* [Blog](https://www2.paloaltonetworks.com/blog) * [Cloud Security](https://www2.paloaltonetworks.com/blog/cloud-security/) * [Cloud Computing](https://www2.paloaltonetworks.com/blog/category/cloud-computing-2/) * Elevate Cloud Security wi... # Elevate Cloud Security with the Flexibility and Simplicity of Custom Dashboards [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fcustom-security-dashboards-data-assessment%2F) [](https://twitter.com/share?text=Elevate+Cloud+Security+with+the+Flexibility+and+Simplicity+of+Custom+Dashboards&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fcustom-security-dashboards-data-assessment%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fcloud-security%2Fcustom-security-dashboards-data-assessment%2F&title=Elevate+Cloud+Security+with+the+Flexibility+and+Simplicity+of+Custom+Dashboards&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/cloud-security/custom-security-dashboards-data-assessment/&ts=markdown) \[\](mailto:?subject=Elevate Cloud Security with the Flexibility and Simplicity of Custom Dashboards) Link copied By [Maddy Kim](https://www.paloaltonetworks.com/blog/author/maddy-kim/?ts=markdown "Posts by Maddy Kim") Dec 05, 2023 5 minutes [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown) [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [Code to Cloud](https://www.paloaltonetworks.com/blog/cloud-security/category/code-to-cloud/?ts=markdown) [Darwin](https://www.paloaltonetworks.com/blog/tag/darwin/?ts=markdown) For security professionals inundated with alerts and metrics, the one-size-fits-all approach to data monitoring and threat assessment leaves much to be desired in terms of ease of use and efficiency. The data barrage, on the daily, has teams spinning their wheels, questioning which of the myriad signals warrants priority. When time is at a premium and security incidents can threaten an organization, the crux of the issue comes down to the rigid structure of pre-built, out-of-the-box dashboards. Traditional security dashboards miss the mark when it comes to delivering the nuanced insights specific to an organization's unique security posture. As a result, teams set out on fragmented workflows that shuttle them between tools, diluting focus and efficiency. The industry requires a more intuitive and adaptable solution. In the context of cloud security, the power of flexibility directed at data analysis can't be underestimated. Giving practitioners, cloud architects and security leaders the ability to customize dashboards for their individual needs equips them to holistically assess risk, ultimately concentrating focus. ## Flexibility and Control for Your Security Priorities As part of [Prisma Cloud's Darwin release](https://www.paloaltonetworks.com/blog/2023/10/announcing-innovations-cnapp-prisma-cloud/), Palo Alto Networks introduces custom dashboards, a paradigm shift in personalized security analytics. Imagine a security architect beginning their day, not with a generic overview, but with a dashboard tailored to display AWS account metrics filtered to spotlight their specific needs. Or consider a security executive who, during back-to-back meetings, can glance at a screen and immediately grasp compliance status, alert trends and asset vulnerabilities. The flexibility of Prisma Cloud's custom dashboards is about more than convenience --- it's about redefining responsiveness in cloud security. By consolidating critical metrics into a singular, coherent view, security teams can pivot from reactive to proactive, from overwhelmed to in control. The time saved from constructing external data pipelines can be invested in analyzing trends and mitigating risks, fundamentally enhancing an organization's security posture. ## Exceptional Features of Custom Dashboards ### Ultimate Control Prisma Cloud's custom dashboards offer unprecedented control over what users see on each screen, empowering you to construct your operational narrative, monitoring what metrics matters most to the organization according to your role and responsibilities. With a simple drag-and-drop interface, you can quickly build your own dashboard. ### Copy and Edit Templates Instead of starting from scratch, users can copy a pre-existing dashboard and edit as needed. Prisma Cloud's out-of-the-box dashboards --- Command Center, Code to Cloud, Discovery and Exposure Management, Code Security and Vulnerabilities --- serve as a starting point, making it even easier to create custom views. ### Expansive Widget Library With over 50 charts available in the widget library --- and more on the horizon --- users can drag and drop visualizations, apply global filters like time range, account group and cloud account to craft an unlimited number of dashboards. Each dashboard can be a canvas for creativity or a proven template repurposed, providing a [sandbox](https://www.paloaltonetworks.com/cyberpedia/sandboxing) for the expert or a starting point for new practitioners. The one constant is the outcome --- to better visualize your security landscape and empower you to make data-driven decisions. ![Build custom dashboards with a widget selector.](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/11/word-image-309182-1.png) Figure 1: Build custom dashboards with a widget selector. ## Key Use Cases for Custom Dashboards Custom dashboards offer an array of possibilities for cloud security teams to focus on what most matters to their enterprise. Let's explore some of the key use cases that elevate these dashboards from helpful to indispensable. ### Consolidated View for Multi-Account Management For users who manage multiple AWS accounts in their organization, custom dashboards enable them to aggregate alerts, assets, policies and compliance widgets into a single pane of glass. Filtering by cloud account delivers the relevant data they need, streamlining their everyday security management tasks and providing consolidated insights. ### Executive Security Dashboard for Decision Makers Executive-level stakeholders need a quick yet comprehensive way to assess their organization's security posture. Custom dashboards allow security team leads to create tailored views based on prioritized metrics, ensuring decision-makers have relevant information to guide their actions --- and without getting lost in the details. ### Alert Trend Analysis and Remediation Prioritization One of the most popular requests from users is the ability to focus on alert trends and severity. Custom dashboards empower users to visualize and prioritize these alerts by filtering them through time ranges, cloud types and account groups. This level of customization helps organizations identify top risks and rapidly respond to incidents. ### Compliance Tracking Across Cloud Environments Maintaining compliance with industry standards is crucial for many organizations. Custom dashboards enable users to focus on this critical aspect of cloud security by providing bespoke views of compliance metrics, ensuring they're continuously aligning with regulations and best practices. ![Consolidated view of sensitive data and risks across clouds](https://www.paloaltonetworks.com/blog/wp-content/uploads/2023/11/word-image-309182-2.png) Figure 2: Consolidated view of sensitive data and risks across clouds ## Transform Your Cloud Security Experience with Prisma Cloud's Custom Dashboards Prisma Cloud's custom dashboards offer a comprehensive and visually cohesive representation of your cloud security ecosystem. By aggregating metrics from diverse product pages, these tailored dashboards deliver an intuitive user experience, enabling seamless extraction of insights from cloud environments. This all-encompassing perspective empowers organizations to pinpoint potential risks, identify anomalies and address security threats from a unified platform. The embodiment of Prisma Cloud's Code to Cloud[™](https://www.paloaltonetworks.com/blog/prisma-cloud/remediate-runtime-source-code) intelligence, custom dashboards speak directly to the heart of modern cybersecurity challenges, offering clarity in the complexity of shifting data. For the security professional, they're a strategic ally, a command center from which to safeguard the digital frontier. With Prisma Cloud, enterprises are finally harnessing cloud intelligence in a way that aligns with their distinct security needs. Unlock the full potential of custom dashboards in Prisma Cloud's Darwin Release and [experience the transformative power](https://www.paloaltonetworks.com/prisma/request-a-prisma-cloud-trial) of tailoring insights to your cloud security needs. ## Learn More To learn about [Prisma Cloud's latest innovations](https://www.paloaltonetworks.com/prisma/cloud/latest), tune in to our on-demand virtual event, [CNAPP Supercharged: A Radically New Approach to Cloud Security](https://start.paloaltonetworks.com/prisma-cloud-new-innovations-for-the-future-of-cloud-security-webinar-on-demand.html). We'll show you how to streamline app lifecycle protection, so be sure to watch. *** ** * ** *** ## Related Blogs ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Designing Prisma Cloud to See Beyond](https://www2.paloaltonetworks.com/blog/cloud-security/user-designed-interface/) ### [Cloud Computing](https://www.paloaltonetworks.com/blog/category/cloud-computing-2/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Show Risk Burndown with the Code to Cloud Dashboard](https://www2.paloaltonetworks.com/blog/cloud-security/security-kpis-metric-reporting-dashboard/) ### [Cloud Security](https://www.paloaltonetworks.com/blog/category/cloud-security/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Code to Cloud](https://www.paloaltonetworks.com/blog/cloud-security/category/code-to-cloud/?ts=markdown) [#### Overcoming Cloud Security Consolidation Challenges](https://www2.paloaltonetworks.com/blog/cloud-security/cloud-security-consolidation-challenges/) ### [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown), [Secure the Cloud](https://www.paloaltonetworks.com/blog/category/secure-the-cloud/?ts=markdown) [#### Streamline Risk Management with Context-Based Risk Prioritization](https://www2.paloaltonetworks.com/blog/cloud-security/risk-prioritization-remediation/) ### [Cloud Workload Protection](https://www.paloaltonetworks.com/blog/category/cloud-workload-protection/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Limitless Insights into Your Cloud Security Landscape with the Infinity Graph](https://www2.paloaltonetworks.com/blog/cloud-security/infinity-graph-search-investigate/) ### [Cloud Native Application Protection Platform](https://www.paloaltonetworks.com/blog/category/cloud-native-application-protection-platforms/?ts=markdown), [CNAPP](https://www.paloaltonetworks.com/blog/cloud-security/category/cnapp/?ts=markdown) [#### Code to Cloud Vulnerability Management](https://www2.paloaltonetworks.com/blog/cloud-security/vulnerability-management-innovation/) ### Subscribe to Cloud Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language