your S3 bucket and Blob storage. For clarity, Palo Alto Networks
Container Security helps secure Kubernetes® and other container platforms on your public clouds.
The WAAS module provides visibility and protection of Web Applications and APIs deployed on cloud
native architecture.
IMPORTANT: The type of Personal Data processed by the WAAS module will depend on the Personal
Data (if any) contained in layer 7 (HTTP) traffic inspected to and from your web application and APIs.
For clarity, Palo Alto Networks will not know the types of Personal Data collected at the moment of
processing. You may use the log scrubbing feature to delete Personal Data.
The IaC Security module provides detection and remediation for cloud security issues present in
infrastructure-as-code files with the use of policies, scan engine and integrations with different
continuous integration and continuous delivery (CI/CD) tools, integrated development environment
(IDEs), and version control systems (VCS). You must grant Prisma Cloud access to your code
repositories.
IMPORTANT: With the exception of the Personal Data listed in Table 7 below, the type of Personal
Data processed by IaC Security module will depend on the Personal Data (if any) contained in your
code. For clarity, Palo Alto Networks will not know the types of Personal Data collected at the moment
of processing.
● Detecting misconfigurations,
risks, compliance, and
remediation of cloud security
issues
Email Address user@company.com
● Setting up version control
integrations
● Determining the number of
users for billing purposes
SCA module provides detection and remediation for vulnerabilities and license compliance issues in
open source packages used in repositories. Customers must grant Prisma Cloud access to its code
repositories.
IMPORTANT: With the exception of the Personal Data listed in Table 8 below, The type of Personal
Data processed by the SCA module will depend on the Personal Data (if any) contained in customers’
source code. For clarity, Palo Alto Networks will not know the types of Personal Data collected at the
moment of processing.
The Secrets Security module can detect sensitive information that is improperly secured inside your
source code repositories. This module’s scans can detect embedded passwords, login tokens, and
other types of secrets. You must grant Prisma Cloud access to your code repositories.
IMPORTANT: The type of Personal Data processed by the Secret Security module will depend on the
Personal Data (if any) contained in your source code. For clarity, Palo Alto Networks will not know the
types of Personal Data collected at the moment of processing.
CI/CD Security module provides continuous end-to-end coverage and visibility of your engineering
environment from source to deployment, allowing security teams to monitor security, analyze the
attack surface, and implement tailored security measures to secure your entire development
environment without disrupting engineering processes. To allow for the use of this module,
Customers must grant Prisma Cloud access to its source code repositories.
IMPORTANT: With the exception of the Personal Data listed in Table 9 below, the type of Personal
Data processed by the CI/CD Security module will depend on the Personal Data (if any) contained in
customers’ source code. For clarity, Palo Alto Networks will not know the types of Personal Data
collected at the moment of processing.
The IAM Security module helps you address the security challenges of managing IAM in cloud
environments. The IAM Security module automatically calculates effective permissions across cloud
service providers, detects overly broad access permissions, and suggests corrections to reach least
privilege entitlements.
The IAM Security module processes Personal Data from the CSPM module activated by you to deliver
CIEM capabilities.
IMPORTANT: With the exception of the Personal Data listed in Table 10 below, the type of Personal
Data processed by the IAM Security module will depend on the types of Personal Data (if any)
contained in the identity permission set. For clarity, Palo Alto Networks will not know the types of
Personal Data collected at the moment of processing.
Table 10: Personal Data Processed Data Processed by IAM Security Module
4. Processing Locations
Data Centers and Third Party Service Providers
Prisma Cloud runs primarily on Amazon Web Services (AWS) data centers, and leverages Google
Cloud Platform (GCP) and Azure data centers for certain particular module(s) as described below.
● Visibility
Australia
Compliance
Canada
and
France
Governance
Germany
● Threat
India
Prevention
All Types Listed in IaaS/PaaS Ireland
● Infrastructure
Section 2 Provider Japan
as Code
Singapore
● Software
United Kingdom
Composition
United States (excludes
Analysis
GovCloud for IaC, SCA and
● Secret
Secrets Security)
Amazon Web Scanning
Services
Germany
(AWS)1 All Types Listed in IaaS/PaaS
● Data Security Singapore
Section 2 Provider
United States
Australia
Canada
France
Germany
All Types Listed in IaaS/PaaS India
● IAM Security
Section 2 Provider Ireland
Singapore
United Kingdom
United States (includes
GovCloud)
Germany
Elasticsearch, All Types Listed in IaaS/PaaS
● CI/CD Security Singapore
Inc Section 2 Provider
United States
1
The processing location where AWS processes Personal Data from will depend on the location of the tenant
chosen by you.
2
The processing location where GCP processes Personal Data from will depend on the location of the tenant
chosen by you.
Australia
Canada
France
Germany
MongoDB All Types Listed in IaaS/PaaS India
● CI/CD Security
Atlas Section 2 Provider Ireland
Japan
Singapore
United Kingdom
United States
Microsoft Germany
All Types Listed in IaaS/PaaS
Azure Cloud ● Data Security Singapore
Section 2 Provider
(Azure)*3 United States
● Infrastructure
as Code
Application
● Software Full name or
monitoring
Composition display name
Coralogix and United States
Analysis Email address
performance
● Secret Username
management
Scanning
● CI/CD Security
Application
analytics and
● All Prisma Full name customer
Pendo.io United States
Cloud Modules Email address notification in
Prisma Cloud
Platform
* Only if you are an existing Azure customer and choose to use the Data Security Module on data hosted in your Azure account.
Customer support for Prisma Cloud will be provided from various locations around the globe. For
more information on these locations, please refer to the “Support Services, Customer Success and
Focused Services Privacy Data Sheet” available in our Trust Center.
3
The processing location where Azure processes Personal Data will be based on the location of your tenant.
Palo Alto Networks will confirm identification before responding to the request. Please note that if, for
whatever reason, we cannot comply with the request, we will provide an explanation. For all users
whose employer is a Palo Alto Networks customer, such users may be redirected to the relevant
customer/employer for a response.
6. Data Portability
Your systems administrators and your authorized users can download any data stored in the Prisma
Cloud console and/or API (which includes your Personal Data).
Upon your written request, Palo Alto Networks can delete such Personal Data within 60 days.
● The Trust 360 Program details the corporate-wide security, compliance, and privacy controls
in place to protect our customers’ most sensitive data.
● Palo Alto Networks Information Security Measures document details the technical and
organizational measures that will be implemented by us to secure systems, processes and
data. This document forms part of Palo Alto Networks Data Protection Agreement.
3000 Tannery Way © 2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto
Santa Clara, CA 95054 Networks.
A list of our trademarks can be found at
Main: +1.408.753.4000
https://www.paloaltonetworks.com/company/trademarks.html.
Sales: +1.866.320.4788
All other marks mentioned herein may be trademarks of their respective companies.
Support: +1.866.898.9087
www.paloaltonetworks.com