SASE Overview - Mar23
SASE Overview - Mar23
OVERVIEW
SASE
M AR C H 2 02 3
Table of Contents
Table of Contents
SASE......................................................................................................................................................................... 1
Preface..................................................................................................................................................................... 1
Related Documentation....................................................................................................................................................................... 3
Introduction...........................................................................................................................................................4
Prisma Access........................................................................................................................................................................................9
Prisma SD-WAN................................................................................................................................................................................... 11
Securing Data.......................................................................................................................................................................................30
Next Steps.............................................................................................................................................................34
Preface
GUIDE TYPES
Design guides provide an architectural overview for using Palo Alto Networks® technologies to provide
visibility, control, and protection to applications built in a specific environment. These guides are required
reading prior to using their companion deployment guides.
Deployment guides provide decision criteria for deployment scenarios, as well as procedures for combining
Palo Alto Networks technologies with third-party technologies in an integrated design.
DOCUMENT CONVENTIONS
Cautions warn about possible data loss, hardware damage, or compromise of security.
Blue text indicates a configuration variable for which you need to substitute the correct value for your
environment.
• Command-line commands.
• User-interface elements.
• Navigational paths.
• A value to be entered.
An external dynamic list is a file hosted on an external web server so that the firewall can import objects.
ABOUT PROCEDURES
These guides sometimes describe other companies’ products. Although steps and screen-shots were
up-to-date at the time of publication, those companies might have since changed their user interface,
processes, or requirements.
https://www.paloaltonetworks.com/referencearchitectures
• Describes the products in the Palo Alto Networks portfolio that you can use to build a SASE solution
for your organization.
• Provides guidance on where to obtain more information about implementing a SASE solution.
• Is recommended for using the Secure Access Service Edge series of reference-architecture design
and deployment guides and can provide guidance regarding which set of guides you would want to
follow up with first.
AUDIENCE
This guide is for technical readers, including system architects, security engineers, and security support
staff, IT engineers, and design engineers, who are considering migrating to a SASE solution for their
mobile users and remote sites (or branches).
RELATED DOCUMENTATION
The following documents support this guide:
• SASE for Securing Internet: Design Guide—Presents a detailed discussion of the available design
considerations and options for Prisma™ Access and Prisma SD-WAN when used for securing access
to the internet.
• SASE for Securing Internet: Deployment Guide—Details deployment scenarios and step-by-step
guidance for the Securing Internet design. This design includes securing internet for mobile-users
and for remote-sites.
• SASE for Securing Private Applications: Design Guide—Presents a detailed discussion of the available
design considerations and options for Prisma Access and Prisma SD-WAN when used for securing
access to private applications.
• SASE for Securing Private Applications: Deployment Guide—Details deployment scenarios and step-
by-step guidance for the Securing Private Applications design. This design includes securing private
applications for mobile-users and for remote sites.
• SASE Secure Internet Policy Design: Solution Guide—Describes best-practice policy design and
deployment details for securing internet services by using Prisma Access Cloud Management.
• Identity-Based and Posture-Based Security for SASE—Provides an overview of how the Palo Alto
Networks portfolio obtains and uses identity information and provides design and deployment
guidance for applying identity-based policies in a SASE environment.
Introduction
Organizations are undergoing a digital transformation in order to accelerate business processes, develop
products faster, and maximize profits while delivering quality products and services to their customers.
Digital transformation is the process of integrating of digital technologies into all areas of a business, from
application development and deployment to everyday business functions, such as human resources and
customer management.
As more parts of an organization transitioned to digital processes, and before the widespread adoption
of cloud computing, the data center increasingly became the center of the organization. The challenge
was to securely connect remote sites and mobile users to the data center. Dedicated wide-area networks
and VPN tunnels connected remote sites and mobile users to the single source of an organization’s digital
assets—the data center—while perimeter security products protected against breaches and malware.
The rapid adoption of cloud computing in recent years has upended this centralized model. The scalability
and cost-effectiveness of public cloud services and SaaS applications has caused organizations to move
some, or even all, of their digital assets out of the on-premises data center and into the cloud. The
network perimeter has become less defined, and the traditional data center has become just one of many
sources of business-critical applications and data.
Compared to traditional remote-site traffic patterns, where data flowed from a remote site to a data
center, modern remote-site traffic patterns have data moving in different directions and to and from
various destinations, such as corporate data centers, public clouds, and SaaS providers. Traditional
security systems for legacy networks don’t scale to meet the new network traffic patterns, and these
systems don’t provide the agility and flexibility needed to connect to new and emerging services.
Mobile users are likewise affected by the decentralization of data and applications. Traditionally, mobile
users would use a VPN tunnel to access the organization’s sensitive assets in the on-premises data center.
If they required access outside of the corporate network, they were routed through the organization’s
centralized security. However, with more and more data and applications moving outside of the data
center, mobile-user traffic to destinations outside of the corporate network has increased dramatically,
straining the organization’s resources. As many organizations found out during the pandemic of 2020,
when workers were required to work from home, the traditional solution does not scale quickly or easily.
Organizations need a solution for remote sites and mobile users that is scalable, resilient, and responsive.
It needs to be able to scale quickly, even during usage surges, without compromising the user experience,
and it needs to allow users to access corporate assets securely from anywhere, whether from a remote site
or an airport, no matter where those digital assets reside.
• Cloud SWG—The secure web gateway (SWG) provides URL filtering, SSL decryption, application
control, and threat detection and prevention for user web sessions.
• CASB—A cloud-access security broker monitors the use of sanctioned and unsanctioned SaaS
applications; provides malware and threat detection in SaaS applications; and, as part of a DLP
solution, provides sensitive data visibility and control in order to detect improperly-stored data in
SaaS file repositories.
• ZTNA 2.0—Zero Trust Network Access (ZTNA) 2.0 enables continuous verification and inspection
capabilities and provides identity-based and application-based policy enforcement for access to an
organization’s sensitive data and applications.
• SD-WAN—An SD-WAN provides an overlay network decoupled from the underlying hardware,
providing flexible, secure traffic between sites.
• DNS security—DNS security provides protection against DNS-based threats, such as DNS tunneling,
DNS rebinding, and so on.
• Support for managed and unmanaged devices—With the rapidly-increasing number of personal
devices and contractor or temporary worker devices accessing an organization’s digital assets,
the SASE solution should take into account devices that may not have specific agents or security
services on them.
Ideally, a SASE solution integrates these capabilities into as few products or services as possible, from as
few vendors as possible. This creates a solution that operates as close to line rate as possible and is easier
to manage. Daisy-chaining products from multiple vendors to create a SASE solution not only introduces
latency that degrades the end-user experience but also creates organizational challenges in training staff
to manage multiple, disparate products and correlating the information discovered by those products.
With the introduction of ZTNA 2.0 for SASE, Palo Alto Networks builds upon the tenets of a Zero Trust
approach. ZTNA 2.0 includes the following capabilities:
• Least-privileged access—Granting users the minimum access they require in order to perform their
tasks. You achieve this by identifying applications at Layer 7, enabling precise access control at the
app and sub-app levels, independent of network constructs like IP and port numbers.
• Continuous trust verification—After access to an app is granted, trust is continually assessed based
on changes in device posture, user behavior, and app behavior.
• Continuous security inspection—Providing deep and ongoing inspection of all traffic, even for
allowed connections, to prevent all threats including zero-day threats.
• Protection of all data—Providing consistent control of data across all apps used in the enterprise,
including private apps and SaaS, with a single data-loss prevention (DLP) policy.
• Security for all apps—Safeguarding all applications used across the enterprise, including modern
cloud-native apps, legacy private apps and SaaS apps. This includes apps that use dynamic ports
and apps that leverage server-initiated connections.
Both options provide security for remote sites and mobile users, and both offer the same level of
connectivity and security services. Although this guide focuses on the cloud-delivered network security
solution, SASE, this document would be incomplete without mentioning the on-premises network
security solution as a comparison.
For some customers, a cloud-based solution may not be an option. The reasons may include:
• Regulatory or compliance issues, such as Health Insurance Portability and Accountability Act of
1996 (HIPAA) and payment card industry (PCI) data security standards, that may restrict the use of
cloud services or drive the need for segmentation and DLP services at the remote-site edge.
• An existing investment in next-generation firewalls in their remote site and central locations.
The on-premises network security solution can use an edge next-generation firewall to provide the
SD-WAN capabilities. Application-aware policy determines how the local LAN traffic should flow and
whether outbound traffic is sent to the WAN or directly to the internet. The local firewall performs the
Layer 7 traffic inspection and access control, threat prevention, and security services for users accessing
internet-based applications and data.
The on-premises device is also the delivery method for the Palo Alto Networks cloud-delivered security
subscriptions, such as data loss prevention (DLP), WildFire® threat prevention, and SaaS Security.
Access for mobile users is provided by VPN tunnels from a client on the endpoint, terminated at the
central site or sometimes a regional VPN access point.
The on-premises solution provides the security of controlling the infrastructure but at the expense of
having to purchase, maintain, and manage the equipment at each site.
However, Palo Alto Networks delivers the most comprehensive, integrated SASE solution in the security
and networking industries—Prisma SASE—which includes the following main components:
• Prisma Access
• Prisma SD-WAN
PRISMA ACCESS
Prisma Access is a complete next-generation firewall delivered as a cloud-native service. It provides
secure access to internet and business applications for both mobile users and remote sites, whether those
applications are hosted in a corporate data center or a public cloud.
Prisma Access provides SWG access to users via either the GlobalProtect™ app or clientless VPN service,
providing support for managed device and unmanaged or guest devices. Remote sites can direct traffic
destined for the internet to Prisma Access, providing secure, direct internet access from the remote sites
without the requirement to backhaul traffic to a central site.
Zero Trust is a security model designed specifically to protect the security of sensitive data and critical
applications. Palo Alto Networks Zero Trust Enterprise is a strategic, platform-based approach to
security organized into three pillars: Zero Trust for users, Zero Trust for applications, and Zero Trust
for infrastructure. Prisma Access enforces a Zero Trust for users access model with a combination of the
following services:
• Integration with identity access management methods like security assertion markup language
(SAML) allows strong authentication when validating users.
• Security policies combine App-ID™, User-ID, and threat prevention to enforce least-privileged
access and scan application content for malicious activity.
• Inline DLP scanning and enforcement secure sensitive data flowing through the network.
Prisma Access extends support for the Zero Trust for infrastructure pillar with the IoT add-on, which
provides additional inspection to identify headless devices in order to build least-privileged access
policies for remote sites connected to Prisma Access.
The Prisma Access FWaaS capabilities inspect all traffic—not just HTTPS and HTTP. This enables Prisma
Access to uniquely identify each application, user, and device accessing your services, enabling you to
identify threats and create granular Zero Trust policies that control access to your most sensitive data and
applications.
The visibility provided by Prisma Access also enables additional security services, such as:
• Threat prevention
• URL filtering
• DLP
• DNS Security
Prisma Access’ single-pass architecture provides these services. The single-pass architecture minimizes
performance degradation by performing multiple operations only once on a packet, enabling Prisma
Access to process your traffic at line-rate speeds. For more detail about these services, see the section
“Securing the Service Edge.”
Security and operational data is sent to Cortex™ Data Lake for operational information, anomaly
detection, and forensics. SaaS Security uses the data Prisma Access sends to Cortex Data Lake to provide
reporting on which SaaS applications users are accessing and how frequently.
PRISMA SD-WAN
To enable simplified deployment across your organization, Prisma SD-WAN provides next-generation,
software-defined, wide-area networking combined with cloud-orchestration. At the core of the system,
Prisma SD-WAN uses built-in Layer 7 intelligence, providing application-aware networking, traffic
steering, and security policies. It also allows for complete visibility into the application health across
all locations and collects granular application-driven analytics, which you can use for monitoring and
troubleshooting.
You enable the SD-WAN service by using Prisma SD-WAN Instant-On Network (ION) devices. Available in
both hardware and virtual (software) forms, ION devices allow you to enforce policies based on business
intent, enable dynamic path selection, and provide visibility into performance and availability for
applications and networks. You can easily deploy your ION devices by using their zero-touch provisioning
capabilities, reducing the burden of manual provisioning and the time it takes to onboard new sites.
• Scalability—Quickly and easily onboard users without overloading your existing infrastructure or
needing to acquire and deploy additional resources. Bring new sites online quickly with the Prisma
SD-WAN ION device.
• Single vendor management—The components of Palo Alto Networks SASE solution work together
seamlessly, managed from a common portal. There is no need to figure out how to piece together
various products from multiple vendors using multiple APIs and orchestration applications.
• ZTNA 2.0 capabilities—Using ZTNA 2.0, you can eliminate the deficiencies of legacy VPNs and
overcome the limitations of early zero trust implementations.
Decryption
Organizations secure most of their applications and services with encryption, and over 85% of their
internet traffic is encrypted. This has become an opportunity for adversaries who are taking advantage of
encryption in order to hide their malicious activities in encrypted sessions and evade detection. To provide
inline protection, you need to decrypt traffic to have visibility so that you can detect threats that could be
hidden in encrypted sessions, such as malware.
Malware can be hosted anywhere, not just within known risky applications, so it is important that you
inspect all allowed traffic to detect malware. Because malware can be disguised in encrypted traffic, it
is important to be able to decrypt traffic inline at all network perimeters and across traffic flows. For
example, unsuspecting users can easily download malware from websites. Decryption capabilities allow
you to enforce policies on encrypted traffic so that the firewall can prevent malicious, encrypted content
from entering the network and prevent sensitive, encrypted data from leaving your network.
Prisma Access supports session decryption, which is applied as part of the single-pass architecture
through a decryption policy on selected traffic that you define. After Prisma Access decrypts the traffic
specified in your decryption policy, it enforces the security policy, providing protection against known
and unknown threats while enabling users to access their data and applications. Prisma Access then
re-encrypts the traffic before the traffic exits the system.
You can apply decryption policies to traffic flow inbound, outbound, or both. You can define sensitive
traffic types, such as HIPAA data, as exempt from decryption policies. Prisma Access also decrypts TLS
version 1.3 traffic, which future-proofs your network security investment as you start to adopt the new
TLS standard.
Figure 5 shows a scenario with a private internal network and a public external network. Based on
configured policy, Prisma Access decrypts traffic inbound from external networks in order to determine
if there is malicious content to be blocked. To ensure that no malicious activity, such as data exfiltration
through an encrypted channel, is present in the outgoing traffic, Prisma Access also decrypts traffic
coming from the internal network going to the internet. Prisma Access then re-encrypts traffic when the
traffic leaves.
To reduce risk and protect themselves against threats, organizations need to have full visibility into the
applications used on the network, including which users and devices are accessing them. This provides a
baseline of normal activity and allows you to detect abnormal activity.
To have visibility and control of the applications’ use requires the ability to identify and classify
applications, irrespective of the port, protocol, encryption, or potential evasive technique. It is critical
that you can identify which device or user is accessing an application, identify the source of file transfers,
and identify devices and users that may be transmitting a threat. This visibility allows you to strengthen
your security policies and reduce your incident response time.
Palo Alto Networks enables this visibility at the application, user, and device level by providing the
following features, which are integrated into Prisma Access:
• App-ID—App-ID uses multiple identification techniques in order to determine the exact identity
of applications traveling through your network, including those that try to evade detection by
disguising themselves as legitimate traffic, by hopping ports, or by using encryption. To match
based on actual applications rather than port numbers, App-ID is used in combination with security
policies.
• User-ID—User-ID enables you to leverage user information stored in a wide range of repositories,
such as LDAP and user authentication, via security assertion markup language. User-based policy
controls can include application information, including its category and subcategory, its underlying
technology, and its application characteristics. You can define policy rules in outbound or inbound
directions in order to safely enable applications based on users or groups of users.
• Device-ID—Device-ID enables you to use device information in your security policies, rather than
an IP address. You can identify devices by their attributes, such as a device type (for example, a
printer), model, software version, or vendor.
App-ID, User-ID, and Device-ID are important features for an effective security infrastructure because
they provide Prisma Access with visibility, policy control, and logging and reporting capabilities.
IoT Security
IoT devices are on the increase because many organizations are deploying IoT devices into their
environments in order to increase productivity, help with digital transformation, and provide operational
efficiency. IoT devices can vary from simple printers and security cameras to advanced robotic and
medical devices. Unfortunately, IoT devices bring a new challenge to securing your organization. Often,
IT departments do not have complete visibility of the IoT devices on the network. IoT devices often run
outdated or unpatched operating systems. And IoT devices are often deployed without changing the
default user ID and password.
Palo Alto Networks offers a cloud-delivered, subscription IoT security solution, which is available on
Prisma Access for networks. The IoT Security subscription provides discovery of all devices and provides
visibility and security risk-reduction actions based on detailed information received from all discovered
devices. You achieve discovery, visibility, and enforcement with Prisma Access, as opposed to other
solutions that require you to buy separate probes in the network.
IoT introduces a concept of policy enforcement by using Device-ID. Similar to the use of App-ID and User-
ID, you can use Device-ID to define policy based on the attributes of the device, regardless of any changes
to the IP address or physical location.
Prisma Access security-processing nodes are an important part of IoT security because they behave as
sensors and generate enhanced application logs. The security processing nodes send the logs to Cortex
Data Lake, where the IoT Security app leverages this data. The IoT Security app analyzes the data, maps
IP addresses to devices, and recommends policy rules. You can create security policy rules from the IoT
Security app and import them to Prisma Access for enforcement.
Note
When you connect a remote site to your organization’s network, you can use the connection for these
purposes:
• You can secure access from the remote site to the internet.
You can also choose to secure access for both purposes concurrently.
When you host the private applications in a central site or data center, you can use a private WAN
or SD-WAN in order to provide access to the applications. How you provide secure access to private
applications does not depend on the method you choose for providing secure access to the internet. In
some cases, you might not need to provide any internet access for remote-site users. However, in most
cases, your remote-site users and devices require some basic level of internet access.
Alternatively, depending on your organization’s requirements, users at remote sites might need to access
only SaaS applications and there are no private applications hosted in private data centers. If this is the
case, then the organization might not require any private WAN or SD-WAN to connect remote sites to
central sites. You would only need to provide secure access from the remote site to the internet.
Prisma Access
To provide the same firewall services that an on-premises NGFW can deliver, Prisma Access uses a
cloud-based infrastructure. This allows your organization to avoid the challenges of sizing firewalls and
allocating compute resources for a multi-site deployment, minimizing coverage gaps or inconsistencies
associated with your distributed organization. The elasticity of the cloud scales as demand shifts and
traffic patterns change. The cloud service operationalizes next-generation security deployment to
remote sites and mobile users by leveraging a cloud-based security infrastructure managed by Palo
Alto Networks. The security processing nodes deployed within the service natively inspect all traffic in
order to identify applications, threats, and content. Prisma Access provides visibility into the use of SaaS
applications and the ability to control which SaaS applications are available to your users.
Prisma Access for networks provides security services and threat prevention for all your sites, safely
enabling commonly used applications and web access. You connect remote sites to Prisma Access via an
industry-standard, IPSec, VPN-capable device. Globally, Prisma Access offers over 100 sites to which you
can connect, making web pages localized in-country and reducing the latency of going to cloud-hosted
applications.
Prisma Access is ideally suited for any site with one or multiple internet links, provides direct internet
access, and directly connects enterprise remote sites. Prisma Access provides direct internet access
without the requirement to backhaul traffic to a central site. Functionally, there is no need to compromise
on remote-site security, because Prisma Access provides the same security, visibility, and control as
provided by the Palo Alto Networks next-generation firewalls at the central site.
Prisma SD-WAN
Prisma Access with Prisma SD-WAN provides cloud-delivered, consistent security to all of your sites,
giving you full visibility and control of all of your applications. The solution consists of a Prisma SD-WAN
ION device deployed at a site managed from the Palo Alto Networks SASE portal.
Prisma SD-WAN creates a secure fabric and service links over multiple types of WAN services and
connections, including MPLS, direct internet, long-term evolution, and Prisma Access. This allows you to
control and optimize all your WAN links. Internal user-traffic is protected by using IPSec tunnels over the
public networks, ensuring data privacy through strong encryption. The ION devices automatically choose
the best WAN path for your applications based on business policy and real-time analysis of the application
performance metrics and WAN links.
Because Prisma SD-WAN is Layer 7 application–aware, it can use application-based policies to make
packet forwarding decisions. These policies take precedence over the forwarding information in the
routing tables. Prisma SD-WAN’s application awareness also lets you prioritize specific applications and
application types in times of high network utilization. Application-aware QoS enables you to keep your
critical applications available and responsive during surges in network traffic.
When you connect a mobile user to your organization’s network, you can use the connection for these
purposes:
• You can secure access from the mobile user to the internet.
You can also choose to secure access for both purposes concurrently.
When you host the private applications in a central site or data center, you can use Prisma Access in order
to provide access to the applications. How you provide secure access to private applications does not
depend on the method you choose for providing secure access to the internet. In some cases, you might
not need to provide any internet access for remote-site users, However, in most cases, your mobile users
require some basic level of internet access.
Alternatively, depending on your organization’s requirements, mobile users might need to access only
SaaS applications and there are no private applications hosted in private data centers. If this is the case,
then the organization might not require any access to central sites. You would only need to provide secure
access to the internet.
Prisma Access provides a cloud-delivered, scalable, and secure remote-access solution for all your mobile
users. It provides consistent application visibility and control for all users, regardless of their location.
The Prisma Access backbone interconnects a global network of more than 100 secure access locations.
This allows users to connect to websites within their own country for localized content. The Prisma
Access backbone uses VPN technology to keep your enterprise traffic secure and separated from other
organizations’ traffic.
There are three connection methods for securing mobile-user access with Prisma Access:
• Prisma Access explicit proxy via a proxy auto-configuration (PAC) file managed by your
organization
• Prisma Access Clientless VPN for unmanaged endpoints to access secured applications via the
Prisma Access gateway
Also, if required, the GlobalProtect app inventories the endpoint configuration and builds a host
information profile (HIP) that it shares with Prisma Access. You can use this information to build HIP-
based policies based on several attributes, including:
Based on the endpoint operating system, Prisma Access can provide differentiated authentication profiles
and methods, which Prisma Access determines through the information pushed from the GlobalProtect
app. For example, Windows endpoints can use an LDAP authentication method, while Android endpoints
use SAML. The GlobalProtect app runs on Windows, macOS, Linux, iOS, Android, and Chrome. For
unmanaged personal, partner, and contractor endpoints on which you can’t install a client, the Prisma
Access clientless VPN provides secure access from SSL-enabled web browsers without installing the
GlobalProtect app.
Explicit Proxy
In addition to using the GlobalProtect connection method, you can also use the explicit-proxy connection
method to connect to Prisma Access in order to provide a secure web gateway for mobile users who have
managed devices accessing the internet and SaaS services. If you have already been using an on-premises
explicit proxy to secure internet-bound traffic, the Prisma Access explicit-proxy method provides an easy
migration option. To migrate away from an existing on-premises proxy service, you configure the user’s
operating system or browser to point to the new Prisma Access explicit-proxy URL. The ability to limit the
changes to a browser reconfiguration allows organizations to easily migrate to a cloud-based SWG.
Clientless VPN
For unmanaged personal, partner, and contractor endpoints on which you can’t install a client, the
GlobalProtect clientless VPN provides secure access to on-premises applications from SSL-enabled web
browsers without installing the GlobalProtect app. Clientless VPN proxies access for the web applications
that you make available to them.
Figure 11 ADEM
The ADEM functionality is natively integrated into the GlobalProtect app for mobile-user experience
monitoring, and into the Prisma SDWAN ION device operating system for remote network monitoring.
With ADEM, you do not need to deploy any additional appliances or software in order to monitor your
user’s application experience.
Common threats include phishing, exploit kit delivery, malware, credential theft, data theft, command-
and-control (C2) attacks, and ransomware. Adversaries often execute these types of threats from
malicious and compromised websites, often unknown to the website owners. Adversaries leverage
multiple tools and techniques, including automation, to generate thousands of malicious URLs daily and
exploit DNS to deliver malware and exfiltrate data.
It’s important to verify which users are accessing which websites and, at the same time, protect their
users from being exposed to threats. Palo Alto Networks offers a comprehensive solution to provide safe
web access by restricting access to known harmful sites and securing user sessions that are accessing web
content.
When you enable URL Filtering, it compares all web traffic against the URL-filtering database, PAN-DB,
which contains millions of URLs grouped into approximately 65 categories. You can classify sites based on
their content, features, and risk. The malware and phishing URL categories in PAN-DB update in real time,
which means that if a first attempt to access a malware or phishing is treated as unknown, URL Filtering
matches subsequent attempts against the updated URL-filtering database and prevents user access. For
fast and easy access to frequently visited URLs, PAN-DB provides high-performance local caching.
The security processing nodes in Prisma Access use a seed database as a cache for URLs from PAN-DB. If
Prisma Access does not find a URL in the cache, it contacts PAN-DB to lookup the URL. Security policies
use URL Filtering profiles in order to either allow or deny access to a URL based on a category. Other
options including asking the user if they want to proceed to the site and logging the traffic.
Dynamically analyzing and detecting malicious content by using machine learning prevents malicious
variants of JavaScript exploits and phishing from entering your network. ML examines multiple web page
details through a series of ML models. The ML model looks at patterns, decoder fields, and file details
to determine a probability, classification, and verdict. ML then sends malicious URLs to PAN-DB for
additional analysis.
Figure 12 URL Filtering comparing web traffic against the URL-filtering database, PAN-DB
By preventing users from going to phishing sites, URL Filtering can protect users in real time against
attempts to steal user credentials. URL Filtering can prevent users from submitting corporate credentials
to untrusted sites but allow them to use their credentials on sanctioned corporate sites. Even if a user’s
credentials have been stolen, multi-factor authentication (MFA) can prevent those credentials from
being abused. Prisma Access supports multi-factor authentication and integrates with multiple MFA
vendors through APIs. MFA on Prisma Access works in conjunction with an authentication portal, which
challenges the user to input an additional authentication factor beyond their standard credentials.
Securing DNS
DNS is required for domain-name-to IP-address mapping translation, which is common when users
are accessing external resources, such as websites. At the same time, DNS is a massive and frequently
overlooked attack surface. Adversaries can compromise DNS and use it for malicious activity in order to
steal data or establish connections with C2 servers.
Adversaries can use DNS tunneling in order to encode data of non-DNS based programs with DNS queries
and DNS responses, which the adversaries can often use as a channel to exfiltrate data. Palo Alto Networks
DNS tunneling detection can detect a tunnel-based attack and block it with security policies, avoiding data
theft.
Static lists of malicious DNS entries and manual responses don’t scale. The DNS Security service from Palo
Alto Networks is a subscription-based service that is designed to protect and defend your network from
advanced threats that are using DNS. The DNS Security service leverages machine learning and predictive
analytics to provide real-time DNS request analysis. The analysis enables production and distribution of
DNS signatures that are specifically designed to defend against malware that uses DNS for command-and-
control and data exfiltration.
The DNS Security service allows Prisma Access to sinkhole internal DNS requests, which allows the Prisma
Access security processing node to forge a response to a DNS query for a known malicious domain or URL
and then causes the malicious domain name to resolve to a definable, fake IP address given to the client.
If the client attempts to access the fake IP address, a security rule blocks traffic to this IP address and logs
the information.
The DNS Security service also uses techniques such as domain-generation algorithm (DGA) detection
and DNS-tunneling detection. Because malicious domains are frequently autogenerated by machines, a
DGA analysis determines whether it was a person or machine that likely generated a domain. By reverse-
engineering and analyzing other frequently used techniques, the DNS Security service can identify and
block previously unknown DGA-based threats in real time.
Prisma Access decrypts traffic and can detect both known and unknown threats in files and can use
Advanced URL filtering to provide site and site-category allow and deny lists. However, with the
proliferation of new web sites and applications every day, it can be difficult to manage uncategorized or
unidentified sites. Simply blocking them can create user frustration or operational overhead because your
security team must evaluate each unknown requested site to determine if they are a threat or should be
allowed.
To alleviate the threat of unknown sites and the operational overhead of managing access to those sites,
Prisma Access integrates with third-party RBI products through the CloudBlades API platform.
Policies in Prisma Access send requests for specific sites, such as unknown or uncategorized sites, or
even specific categories of sites, to the third-party RBI service. There, the sites are rendered in a remote
container, away from the endpoint and corporate network, and examined for threats and vulnerabilities.
Any malicious content is rendered in the remote container, and only safe content is allowed through to the
end user.
With User-ID, you can create policies to protect high-risk users who are often specifically targeted, such
as your company executives, from attacks by sending all their web- and cloud-application traffic to an RBI
service.
Threat Prevention
Threat Prevention is a subscription for Prisma Access that provides comprehensive protection against all
threats, irrespective of port, protocol, and encryption. When Threat Prevention is licensed and enabled on
Prisma Access, the Prisma Access security processing nodes scan, inspect, classify, and block threats in a
single pass.
The Threat Prevention subscription contains security profiles, which Prisma Access uses in order to
prevent threats from compromising your network. You use security policy rules to allow or deny traffic, and
you use security profiles to scan the allowed traffic for threats. When traffic matches the allow rule defined
in the security policy, the security profiles attached to that rule provide additional content scanning
capabilities. Default profiles are available, or you can create your own custom profiles.
The Threat Prevention subscription uses the following default security profile groups:
• Anti-spyware profiles—You can use anti-spyware profiles to block spyware on compromised hosts
reaching out to external C2 servers. You can apply anti-spyware profiles to inspect all zone traffic,
and you can apply various levels of protection between zones. Compromised hosts try to access
malicious sites. In order to prevent access to these sites, you can enable DNS sinkholing within
the anti-spyware profile, which enables the Prisma Access to respond to DNS queries for known
malicious domains. The Prisma Access security processing node makes the DNS query resolve to
an IP address you specify, which helps to identify the infected hosts attempting to reach the DNS
sinkhole address.
• Vulnerability protection profiles—At the network and application layers, these profiles detect and
block exploit attempts and evasive techniques, including port scans, buffer overflows, remote code
execution, protocol fragmentation, and obfuscation. The profiles stop attempts based on threats
that have patterns related to exploits’ attacks on system vulnerabilities.
The Threat Prevention subscription bundles the antivirus, anti-spyware, and vulnerability protection
profiles into one license. In addition to the Threat Prevention subscription, you can leverage the following
additional default profile groups in the URL Filtering and WildFire services in order to avoid threats:
• Data-filtering profiles—With data-filtering profiles, you can define data patterns for which you
want to filter, such as credit card information, social security numbers, HIPAA data, and many
more. Within the profile, you can define whether you want to block, alter, or log the activity. You
can use a default data-filtering profile or customize your own. With a data filtering profile, you
can avoid data theft by blocking the specific types of data (based on data patterns) that are not
permitted to leave your environment.
• File-blocking profiles—These profiles allow you to identify specific file types that you want to
block or monitor. For most traffic, including traffic on your internal network, you want to block
files that are known to carry threats or that have no real use case for upload or download. Based on
the specific matching file types and applications, file-blocking profiles block prohibited, malicious,
and suspect files in order to protect end users from downloading or uploading known malware
executables.
• Zone-protection profiles—These profiles increase network security and prevent lateral movement
activities. Within a zone-protection profile, you have the ability to configure reconnaissance
protection. Zone-protection profiles have configurable settings for flood attack protection,
reconnaissance protection, packet-based attack protection, and protocol protection. Enabling
lateral movement reconnaissance protection allows you to configure settings for TCP and UDP
port scans as well as host sweeps. The settings include response actions based on configured time
intervals.
• URL Filtering profiles—Covered previously, these profiles enable you to configure Prisma Access
to use URL categories in order to control access to websites and protect your organization from
websites hosting malware and phishing pages.
• WildFire analysis profiles—These profiles forward unknown files or email links to WildFire for
analysis. You can specify forwarding based on the application, file type, and traffic direction.
WildFire
Palo Alto Networks offers a security service, WildFire, which is a threat intelligence cloud and virtual
sandbox that provides machine-learning analytics capabilities in order to prevent known and unknown
threats. When a Prisma Access security processing node receives a file or URL, it determines whether
WildFire has seen it before and what the verdict was. If the file or URL is unknown, Prisma Access
forwards it to WildFire for analysis. WildFire determines whether it is benign, grayware, malware, or
a phishing threat and then provides a verdict immediately for WildFire subscribers. WildFire provides
content signatures for prevention. A single signature protects against millions of polymorphic variants of
a single malware.
In addition to protecting you from malicious and exploitive files and links, WildFire looks deeply into
malicious outbound communication, disrupting C2 activity with anti-C2 signatures and DNS-based
callback signatures. WildFire also feeds this information into URL Filtering with PAN-DB, which
automatically blocks newly discovered malicious URLs. This correlation of threat data and automated
protections is key to identifying and blocking ongoing intrusion attempts and future attacks on your
organization, without requiring policy updates and configuration commits.
WildFire provides multiple techniques to uncover and prevent new threats, techniques such as dynamic
analysis, machine learning, static analysis, bare-metal analysis, and a custom-built hypervisor. The
multiple techniques detect threats that would normally evade single-technique sandbox environments.
To uncover hidden threats in the files and URLs that WildFire examines, WildFire identifies hundreds of
potentially malicious behaviors, including:
• Changes made to host—WildFire monitors all processes for modifications to the host, including file
and registry activity, code injection, memory heap-spraying (exploits), mutexes, Windows service
activity, the addition of auto-run programs, and other potentially suspicious activities.
Leveraging innovations in machine learning, artificial intelligence, and big-data analytics is the only
way to stay ahead of a fast-moving adversary. However, all such analytics solutions depend on massive
amounts of data from many sources in order to identify new threats and exploit techniques and to
generate and share threat intelligence. These threat-intelligence capabilities are strengthened when
information is combined across a large base of contributors. In a nutshell, sharing data acquired from
multiple organizations to identify malicious behavior and their sources benefits the entire community.
This sharing model enables rapid response across a broad base in order to prevent successful cyberattacks.
SECURING DATA
Organizations are increasingly relying on cloud-based solutions for storing sensitive data. Data stored in
SaaS applications is subject to additional risks than data stored in a traditional, on-premises data center.
These risks include files with confidential or sensitive data, such as health, financial, or other personally
identifiable information being stored in a public folder or with incorrect sharing settings and files with
malware being uploaded and rapidly being shared throughout the organization.
To address these risks, the Palo Alto Networks SASE solution uses next-generation CASB, which provides
SaaS application visibility and control, data protection and governance, and threat prevention. The two
elements of next-generation CASB are SaaS Security, which consists of SaaS Security Inline and SaaS
Security API, and Enterprise DLP.
SaaS Security can help you to create Zero Trust policies that:
• Protect the transfer of credentials and sensitive data to sanctioned and unsanctioned apps, keeping
corporate and employee data safe.
• Monitor data in the SaaS applications for compliance to storage standards for sensitive data, such
as PII, PCI, and other compliance standards
• Block ever-evolving threats, ensuring that prevention is consistent and minimizing risk of data and
time loss.
To do this, SaaS Security has two components to secure the data in your sanctioned SaaS applications and
data moving to and from SaaS applications:
• SaaS Security API—Provides threat protection, data exfiltration, and sensitive data loss prevention
for information stored in your sanctioned SaaS applications
• SaaS Security Inline—Provides visibility into the SaaS applications being accessed by your users,
whether sanctioned or not, enabling you to create policies to control that access.
After your data leaves your network and is stored in a SaaS application, Prisma Access can’t see access
and changes to the data. Palo Alto Networks SaaS Security provides visibility and control for data stored
in SaaS applications. Visibility and control even extend to data and activities that originate on personal
devices and collaborators who aren’t part of your organization, enabling Zero Trust policies to extend into
your SaaS environments.
SaaS Security API provides security for data-at-rest in your sanctioned applications. When you first
connect a sanctioned SaaS application to SaaS Security, the application’s API allows SaaS Security
to discover and retroactively inspect all files and data (called assets in SaaS Security) managed by
the application. SaaS Security inspects and analyzes all assets and identifies exposures, external
collaborators, risky user behavior, and sensitive documents, as well as identifying the potential risks
associated with each asset. The service also performs deep content inspection and protects both historical
assets and new assets from malware, data exposure, and data exfiltration in near real-time. SaaS Security
leverages Palo Alto Networks Enterprise DLP to categorize sensitive and regulated data and the WildFire
malware analysis engine to identify and protect against all file-based threats.
As SaaS Security identifies incidents, you can assess them and define automated actions to remediate the
incidents or alert users and administrators to the risks. For ongoing incident assessment and protection,
in addition to the initial inspection of historical assets, SaaS Security continuously monitors the SaaS
application and applies the policy to new or modified assets.
SaaS Security Inline provides security for data-in-motion. SaaS Security Inline works in conjunction with
Prisma Access to monitor access to SaaS applications and evaluate the data being sent or retrieved. The
SaaS Security Inline service uses cloud-based machine learning in order to discover SaaS applications The
service also provides advanced analytics and reporting, so that your organization has the insight into the
data-security risks of sanctioned and unsanctioned SaaS application use, or shadow IT, on your network.
You can monitor the use of unsanctioned applications and create policies to block them altogether, or you
can limit access to tolerated unsanctioned applications to specific users or groups. SaaS Security Inline
provides complete control of SaaS application use from your corporate network and managed devices that
traverse Prisma Access. To provide a consistent management experience, it integrates with your existing
security.
Using both API-based and inline services, the Palo Alto Networks SaaS Security portfolio of services
provides visibility and control of your SaaS applications. Without your reconfiguring your network, adding
probes, or configuring endpoints, SaaS Security provides complete CASB services with visibility across all
users accessing a SaaS application.
The DLP cloud service provides detection and response through data policies. Detection rules find and
classify sensitive information based on data patterns. Response rules are actions that mitigate the risk of
data loss, such as blocking an action for example.
The DLP cloud service uses pre-defined patterns, as well as DLP profiles, to provide a much more granular
data matching option than just using search patterns. Today, over 380 patterns and 17 data profiles are
available, including profiles for GDPR, CCPA, PII, and many other requirements.
The predefined data patterns match on keywords and strings. You also can create your own custom data
patterns and file-property data patterns. You can create custom data patterns with regular expressions
and keywords. For looking at metadata and other file attributes, you can create file-property data patterns
to match on a name-value pair.
Data profiles are a combination of multiple patterns. To narrow down what you want to find, the profiles
use machine learning and document properties to reduce false positives and be more specific. Data
profiles use Boolean operations on matches, allowing you to match different confidence levels and
patterns. For example, you could match on patterns A and C and not pattern B.
Next Steps
This guide provided a brief overview of SASE and the Palo Alto Networks implementation of an end-to-
end, next generation SASE solution. It introduced SASE and the products and capabilities of the Palo Alto
Networks portfolio that support deploying a SASE solution for your remote sites and mobile users.
For a more in-depth discussion of how you can leverage Palo Alto Networks to develop a SASE solution for
your organization, refer to the documentation in the “Related Documentation” section, particularly:
• SASE for Securing Private Applications: Design Guide—Presents a detailed discussion of the available
design considerations and options for Prisma Access and Prisma SD-WAN when used for securing
access to private applications.
• SASE for Securing Internet: Design Guide—Presents a detailed discussion of the available design
considerations and options for Prisma Access and Prisma SD-WAN when used for securing access to
the internet.
© 2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of
our trademarks can be found at https://www.paloaltonetworks.com/company/trademarks.html. All other marks
mentioned herein may be trademarks of their respective companies. Palo Alto Networks reserves the right to change,
modify, transfer, or otherwise revise this publication without notice.
B-000213P-1-23a