Palo Alto Networks’ supply chain security solutions provide threat visibility

With software supply chain attacks rising rapidly, cybersecurity solutions firm Palo Alto Networks developed the Prisma Cloud Supply Chain Security, which will provide a complete view of potential vulnerabilities or misconfigurations in the software supply chain.

Prisma Cloud Supply will enable organizations to quickly trace the source and fix them. If not quickly fixed or avoided, attackers can infiltrate systems and exploit these security flaws.

Unit 42’s Cloud Threat Report also found that access to hardcoded credentials opened the door for lateral movement and continuous integration/continuous delivery (CI/CD) pipeline poisoning. Unit 42 is Palo Alto Networks’ threat research arm.

Palo Alto Networks’ Prisma Cloud updates simplify multiple products management
Palo Alto Networks releases Prisma Cloud updates

Many current solutions only provide vulnerability and misconfiguration information at a resource layer in code or in the cloud. With Supply Chain Security, Prisma Cloud provides full lifecycle visibility and protection.

“Every day new vulnerabilities are found in open source and other software components that have previously been integrated into the organization’s software code. Without the proper tools, it is very difficult for organizations to quickly spot where they have used the unpatched versions of these components,” said Ankur Shah, senior vice president, Prisma Cloud products, Palo Alto Networks. “Prisma Cloud is designed to help protect organizations from code to cloud; and now that customers can visualize their software supply chain, it’s easier to spot, prioritize, and remediate security weaknesses at the onset of development and during delivery pipelines.”

Prisma Cloud Supply Chain Security helps provide a full stack, full lifecycle approach to securing the interconnected components that make up and deliver cloud native applications. It can help to identify vulnerabilities and misconfigurations in code, including open source packages, infrastructure as code (IaC) files, and delivery pipelines, such as version control system (VCS) and CI pipeline configurations.