STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide

V-253527

CAT II (Medium)

Prisma Cloud Compute Defender must be deployed to containerization nodes that are to be monitored.

Rule ID

SV-253527r960897_rule

STIG

Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-000132, CCI-001487

Discussion

Container platforms distribute workloads across several nodes. The ability to uniquely identify an event within an environment is critical. Prisma Cloud Compute Container Runtime audits record the time, container, corresponding image, and node where the event occurred. Satisfies: SRG-APP-000097-CTR-000180, SRG-APP-000100-CTR-000200

Check Content

Navigate to Prisma Cloud Compute Console's >> Manage >> Defenders >> Manage tab. 

Verify Prisma Cloud Compute Defenders have been deployed to all container runtime nodes to be monitored.

Review the list of deployed Defenders. If a Defender is missing, this is a finding.

Fix Text

Navigate to Prisma Cloud Compute Console's >> Manage >> Defenders >> Manage tab. 

Deploy Defender to containerization node:
- Select the method of Defender deployment.
- Configure the Defender policy.