PCCSE: Prisma Certified Cloud Security Engineer

The Prisma Certified Cloud Security Engineer (PCCSE) certification validates the knowledge, skills and abilities required to onboard, deploy and administer all aspects of Prisma Cloud. Individuals with the PCCSE certification will have demonstrated in-depth knowledge of Palo Alto Networks Prisma Cloud technology and resources.

Certification Objectives

The cloud has changed all aspects of application development lifecycles. The Prisma Cloud platform offers the industry’s broadest security and compliance coverage—for applications, data, and the entire cloud native technology stack—throughout the development lifecycle and across multi- and hybrid cloud environments. The certification objectives cover Prisma Cloud, Prisma Cloud Enterprise, and Prisma Cloud Compute.

Palo Alto Networks Certifications not only benefits organizations, but also benefits the individuals by showcasing their knowledge of the Palo Alto Networks product portfolio. It provides an immediate improvement of their professional profile and aligns them with the fastest-growing security company for those with their sights on the future.

Target Audience

Anyone interested in demonstrating knowledge, skill and abilities with Prisma Cloud including cloud security, customer success, DevOps, cloud support, professional services and Appsec engineers, cybersecurity architects, and team leads.

Palo Alto PCCSE Exam Overview:

Exam Name Cloud Security Engineer
Exam Number   PCCSE
Exam Price   $175 USD
Duration  90 minutes 
Number of Questions   75-85
Passing Score   Variable (70-80 / 100 Approx.)
Recommended Training  Prisma Cloud – Monitoring and Securing (EDU-150)
Prisma Cloud – Onboarding and Operationalizing (EDU-152)
Sample Questions   Palo Alto PCCSE Sample Questions
Practice Exam   Prisma Certified Cloud Security Engineer Practice Test

Palo Alto PCCSE Exam Topics:

Section Weight  Objectives 
Install and Upgrade 18% 

– Deploy and manage Console for the Compute Edition

◉ Locate and download Prisma Cloud release software.
◉ Install Console in onebox configuration.
◉ Install Console in Kubernetes.
◉ Perform upgrade on Console.

– Deploy and manage Defenders

◉ Deploy Container Defenders.
◉ Deploy Host Defenders.
◉ Deploy Serverless Defenders.
◉ Deploy App-embedded Defenders.
◉ Configure networking for Defender to Console connectivity.
◉ Perform upgrade on Defenders.

Visibility, Security and Compliance 20% 

– Configure policies

◉ Understand policies related to compliance standards.
◉ Build custom policies.
◉ Identify policy types.

– Configure alerting and notifications

◉ Understand alert states.
◉ Build alert rules.
◉ Create alert notifications.
◉ Investigate alerts.

– Understand third-party integrations

◉ Understand inbound and outbound notifications.

– Perform ad hoc investigations

◉ Investigate resource configuration with RQL.
◉ Investigate user activity using RQL.
◉ Investigate network activity using RQL.
◉ Investigate anomalous user event(s).

– Identify assets in a Cloud account

◉ Identify inventory of resources in a cloud account.
◉ Identify how to check resource configuration history.

– Use Prisma Cloud APIs

◉ Use APIs for automation of tasks.
◉ Use APIs for custom queries.

Cloud Workload Protection Platform 22% 

– Monitor and Protect Against Image Vulnerabilities

◉ Understand how to Investigate Image Vulnerabilities.
◉ Configure Image Vulnerability Policy.

– Monitor and Protect Host Vulnerabilities

◉ Understand how to Investigate Host Vulnerabilities.
◉ Configure Host Vulnerability Policy.

– Monitor and Enforce Image/Container Compliance

◉ Understand how to Investigate Image and Container Compliance.
◉ Configure Image and Container Compliance Policy.

– Monitor and Enforce Host Compliance

◉ Understand how to Investigate Host Compliance.
◉ Configure Host Compliance Policy.

– Monitor and Enforce Container Runtime

◉ Understand container models.
◉ Configure container runtime policies.
◉ Understand container runtime audits.
◉ Investigate incidents using Incident Explorer.

– Configure cloud native application firewalls

◉ Configure cloud native application firewall policies.

– Monitor and Protect Against Serverless Vulnerabilities

◉ Understand how to Investigate Serverless Vulnerabilities.
◉ Configure Serverless Vulnerability Policy.
◉ Configure Serverless Auto-Protect functionality.

Data Loss Prevention 9% 

– Onboarding

◉ Configure CloudTrail and SNS.
◉ Configure Scan options.

– Use Data Dashboard features

◉ Classify objects.
◉ List object permissions for visibility.
◉ Viewing Data inventory.
◉ Viewing Resource Explorer.
◉ List Object Identifiers.
◉ Knowing Object exposure states.

– Assess Data Policies and Alerts

◉ Differentiate differences between malware and regular policies.
◉ Understand the scope of alert notifications.

Web Application and API Security 5% – Configure CNAF policies 
Dev SecOps Security (Shift-Left) 11% 

– Implement scanning for IAC templates

◉ Differentiate between Terraform and Cloudformation scanning configurations.
◉ List OOTB IAC scanning integrations.
◉ Configure API scanning for IAC templates.

– Configure policies in Console for IAC scanning

◉ Review OOTB policies for IAC scanning.
◉ Configure custom build policies for IAC scanning.

– Integrate Compute scans into CI/CD pipeline

◉ Integrate container scans into CI/CD pipeline.
◉ Integrate serverless scans into CI/CD pipeline.
◉ Identify different options for scanning: Twistclip and plugins.

– Configure CI policies for Compute scanning

◉ Review default CI policies for Compute scanning.
◉ Configure custom CI policies for Compute scanning.

Prisma Cloud Administration -include Compute 15%

– Onboard accounts

◉ Onboarding cloud accounts.
◉ Configure account groups.

– Configure RBAC

◉ Differentiate between Prisma Cloud and Compute roles.
◉ Configure Prisma Cloud and Compute roles.

– Configure admission controller

◉ Configure defender as an admission controller.
◉ Create OPA policies

– Configure logging

◉ Familiarize with audit logging.
◉ Enable defender logging.

– Manage enterprise settings

◉ Differentiate UEBA settings.
◉ Configure idle timeout.
◉ Set autoenable policies.
◉ Set mandatory dismissal reason(s).
◉ Enable user attribution.

– Understand third-party integrations

◉ Understand inbound and outbound notifications.
◉ Configure third-party integration for alerts.

– Leverage Compute APIs

◉ Authenticate with APIs.
◉ Locate API documentation.
◉ List policies by API.
◉ Manage alerts using APIs.
◉ Create reports using APIs.
◉ Download vulnerability results via API.