Get to Know Your Engineering Ecosystem

Ensuring visibility into your engineering tools and ecosystems is critical in today's dynamic technology landscape. With the increasing diversity and constant introduction of new engineering tools, it becomes crucial to have real-time and continuous insights into your engineering environment. This not only empowers you to address security concerns promptly but also allows you to customize security solutions to your unique setup, ultimately leading to a more resilient and secure software development and deployment process.

1. Connect Prisma Cloud to your VCS and CI/CD Systems

Begin by onboarding your Version Control systems(s) and CI/CD systems on Prisma Cloud.

    1. GitHub
    2. GitHub Enterprise
    3. GitLab
    4. GitLab Self-hosted
    5. Bitbucket
    6. Bitbucket Server
    7. Azure Repos
    8. CircleCI
    9. Jenkins Plugin

2. Assess Your Code Repositories

Prisma Cloud provides a comprehensive view of your engineering ecosystem from code to deployment, all within a repository-based view. This lets you identify code repositories and their associated infrastructure, including programming languages, frameworks, CI files and connected pipelines.

3. Get to Know Your SDLC Technologies, Shadow IT, Unmanaged assets

Engineering ecosystem continuous visibility is critical for your application security program success. To make sure you are protecting your most critical assets, use Technologies Overview for your SDLC technologies inventory.

To understand where these technologies were discovered, click on a technology and assess its Source .

4. Assess third- party Technologies Used in the Engineering Ecosystem

Gain visibility across all third-parties in your engineering ecosystem including apps and webhooks, Jenkins plugins and pipeline tools.

The table is sorted by the highest severity issues.

5. Explore the Organization SBOM (Software Bill of Materials)

Gain visibility into the Software Bill of Materials (SBOM) across your organization. This allows you to understand your software inventory including libraries, versions, licenses of third party components and open source packages, as well as to identify all detected vulnerabilities.