Prisma Cloud Remediation - GCP Kubernetes Engine Misconfiguration v2
This Playbook is part of the Prisma Cloud by Palo Alto Networks Pack.#
Supported versions
Supported Cortex XSOAR versions: 6.5.0 and later.
This playbook remediates Prisma Cloud GCP Kubernetes Engine alerts. It calls sub-playbooks that perform the actual remediation steps.
Remediation:
- GCP Kubernetes Engine Clusters Basic Authentication is set to Enabled
- GCP Kubernetes Engine Clusters have HTTP load balancing disabled
- GCP Kubernetes Engine Clusters have Legacy Authorization enabled
- GCP Kubernetes Engine Clusters have Master authorized networks disabled
- GCP Kubernetes Engine Clusters have Network policy disabled
- GCP Kubernetes Engine Clusters have Stackdriver Logging disabled
- GCP Kubernetes Engine Clusters have Stackdriver Monitoring disabled
- GCP Kubernetes Engine Clusters have binary authorization disabled
- GCP Kubernetes Engine Clusters web UI/Dashboard is set to Enabled
- GCP Kubernetes cluster intra-node visibility disabled
Dependencies#
This playbook uses the following sub-playbooks, integrations, and scripts.
Sub-playbooks#
Prisma Cloud Remediation - GCP Kubernetes Engine Cluster Misconfiguration
Integrations#
PrismaCloud v2
Scripts#
This playbook does not use any scripts.
Commands#
- prisma-cloud-alert-dismiss
- closeInvestigation
Playbook Inputs#
| Name | Description | Default Value | Required | 
|---|---|---|---|
| AutoRemediateKubernetesEngine | Execute GCP Kubernetes Engine remediation automatically? | no | Optional | 
| policyId | Grab the Prima Cloud policy ID. | incident.labels.policy | Optional | 
Playbook Outputs#
There are no outputs for this playbook.
Playbook Image#
