Skip to main content

Prisma Cloud Remediation - GCP Kubernetes Engine Misconfiguration v2

This Playbook is part of the Prisma Cloud by Palo Alto Networks Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

This playbook remediates Prisma Cloud GCP Kubernetes Engine alerts. It calls sub-playbooks that perform the actual remediation steps.

Remediation:

  • GCP Kubernetes Engine Clusters Basic Authentication is set to Enabled
  • GCP Kubernetes Engine Clusters have HTTP load balancing disabled
  • GCP Kubernetes Engine Clusters have Legacy Authorization enabled
  • GCP Kubernetes Engine Clusters have Master authorized networks disabled
  • GCP Kubernetes Engine Clusters have Network policy disabled
  • GCP Kubernetes Engine Clusters have Stackdriver Logging disabled
  • GCP Kubernetes Engine Clusters have Stackdriver Monitoring disabled
  • GCP Kubernetes Engine Clusters have binary authorization disabled
  • GCP Kubernetes Engine Clusters web UI/Dashboard is set to Enabled
  • GCP Kubernetes cluster intra-node visibility disabled

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

Prisma Cloud Remediation - GCP Kubernetes Engine Cluster Misconfiguration

Integrations#

PrismaCloud v2

Scripts#

This playbook does not use any scripts.

Commands#

  • prisma-cloud-alert-dismiss
  • closeInvestigation

Playbook Inputs#


NameDescriptionDefault ValueRequired
AutoRemediateKubernetesEngineExecute GCP Kubernetes Engine remediation automatically?noOptional
policyIdGrab the Prima Cloud policy ID.incident.labels.policyOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Prisma Cloud Remediation - GCP Kubernetes Engine Misconfiguration v2