Prisma Cloud Remediation - GCP VPC Network Firewall Misconfiguration
Prisma Cloud by Palo Alto Networks Pack.#
This Playbook is part of theThis playbook remediates the following Prisma Cloud GCP VPC Network Firewall alerts.
Prisma Cloud policies remediated:
- GCP Firewall rule allows internet traffic to FTP port (21)
- GCP Firewall rule allows internet traffic to HTTP port (80)
- GCP Firewall rule allows internet traffic to MongoDB port (27017)
- GCP Firewall rule allows internet traffic to MySQL DB port (3306)
- GCP Firewall rule allows internet traffic to Oracle DB port (1521)
- GCP Firewall rule allows internet traffic to PostgreSQL port (5432)
- GCP Firewall rule allows internet traffic to RDP port (3389)
- GCP Firewall rule allows internet traffic to SSH port (22)
- GCP Firewall rule allows internet traffic to Telnet port (23)
- GCP Firewall rule allows internet traffic to DNS port (53)
- GCP Firewall rule allows internet traffic to Microsoft-DS port (445)
- GCP Firewall rule allows internet traffic to NetBIOS-SSN port (139)
- GCP Firewall rule allows internet traffic to POP3 port (110)
- GCP Firewall rule allows internet traffic to SMTP port (25)
- GCP Default Firewall rule should not have any rules (except http and https)
- GCP Firewall with Inbound rule overly permissive to All Traffic
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
Integrations- Google Cloud Compute
#
ScriptsThis playbook does not use any scripts.
#
Commands- gcp-compute-get-firewall
- gcp-compute-patch-firewall
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
policyId | Prisma Cloud policy Id. | Required |
#
Playbook OutputsThere are no outputs for this playbook.