Introduction

When an organization onboards an Azure environment to Prisma Cloud DSPM, there are several options available - onboarding individual subscriptions or onboarding an entire tenant or management group. When choosing to onboard an entire tenant or management group, the organization gains several benefits:

Prerequisites

Onboarding Process

  1. Log in to Prisma Cloud DSPM.
  2. In the sidebar, click Setting.
  3. In the Integrations tab, locate Microsoft Azure under the Cloud Platforms section.
  4. Click Configure.
  5. In the Microsoft Azure Connected Subscriptions window, click Add New, and select Tenant.
  6. Make sure you are signed in to the tenant you want to onboard.
  7. Select the location of the orchestrator to be used for the classification of the tenant.
  8. Click Generate Template, and follow the steps to deploy the template.

After deploying the template, an Azure Policy is deployed to create the resources required to monitor all subscriptions by Prisma Cloud DSPM.

NOTE: All subscriptions other than the orchestrator have the ‘Prisma Cloud DSPM-Security-Scanner-Role’ and ‘Prisma Cloud DSPM-Security-Reader-Role’ deployed and assigned.

Due to limitations in Azure Policy, the template continues to run for 24 hours following the initial deployment.

Permissions Required by Prisma Cloud DSPM at the Tenant Level

Permission Name
Scope
Purpose
Application.Read.All
Tenant
Find the Prisma Cloud DSPM enterprise applications to associate the permissions with it
User.read
Tenant
Identification of identity-related risks

In addition to the above permissions, Prisma Cloud DSPM also associates the policy that is created at onboarding time with the ‘Owner’ role. This role is attached to the policy at creation time and can’t be used by DSPM to alter the environment. This role is required in order to auto-provision DSPM on newly added subscriptions.

For further details refer to the Technical Details section below.

Technical Details