Palo Alto cloud-native security platform.
## Prisma Cloud MCP Server: Comprehensive Cloud Native Security The **Prisma Cloud MCP Server** integrates Palo Alto Networks' cloud security platform into Google Antigravity, enabling workload protection, identity security, and code-to-cloud visibility across multi-cloud environments. ### Why Prisma Cloud MCP? - **Code to cloud** - Secure from development to runtime - **CNAPP platform** - Cloud-native application protection - **Identity security** - CIEM for cloud identity management - **Runtime protection** - Workload and container security - **Network security** - Cloud network segmentation and monitoring ### Key Features #### 1. Cloud Security Posture ```python # Get security posture overview posture = await mcp.call("prisma", "get_posture", { "cloud_accounts": ["aws-prod", "gcp-staging"], "severity": ["critical", "high"] }) print(f"Total Alerts: {posture[\"total_alerts\"]}") for account in posture["accounts"]: print(f"{account[\"name\"]}: {account[\"alert_count\"]} alerts") print(f" Compliance: {account[\"compliance_score\"]}%") ``` #### 2. Workload Protection ```python # Get runtime security events events = await mcp.call("prisma", "get_runtime_events", { "cluster": "production-k8s", "severity": ["critical"], "time_range": "24h" }) for event in events: print(f"[{event[\"type\"]}] {event[\"description\"]}") print(f" Container: {event[\"container\"]}") print(f" Action: {event[\"action_taken\"]}") # Scan container image scan = await mcp.call("prisma", "scan_image", { "image": "myapp:latest", "check_compliance": True }) ``` #### 3. Identity Security (CIEM) ```python # Analyze cloud identities identities = await mcp.call("prisma", "get_risky_identities", { "cloud": "aws", "risk_level": ["high", "critical"] }) for identity in identities: print(f"{identity[\"type\"]}: {identity[\"name\"]}") print(f" Risk: {identity[\"risk_score\"]}") print(f" Issues: {identity[\"permission_issues\"]}") # Get excessive permissions permissions = await mcp.call("prisma", "analyze_permissions", { "identity": "arn:aws:iam::xxx:role/app-role" }) ``` #### 4. Code Security ```python # Scan IaC templates iac_scan = await mcp.call("prisma", "scan_iac", { "path": "/terraform/modules", "framework": "terraform" }) for issue in iac_scan["violations"]: print(f"[{issue[\"severity\"]}] {issue[\"policy\"]}") print(f" File: {issue[\"file\"]}:{issue[\"line\"]}") print(f" Fix: {issue[\"remediation\"]}") ``` ### Configuration ```json { "mcpServers": { "prisma": { "command": "npx", "args": ["-y", "@anthropic/mcp-prisma-cloud"], "env": { "PRISMA_API_URL": "https://api.prismacloud.io", "PRISMA_ACCESS_KEY": "your-access-key", "PRISMA_SECRET_KEY": "your-secret-key" } } } } ``` ### Use Cases **DevSecOps**: Integrate security scanning into CI/CD pipelines. **Runtime Protection**: Detect and block threats in running workloads. **Identity Governance**: Manage cloud identity permissions and access. **Compliance**: Maintain compliance across multi-cloud environments. The Prisma Cloud MCP Server delivers comprehensive cloud-native security.
{
"mcpServers": {
"prisma-cloud": {}
}
}