{"id":175514,"date":"2022-11-18T06:00:52","date_gmt":"2022-11-18T14:00:52","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=175514"},"modified":"2023-01-18T10:07:53","modified_gmt":"2023-01-18T18:07:53","slug":"shift-left-and-increase-your-security-posture","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2022\/11\/shift-left-and-increase-your-security-posture\/","title":{"rendered":"Shift Left and Increase Your Security Posture"},"content":{"rendered":"<h2>Prisma Cloud Ensures Your Cloud Applications are Secure from Code to Cloud<\/h2>\n<p>To stay relevant, organizations need to be nimble. They need to offer new services, new capabilities and transform their customers' experiences while managing the volatile world of cyber attackers. Moving to the cloud is now the way of achieving the first part of your goals.<\/p>\n<p>But, what about securing the data, applications and tools to ensure you can go from building secure codes to delivering secure cloud applications? When you\u2019re responsible for the secure operation of your cloud services, how do you ensure the transformation of your journey to the cloud?<\/p>\n<p>You\u2019ve probably heard that shifting left increases your applications\u2019 security, helping to ensure they\u2019re deployed to the cloud without vulnerabilities. How this is done, though, can be a mystery \u2013 one that I hope to shed light on with this post.<\/p>\n<h2><a id=\"post-175514-_b4bgysqkpp1f\"><\/a>Shift Left \u2013 Code, Build, Deploy and Run<\/h2>\n<h3><a id=\"post-175514-_85k00d9nxle8\"><\/a><strong>Step 1<\/strong>- <strong>Build Security Into Your Code and Build Cycles<\/strong><\/h3>\n<p>Continuous integration (CI) is the development lifecycle practice that provides your organization with the ability to rapidly and continuously develop, update and maintain your cloud-based applications. Ensuring that your code is free from vulnerabilities, before going to the build stage, can be simplified with the right tools.<\/p>\n<p>Using<a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\"> Palo Alto Networks Prisma Cloud<\/a> scanning capabilities provides visibility and control within your code. And, it builds processes to identify vulnerabilities and compliance violations before progressing to the \u201cdeploy phase\u201d of the application's lifecycle.<\/p>\n<h3><a id=\"post-175514-_hm9s2zuepjfd\"><\/a><strong>Step 2 \u2013 Confidently Deploy Secure Applications<\/strong><\/h3>\n<p>With modern automation, cloud applications are in a continuous cycle of development, testing and release, which introduces the fundamental challenge of continuous change. But, identifying vulnerabilities and compliance issues within applications that are staged for deployment helps prevent your applications from becoming targets of bad actors. Prisma Cloud helps <em>enforce your policies<\/em> to ensure only trusted applications are deployed in the cloud runtime environment.<\/p>\n<h3><a id=\"post-175514-_aksjnr37bg4u\"><\/a>Step 3 \u2013 Monitor and Track Applications Running Across the Cloud Workload Continuum<\/h3>\n<p>Regardless of where it\u2019s deployed (IaaS, PaaS, SaaS, etc.), an application\u2019s runtime actions should be monitored for abnormal behaviors. Prisma Cloud quickly <em>identifies<\/em> expected behaviors and <em>prevents<\/em> anomalous behavior<strong>.<\/strong> It secures runtime environments using predictive and threat-based protections.<\/p>\n<p>Shifting left can be as simple as selecting a product designed to secure cloud applications in every step of your cloud applications\u2019 code, build, deploy and run processes.<\/p>\n<p>With built-in scanning capabilities, policy enforcement, predictive and threat-based protection, Prisma Cloud helps shift your security left, delivering the assurance that your cloud applications are highly secured.<\/p>\n<p><span style=\"font-weight: 400;\">Download the <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/secure-the-cloud.html\"><span style=\"font-weight: 400;\">Prisma Cloud Field Guide e-book<\/span><\/a><span style=\"font-weight: 400;\"> to learn how to<\/span> <span style=\"font-weight: 400;\">maximize your security posture by leveraging Prisma Cloud\u2019s full capabilities at each stage of your cloud application development cycle.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For a complete guide on how the Prisma Cloud framework establishes the pillars of security for your cloud journey, view the <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/secure-the-cloud.html\"><span style=\"font-weight: 400;\">Prisma Cloud Adoption Guide<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">To help configure, provision, deploy and gain the maximum benefit from Prisma Cloud, we also recommend <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/datasheets\/prisma-cloud-cbdr-adoption-workshop\"><span style=\"font-weight: 400;\">Prima Cloud CBDR Adoption Workshop<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/apps\/pan\/public\/downloadResource?pagePath=\/content\/pan\/en_US\/resources\/datasheets\/sd-quickstart-service-for-prisma-cloud-code-security-s\"><span style=\"font-weight: 400;\">QuickStart Service for Prisma Cloud Code Security<\/span><\/a><span style=\"font-weight: 400;\">. Shift left for optimum cloud application security. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prisma Cloud can help you shift left to achieve security objectives \u2013 increase applications\u2019 security, help ensure they\u2019re deployed without vulnerabilities.<\/p>\n","protected":false},"author":723,"featured_media":175515,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6719,3013,133],"tags":[8686],"coauthors":[8935],"class_list":["post-175514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-company-culture","category-education","category-events","tag-ignite-22"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/11\/word-image.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/175514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=175514"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/175514\/revisions"}],"predecessor-version":[{"id":178391,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/175514\/revisions\/178391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/175515"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=175514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=175514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=175514"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=175514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}