Palo Alto Networks has bolstered its cloud security software with features that help customers quickly spot suspicious behaviors and trace security issues to their source to better protect enterprise software-as-a-service (SaaS) applications.\nThe vendor has added a variety of new components, under the moniker Darwin, to its core cloud-security package, Prisma Cloud. The core platform already includes application-security features such as access control, advanced threat protection, user-behavior monitoring, and the ability to code security directly into SaaS applications. Managed through a single console, Prisma Cloud also includes firewall as a service, zero-trust network access (ZTNA), a cloud-access security broker (CASB), and a secure web gateway.\nWith the Darwin release, Palo Alto is adding vulnerability and remediation capabilities along with upgraded visibility and forensics features.\u00a0\n\u201cPrisma Cloud and Darwin help customers secure applications from their inception in code to their deployment in the cloud to their active running environments where it identifies, connects and fixes risks at every step,\u201d wrote Ankur Shah, senior vice president and general manager of Palo Alto\u2019s Prisma Cloud business, in a blog about the new software.\n\u201cIntroduced in the Darwin release, security issues aren\u2019t just identified. They\u2019re traced to their source in code and back, allowing for effective remediation at the origin of risk. To prevent problems from multiplying as applications are built and deployed,\u201d Shah wrote.\nDarwin can provide intricate details about a cloud application\u2019s services, including infrastructure assets, compute workloads, API endpoints, data and code that make up the application. This feature, called AppDNA, aims to give customers visibility into every resource component that makes up an application.\nIt works with another new feature, Cloud Discovery and Exposure Management, that lets security teams discover, evaluate and mitigate unknown and unmanaged internet exposure risks in their cloud environments, Shah said.\nThe feature highlights rogue assets to provide a comprehensive risk assessment and lets users more efficiently onboard unmanaged assets to Prisma Cloud, helping secure cloud infrastructure against previously unmanaged risks, Shah wrote.\nPalo Alto also made improvements to its management interface to help customers more easily trace vulnerabilities, fix them and track their progress. It is a key part of another new feature, Infinity Graph, that makes it easier to understand risks, Shah stated.\u00a0\nAnother feature, called Code-to-Cloud Intelligence, lets customers track risks and develop a roadmap to remediate a problem.\u00a0\n\u201cOpening tickets for remediation is extremely inefficient, yet still the most common way to resolve issues. With Prisma Cloud, you can immediately fix risks in the cloud and open a pull request for developers to address the issue at the source \u2014 preventing it from happening again,\u201d Shah wrote.\n\u201cBy correlating the security stack across misconfigurations, vulnerabilities, pipeline risks, exposure, identity and secrets, sensitive data, and more, you see the potential attack paths leading to a breach,\u201d Shah stated. \u201cBeyond showing what could go wrong, the graph overlays active attack attempts to show you what\u2019s actually occurring and whether you have protection in place.\u201d\nIn addition, the new Infinity Graph feature lets customers search and investigate issues by asking any question, perform forensics, and create guardrails, Shah wrote. \u00a0\nAnother new feature, called Code-to-Cloud Dashboard, lets users centrally see and control the entire application lifecycle, down to the supply chain. The main dashboard provides analytics across each stage of the software development lifecycle to aid in decision-making and reporting, Shah wrote.\nPalo Alto\u2019s Prisma Cloud competes in the market for cloud-native application protection platforms (CNAPP); Microsoft, CrowdStrike, Zscaler, Orca and many more vendors offer CNAPPs.\n\u201cCNAPPs consolidate a large number of previously siloed capabilities, including container scanning, cloud security posture management, infrastructure as code scanning, cloud infrastructure entitlement management, runtime cloud workload protection and runtime vulnerability\/configuration scanning,\u201d wrote Gartner in as recent analysis of the CNAPP market.\nCNAPP programs are important as the attack surface of cloud-native applications is increasing. Attackers are targeting the misconfiguration of cloud infrastructure (network, compute, storage, identities and permissions), APIs and the software supply chain itself, Gartner stated.