STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide

V-253545

CAT II (Medium)

Prisma Cloud Compute Defender must reestablish communication to the Console via mutual TLS v1.2 WebSocket session.

Rule ID

SV-253545r986174_rule

STIG

Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-002036

Discussion

When the secure WebSocket session between the Prisma Cloud Compute Console and Defenders is disconnected, the Defender will continually attempt to reestablish the session. Without reauthentication, unidentified or unknown devices may be introduced; thereby facilitating malicious activity. The Console must be configured to remove a Defender that has not established a connection in a specified period of days.

Check Content

Navigate to Prisma Cloud Compute Console's >> Manage >> Defenders.
 
Select the "Manage" tab. Select the "Defenders" tab.

Click "Advanced Settings".

If "Automatically remove disconnected Defenders after (days)" is not configured to the organization's policies, this is a finding.

Fix Text

Navigate to Prisma Cloud Compute's Manage >> Defenders. 

Select the "Manage" tab. Select the "Defenders" tab.

Click "Advanced Settings".

Set the "Automatically remove disconnected Defenders after (days)" value to the organization's defined period.