{"info":{"_postman_id":"8b16df34-187e-4d22-9c15-9fe0ea75c5b7","name":"Prisma Cloud","schema":"https://schema.getpostman.com/json/collection/v2.0.0/collection.json","toc":[],"description":"<html><head></head><body></body></html>","owner":"2937330","collectionId":"8b16df34-187e-4d22-9c15-9fe0ea75c5b7","publishedId":"SWTBdxFJ","public":true,"customColor":{"top-bar":"FFFFFF","right-sidebar":"303030","highlight":"EF5B25"},"publishDate":"2020-09-04T01:39:48.000Z"},"item":[{"name":"Login","item":[{"name":"Login","event":[{"listen":"test","script":{"id":"73f33f8a-0357-4083-9ca8-4bad3ab6d601","exec":["var jsonData = JSON.parse(responseBody);","postman.setEnvironmentVariable(\"token\", jsonData.token);"],"type":"text/javascript"}}],"id":"1365367a-79a0-4e1d-983f-a44380cd2dbe","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","value":"application/json; charset=UTF-8"},{"key":"content-type","value":"application/json"}],"body":{"mode":"raw","raw":"{\n    \"username\": \"{{user-name}}\",\n    \"password\": \"{{pass-word}}\"\n}"},"url":"https://{{api-endpoint}}/login","description":"<p>Returns a JWT auth token for accessing the Prisma Cloud APIs. To generate a token, you must have an access key and include the following values in the request body parameter — access key ID as the username and your secret key as the password. Prisma Cloud requires this JWT in the request header to authorize API access.</p>\n","urlObject":{"protocol":"https","path":["login"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"1365367a-79a0-4e1d-983f-a44380cd2dbe"},{"name":"Refresh Session","id":"8b8bfd9b-827a-40cc-98f6-3f6d98c8fc6c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/auth_token/extend","description":"<p>Extend a user's session. The JWT token returned is valid until the next session timeout occurs. This method requires a valid session token to be passed (token from a prior successful extend or login calls).</p>\n","urlObject":{"protocol":"https","path":["auth_token","extend"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"8b8bfd9b-827a-40cc-98f6-3f6d98c8fc6c"}],"id":"a4cdc18a-0833-4d05-8daf-2dd4cb0c8325","_postman_id":"a4cdc18a-0833-4d05-8daf-2dd4cb0c8325","description":""},{"name":"System","item":[{"name":"Health Check","id":"f39a4eb6-3013-4d75-b55f-cd5bef6cc337","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/check","description":"<p>Allows a user to check and see if the Prisma Cloud API is up and running.</p>\n","urlObject":{"protocol":"https","path":["check"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"f39a4eb6-3013-4d75-b55f-cd5bef6cc337"}],"id":"79bd1475-caf9-41c0-b9ef-4ec67d0416aa","_postman_id":"79bd1475-caf9-41c0-b9ef-4ec67d0416aa","description":""},{"name":"User Profile","item":[{"name":"Profile","id":"b14948da-4cc0-4248-a540-713a3769f3f3","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/user/me","description":"<p>Returns the current user's personal profile information.</p>\n","urlObject":{"protocol":"https","path":["user","me"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"b14948da-4cc0-4248-a540-713a3769f3f3"},{"name":"Update Profile","id":"b8e2b9dc-6c3b-43c3-b43c-f013ba253320","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PUT","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{\n    \"firstName\": \"\",\n    \"lastName\": \"\",\n    \"timeZone\": \"\"\n}","options":{"raw":{"language":"json"}}},"url":"https://{{api-endpoint}}/user/me","description":"<p>Updates the current user's personal profile information.</p>\n","urlObject":{"protocol":"https","path":["user","me"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"b8e2b9dc-6c3b-43c3-b43c-f013ba253320"},{"name":"List Users","id":"2e0d3707-628c-489f-bec4-5447a6265fbd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/user","description":"<p>Get a list of all the users belonging to the same tenant.</p>\n","urlObject":{"protocol":"https","path":["user"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"2e0d3707-628c-489f-bec4-5447a6265fbd"},{"name":"Add New User Profile","id":"c34161ff-9246-47f8-97f8-2ff2d9ec8847","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PUT","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{\n    \"email\": \"\",\n    \"firstName\": \"\",\n    \"lastName\": \"\",\n    \"timeZone\": \"\",\n    \"roleId\": \"\"\n}","options":{"raw":{"language":"json"}}},"url":"https://{{api-endpoint}}/user","description":"<p>Adds a new administrative user.</p>\n","urlObject":{"protocol":"https","path":["user"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"c34161ff-9246-47f8-97f8-2ff2d9ec8847"},{"name":"List Usernames","id":"e4a011e9-f40b-4fb9-a4ac-f351969605c0","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/user/name","description":"<p>Returns a list of emails for all non-deleted users in the system.</p>\n","urlObject":{"protocol":"https","path":["user","name"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"e4a011e9-f40b-4fb9-a4ac-f351969605c0"},{"name":"List User Role Types","id":"908276f9-311a-4d5f-a4fc-c5acc71d338a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/user/role/type","description":"<p>Returns a list of permission groups to which users can belong.</p>\n","urlObject":{"protocol":"https","path":["user","role","type"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"908276f9-311a-4d5f-a4fc-c5acc71d338a"},{"name":"Get User Profile","id":"48d4ea2d-3faf-4afb-9295-b139bd7c473d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/user/{{user}}","description":"<p>Return the user profile for the specified email ID.</p>\n","urlObject":{"protocol":"https","path":["user","{{user}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"48d4ea2d-3faf-4afb-9295-b139bd7c473d"},{"name":"Update User Profile","id":"bd34ea03-a8f9-478c-b381-45f27cd58ad6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PUT","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{\n    \"email\": \"\",\n    \"firstName\": \"\",\n    \"lastName\": \"\",\n    \"timeZone\": \"\",\n    \"roleId\": \"\"\n}","options":{"raw":{"language":"json"}}},"url":"https://{{api-endpoint}}/user/{{user}}","description":"<p>Updates an administrative user's profile.</p>\n","urlObject":{"protocol":"https","path":["user","{{user}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"bd34ea03-a8f9-478c-b381-45f27cd58ad6"},{"name":"Delete User Profile","id":"42589cb9-c46d-4e93-96e8-9b672e6d8916","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"DELETE","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://{{api-endpoint}}/user/{{user}}","description":"<p>Deletes an administrative user's profile.</p>\n","urlObject":{"protocol":"https","path":["user","{{user}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"42589cb9-c46d-4e93-96e8-9b672e6d8916"},{"name":"Update User Status","id":"580a4485-d845-4291-90a1-2b17598b6145","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PATCH","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"","options":{"raw":{"language":"json"}}},"url":"https://{{api-endpoint}}/user/{{id}}/status/{{enabled}}","description":"<p>Enables/disables a user.</p>\n","urlObject":{"protocol":"https","path":["user","{{id}}","status","{{enabled}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"580a4485-d845-4291-90a1-2b17598b6145"},{"name":"List Email Domains","id":"5353e3bb-a64f-4187-a112-1d29bb8f830b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/user/domain","description":"<p>Returns a list of whitelisted domains.</p>\n","urlObject":{"protocol":"https","path":["user","domain"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"5353e3bb-a64f-4187-a112-1d29bb8f830b"},{"name":"List SSO Bypass Allowed Users","id":"ac5dbad1-2cba-4841-b13c-588f244cc007","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/user/saml/bypass","description":"<p>Returns a list of users who can login via both SAML provider and username/password flows.</p>\n","urlObject":{"protocol":"https","path":["user","saml","bypass"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"ac5dbad1-2cba-4841-b13c-588f244cc007"},{"name":"Update SSO Bypass Allowed Users","id":"7cca56e6-1163-42d2-a535-771bc3a08577","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PUT","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"[\n    \"jon.snow@example.com\",\n    \"daenerys@example.com\"\n]","options":{"raw":{"language":"json"}}},"url":"https://{{api-endpoint}}/user/saml/bypass","description":"<p>Expects a list of user emails in request body. These users will then be allowed to login via both SAML provider and username/password flows.</p>\n","urlObject":{"protocol":"https","path":["user","saml","bypass"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"7cca56e6-1163-42d2-a535-771bc3a08577"}],"id":"250a63f7-9757-4320-9ed0-227644620fee","_postman_id":"250a63f7-9757-4320-9ed0-227644620fee","description":""},{"name":"User Roles","item":[{"name":"List User Roles","id":"d800e5de-c0c5-40f5-bcf2-3e64e24b299a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/user/role","description":"<p>Returns an array of user roles.</p>\n","urlObject":{"protocol":"https","path":["user","role"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"d800e5de-c0c5-40f5-bcf2-3e64e24b299a"},{"name":"Add User Role","id":"65623ca6-a728-4df1-aab4-560a5c7ab1e6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{\n    \"name\": \"\",\n    \"roleType\": \"\"\n}"},"url":"https://{{api-endpoint}}/user/role","description":"<p>Create a new user role on the Prisma Cloud platform.</p>\n","urlObject":{"protocol":"https","path":["user","role"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"65623ca6-a728-4df1-aab4-560a5c7ab1e6"},{"name":"List User Role Names","id":"1106fcff-96ae-456e-a017-9cf67d81b313","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/user/role/name","description":"<p>Returns list of user role IDs and names.</p>\n","urlObject":{"protocol":"https","path":["user","role","name"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"1106fcff-96ae-456e-a017-9cf67d81b313"},{"name":"User Role Info","id":"fa7e5d9d-84d9-41c2-ac94-0bd7055dc8d5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/user/role/{{role}}","description":"<p>Retrieve all information about an user role using its ID.</p>\n","urlObject":{"protocol":"https","path":["user","role","{{role}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"fa7e5d9d-84d9-41c2-ac94-0bd7055dc8d5"},{"name":"Update User Role","id":"7a5aaf7b-705b-4c4e-9626-4715d4c8e2ce","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PUT","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{\n    \"name\": \"\",\n    \"roleType\": \"\"\n}"},"url":"https://{{api-endpoint}}/user/role/{{role}}","description":"<p>Update information related to an existing user role.</p>\n","urlObject":{"protocol":"https","path":["user","role","{{role}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"7a5aaf7b-705b-4c4e-9626-4715d4c8e2ce"},{"name":"Delete User Role","id":"66e48e98-3ee4-466c-88d2-36f03eb4c689","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"DELETE","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":""},"url":"https://{{api-endpoint}}/user/role/{{role}}","description":"<p>Delete an existing user role using its ID.</p>\n","urlObject":{"protocol":"https","path":["user","role","{{role}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"66e48e98-3ee4-466c-88d2-36f03eb4c689"}],"id":"71709044-e9f4-4730-ac9b-f53af013f1fe","_postman_id":"71709044-e9f4-4730-ac9b-f53af013f1fe","description":""},{"name":"Access Keys","item":[{"name":"List Access Keys","id":"d0ccaa62-ea5c-4f61-b1a1-703b93003eb6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/access_keys","description":"<p>Returns a list of access keys that belong to the current user.</p>\n","urlObject":{"protocol":"https","path":["access_keys"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"d0ccaa62-ea5c-4f61-b1a1-703b93003eb6"},{"name":"Add Access Key","id":"578b792a-2159-438d-bc26-405f393cd988","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{\n    \"name\": \"\",\n    \"expiresOn\": \"\"\n}"},"url":"https://{{api-endpoint}}/access_keys","description":"<p>Adds a new access key for the current user. If you have API access, you can create up to two access keys.</p>\n","urlObject":{"protocol":"https","path":["access_keys"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"578b792a-2159-438d-bc26-405f393cd988"},{"name":"Get Access Key by ID","id":"44756018-9ede-4c7c-a507-7937f56f7387","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/access_keys/{{access_key}}","description":"<p>Returns the metadata of the access key that has the specified ID.</p>\n","urlObject":{"protocol":"https","path":["access_keys","{{access_key}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"44756018-9ede-4c7c-a507-7937f56f7387"},{"name":"Update Access Key","id":"87e9bad1-b672-404c-b074-d80427488a9a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PUT","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{\n    \"name\": \"hagen-key\",\n    \"expiresOn\": \"1609425767000\"\n}"},"url":"https://{{api-endpoint}}/access_keys/{{access_key}}","description":"<p>Updates data for the access key that has the specified ID.</p>\n","urlObject":{"protocol":"https","path":["access_keys","{{access_key}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"87e9bad1-b672-404c-b074-d80427488a9a"},{"name":"Delete Access Key","id":"521a42be-4cb9-4058-b199-4376858cfce5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"DELETE","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/access_keys/{{access_key}}","description":"<p>Deletes the access key that has the specified ID.</p>\n","urlObject":{"protocol":"https","path":["access_keys","{{access_key}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"521a42be-4cb9-4058-b199-4376858cfce5"},{"name":"Update Access Key Status","id":"18fa416d-da1a-44da-8db6-006553503e82","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PATCH","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":""},"url":"https://{{api-endpoint}}/access_keys/{{access_key}}/status/{{enabled}}","description":"<p>Activates or deactivates the access key that has the specified ID. You cannot activate an expired access key.</p>\n","urlObject":{"protocol":"https","path":["access_keys","{{access_key}}","status","{{enabled}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"18fa416d-da1a-44da-8db6-006553503e82"}],"id":"8941c1df-a425-41a7-8288-331bc0a4e13f","_postman_id":"8941c1df-a425-41a7-8288-331bc0a4e13f","description":""},{"name":"Cloud Accounts","item":[{"name":"List Cloud Accounts","id":"4915d363-f953-4412-9532-ee88bba72ecc","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/cloud","description":"<p>Lists all cloud accounts onboarded onto the Prisma Cloud platform.</p>\n","urlObject":{"protocol":"https","path":["cloud"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"4915d363-f953-4412-9532-ee88bba72ecc"},{"name":"List Cloud Types","id":"d5ba756e-9f05-49a0-8986-3d8e4a287d08","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/cloud/type","description":"<p>Returns all the cloud types.</p>\n","urlObject":{"protocol":"https","path":["cloud","type"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"d5ba756e-9f05-49a0-8986-3d8e4a287d08"},{"name":"Add Cloud Account","id":"1f494e8f-56c5-4e2a-935b-e4c2031d1dc6","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{\n    \"accountId\": \"\",\n    \"enabled\": true,\n    \"externalId\": \"\",\n    \"groupIds\": [],\n    \"name\": \"\",\n    \"roleArn\": \"\"\n}"},"url":"https://{{api-endpoint}}/cloud/{{cloud_type}}","description":"<p>Onboard a new cloud account onto the Prisma Cloud platform.</p>\n","urlObject":{"protocol":"https","path":["cloud","{{cloud_type}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"1f494e8f-56c5-4e2a-935b-e4c2031d1dc6"},{"name":"Cloud Account Info","id":"cf8ac537-66b7-4ca6-b352-c9b39fef0873","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/cloud/{{cloud_type}}/{{account_id}}","description":"<p>Returns top level information about the cloud account.</p>\n","urlObject":{"protocol":"https","path":["cloud","{{cloud_type}}","{{account_id}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"cf8ac537-66b7-4ca6-b352-c9b39fef0873"},{"name":"Update Cloud Account","id":"719e4422-899d-42a3-8bf1-53913a17034f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PUT","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{\n    \"accountId\": \"\",\n    \"enabled\": true,\n    \"externalId\": \"\",\n    \"groupIds\": [],\n    \"name\": \"\",\n    \"roleArn\": \"\"\n}"},"url":"https://{{api-endpoint}}/cloud/{{cloud_type}}/{{account_id}}","description":"<p>Update information related to a cloud account.</p>\n","urlObject":{"protocol":"https","path":["cloud","{{cloud_type}}","{{account_id}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"719e4422-899d-42a3-8bf1-53913a17034f"},{"name":"Delete Cloud Account","id":"e0d88183-b50a-4d26-a294-531ba609f565","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"DELETE","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/cloud/{{cloud_type}}/{{account_id}}","description":"<p>Delete onboarded cloud account using cloud account ID.</p>\n","urlObject":{"protocol":"https","path":["cloud","{{cloud_type}}","{{account_id}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"e0d88183-b50a-4d26-a294-531ba609f565"},{"name":"Patch Cloud Account","id":"8a8ee99e-4459-4ce8-bb4d-a7df513daa3a","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PATCH","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"url":"https://{{api-endpoint}}/cloud/{{cloud_type}}/{{account_id}}","description":"<p>Enable / disable cloud account (and children) OR Update the Account Groups it belongs to.</p>\n","urlObject":{"protocol":"https","path":["cloud","{{cloud_type}}","{{account_id}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"8a8ee99e-4459-4ce8-bb4d-a7df513daa3a"},{"name":"Get Cloud Account Status","id":"d9a320f2-b808-4801-b655-f9ad14606f58","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{}"},"url":"https://{{api-endpoint}}/cloud/status/{{cloud_type}}","description":"<p>Lists status messages of the specified cloud account.</p>\n","urlObject":{"protocol":"https","path":["cloud","status","{{cloud_type}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"d9a320f2-b808-4801-b655-f9ad14606f58"},{"name":"Update Cloud Account Status","id":"7ad64fb4-d6a5-4b73-ab73-0ddc06145781","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"PATCH","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"{}"},"url":"https://{{api-endpoint}}/cloud/{{cloud_type}}/{{account_id}}/{{enabled}}?updateChildren=false","description":"<p>Enable / disable cloud account.</p>\n","urlObject":{"protocol":"https","path":["cloud","{{cloud_type}}","{{account_id}}","{{enabled}}"],"host":["{{api-endpoint}}"],"query":[{"description":{"content":"<p>Allows for updating status of children cloud accounts if any. Default is false.</p>\n","type":"text/plain"},"key":"updateChildren","value":"false"}],"variable":[]}},"response":[],"_postman_id":"7ad64fb4-d6a5-4b73-ab73-0ddc06145781"}],"id":"ddab5800-de7c-43eb-8e6f-b4e8369db195","_postman_id":"ddab5800-de7c-43eb-8e6f-b4e8369db195","description":""},{"name":"Account Groups","item":[],"id":"e8c70fd6-5314-4dd6-96eb-9b964dfa044e","_postman_id":"e8c70fd6-5314-4dd6-96eb-9b964dfa044e","description":""},{"name":"Policy","item":[{"name":"List Policies","id":"9699d66f-6672-4aca-a0a7-9d3740793e1d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"url":"https://{{api-endpoint}}/policy","description":"<p>Get all available policies (system default and custom).</p>\n","urlObject":{"protocol":"https","path":["policy"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"9699d66f-6672-4aca-a0a7-9d3740793e1d"},{"name":"Add Policy","id":"275f27f7-a45b-4b33-ad65-5585ca9ad739","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","value":"*/*"},{"key":"content-type","value":"application/json"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"body":{"mode":"raw","raw":"{\n  \"name\": \"APITestRule Firewall allows internet traffic to SSH port (22)\",\n  \"policyType\": \"config\",\n  \"description\": \"Checks to ensure that Firewall does not allow inbound traffic on SSH port (22) from public internet. Allowing access from arbitrary internet IP addresses to this port increases the attack surface of your network.\",\n  \"severity\": \"high\",\n  \"rule\": {\n    \"name\": \"GCP Firewall allows internet traffic to SSH port (22)\",\n   \n    \"criteria\": \"config where api.name='gcloud-compute-firewall-rules-list' AND json.rule='$.sourceRanges[*] contains 0.0.0.0/0 and $.allowed[*].ports[*] == 22'\",\n    \"parameters\": {\n      \"savedSearch\": \"false\"\n    },\n    \"type\": \"Config\"\n  },\n  \"recommendation\": \"1. Login to GCP Console and from Networking, select VPC network.\\n2. Go to Firewall rules and click on Ingress.\\n3. Select the rules that have 'Source filters' set to 'IP ranges: 0.0.0.0/0' and 'Protocols / ports' to 'tcp:22'.\\n4. Delete the specific rule.\",\n  \"cloudType\": \"gcp\",\n  \"complianceMetadata\": [\n    {\n      \"standardName\": \"SOC2\",\n      \"requirementId\": \"CC6\",\n      \"requirementName\": \"Logical and Physical Access Controls\",\n      \"sectionId\": \"CC6.1\",\n      \"sectionDescription\": \"The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives. \",\n      \"policyId\": \"49a154e8-6049-4317-bbb5-0c90cb078f94\",\n      \"complianceId\": \"72bcd5c2-2a68-4364-a8ef-82eaf3f566f9\",\n      \"sectionLabel\": \"1\",\n      \"customAssigned\": false\n    },\n    {\n      \"standardName\": \"SOC2\",\n      \"requirementId\": \"CC6\",\n      \"requirementName\": \"Logical and Physical Access Controls\",\n      \"sectionId\": \"CC6.6\",\n      \"sectionDescription\": \"The entity implements logical access security measures to protect against threats from sources outside its system boundaries.  \",\n      \"policyId\": \"49a154e8-6049-4317-bbb5-0c90cb078f94\",\n      \"complianceId\": \"ccb75284-13a3-4587-a69d-edd4163807f0\",\n      \"sectionLabel\": \"6\",\n      \"customAssigned\": false\n    }\n  ],\n  \"labels\": [\n    \"GCP\"\n  ]\n}"},"url":"https://{{api-endpoint}}/policy","description":"<p>Add new policy (check body for details)</p>\n","urlObject":{"protocol":"https","path":["policy"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"275f27f7-a45b-4b33-ad65-5585ca9ad739"},{"name":"List Policy Compliance Standards","id":"edcd3aa9-0ad2-4a6f-a087-e9da8632e3af","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"*/*"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"url":"https://{{api-endpoint}}/policy/compliance","description":"<p>Returns detailed compliance standards that Prisma Cloud supports.</p>\n","urlObject":{"protocol":"https","path":["policy","compliance"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"edcd3aa9-0ad2-4a6f-a087-e9da8632e3af"}],"id":"0ab27929-f3ec-4732-b36b-f638664bc264","_postman_id":"0ab27929-f3ec-4732-b36b-f638664bc264","description":""},{"name":"Alerts","item":[{"name":"List Alerts","id":"0b3e3e42-280c-49fe-8666-48d9737418b7","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"url":"https://{{api-endpoint}}/alert?timeType=relative&timeAmount=1&timeUnit=week&detailed=true","description":"<p>Returns a list of alerts that match the constraints specified in the query parameters.</p>\n","urlObject":{"protocol":"https","path":["alert"],"host":["{{api-endpoint}}"],"query":[{"key":"timeType","value":"relative"},{"key":"timeAmount","value":"1"},{"key":"timeUnit","value":"week"},{"key":"detailed","value":"true"}],"variable":[]}},"response":[],"_postman_id":"0b3e3e42-280c-49fe-8666-48d9737418b7"},{"name":"List Alerts (Filtered)","id":"3e52b4c6-8be9-400b-adf1-6e63d3c9523f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"content-type","value":"application/json","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"body":{"mode":"raw","raw":"{\"timeRange\":{\"type\":\"to_now\",\"value\":\"epoch\"},\"filters\":[{\"name\":\"alert.status\",\"value\":\"resolved\",\"operator\":\"=\"}]}"},"url":"https://{{api-endpoint}}/alert?detailed=true","description":"<p>Returns a filtered list of alerts.\n(This example list all resolved alerts)</p>\n","urlObject":{"protocol":"https","path":["alert"],"host":["{{api-endpoint}}"],"query":[{"key":"detailed","value":"true"}],"variable":[]}},"response":[],"_postman_id":"3e52b4c6-8be9-400b-adf1-6e63d3c9523f"},{"name":"List Alerts V2","id":"dd0be2bb-6578-440a-bc3c-66c8e6a9497b","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"url":"https://{{api-endpoint}}/v2/alert?timeType=relative&timeAmount=1&timeUnit=week&detailed=true","description":"<p>Returns a paginated list of alerts from the Prisma Cloud platform.</p>\n","urlObject":{"protocol":"https","path":["v2","alert"],"host":["{{api-endpoint}}"],"query":[{"key":"timeType","value":"relative"},{"key":"timeAmount","value":"1"},{"key":"timeUnit","value":"week"},{"key":"detailed","value":"true"}],"variable":[]}},"response":[],"_postman_id":"dd0be2bb-6578-440a-bc3c-66c8e6a9497b"},{"name":"List Alerts V2 (Filtered)","id":"7fbba361-e293-4b75-8dc6-3277b8b1568e","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"content-type","value":"application/json","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"body":{"mode":"raw","raw":"{\"timeRange\":{\"type\":\"to_now\",\"value\":\"epoch\"}}"},"url":"https://{{api-endpoint}}/v2/alert?detailed=true","description":"<p>Returns a filtered and paginated list of alerts.\n(This example lists all resolved alerts)</p>\n","urlObject":{"protocol":"https","path":["v2","alert"],"host":["{{api-endpoint}}"],"query":[{"key":"detailed","value":"true"}],"variable":[]}},"response":[],"_postman_id":"7fbba361-e293-4b75-8dc6-3277b8b1568e"},{"name":"List Alerts Grouped By Policy","id":"9ee1e040-b977-4e03-b540-7983cd6b1315","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","value":"application/json; charset=UTF-8"},{"key":"Content-Type","value":"application/json","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"body":{"mode":"raw","raw":"{\"timeRange\":{\"type\":\"to_now\",\"value\":\"epoch\"}}"},"url":"https://{{api-endpoint}}/alert/policy?detailed=true","description":"<p>Returns a filtered list of alerts grouped by the policy they violated.</p>\n","urlObject":{"protocol":"https","path":["alert","policy"],"host":["{{api-endpoint}}"],"query":[{"key":"detailed","value":"true"}],"variable":[]}},"response":[],"_postman_id":"9ee1e040-b977-4e03-b540-7983cd6b1315"}],"id":"fbe16386-16ab-4bf9-bcdc-b31806c6743d","_postman_id":"fbe16386-16ab-4bf9-bcdc-b31806c6743d","description":""},{"name":"Asset Inventory","item":[{"name":"Inventory List Pass/Fail Summary","id":"dc0362d7-3ea1-4ef0-ba46-ba6ce8fa7e01","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"content-type","value":"application/json","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"body":{"mode":"raw","raw":"{\"timeRange\":{\"type\":\"to_now\",\"value\":\"epoch\"},\"detailed\":true}"},"url":"https://{{api-endpoint}}/inventory/dashboard/history","urlObject":{"protocol":"https","path":["inventory","dashboard","history"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"dc0362d7-3ea1-4ef0-ba46-ba6ce8fa7e01"}],"id":"cd23aa2d-e350-400c-bc1a-e13f99699dfd","_postman_id":"cd23aa2d-e350-400c-bc1a-e13f99699dfd","description":""},{"name":"Compliance Reports","item":[{"name":"List Reports","id":"a7dffb3c-b31f-451d-9be7-90aa96ece7dd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"url":"https://{{api-endpoint}}/report","description":"<p>Returns a list of compliance report IDs along with the metadata for each report.</p>\n","urlObject":{"protocol":"https","path":["report"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"a7dffb3c-b31f-451d-9be7-90aa96ece7dd"},{"name":"Get Report","id":"2787219c-e266-49df-8a0e-fb2d4a758135","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"url":"https://{{api-endpoint}}/report/{{report-id}}","description":"<p>Returns metadata for the compliance report with the specified ID.</p>\n","urlObject":{"protocol":"https","path":["report","{{report-id}}"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"2787219c-e266-49df-8a0e-fb2d4a758135"},{"name":"Download Report","id":"9c0ac0e4-2f35-4ccb-8ed5-b0ebe2f6e93c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"url":"https://{{api-endpoint}}/report/{{report-id}}/download","description":"<p>Downloads the compliance report with the specified ID.</p>\n","urlObject":{"protocol":"https","path":["report","{{report-id}}","download"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"9c0ac0e4-2f35-4ccb-8ed5-b0ebe2f6e93c"}],"id":"9ee0f616-42bd-41e1-b7cd-5cfe0a12faf1","_postman_id":"9ee0f616-42bd-41e1-b7cd-5cfe0a12faf1","description":""},{"name":"Compliance Posture","item":[],"id":"225cc073-4a7f-427c-af77-75da3171d99b","_postman_id":"225cc073-4a7f-427c-af77-75da3171d99b","description":""},{"name":"Compliance Dashboard","item":[],"id":"48d83948-a927-42e0-bb10-484638c8a6b8","_postman_id":"48d83948-a927-42e0-bb10-484638c8a6b8","description":""},{"name":"Compliance Standards","item":[],"id":"6b4d418c-79cc-46cb-9394-f1236e8ece0f","_postman_id":"6b4d418c-79cc-46cb-9394-f1236e8ece0f","description":""},{"name":"Resource Explorer","item":[],"id":"6515d7e7-4318-453c-bf5f-e4e50360a9a6","_postman_id":"6515d7e7-4318-453c-bf5f-e4e50360a9a6","description":""},{"name":"Audit Logs","item":[],"id":"4a26ae7e-4a5b-4525-9d5c-ecf3069bfc2a","_postman_id":"4a26ae7e-4a5b-4525-9d5c-ecf3069bfc2a","description":""},{"name":"Licensing","item":[{"name":"License Usage By Resource","id":"b9c7ff25-b8a3-48fd-a1a5-f7136d3b38d5","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"content-type","name":"Content-Type","value":"application/json","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"},{"key":"Content-Type","value":"application/json"}],"body":{"mode":"raw","raw":"{\"aggregate\":true,\"timeRange\":{\"type\":\"to_now\",\"value\":\"epoch\"}}","options":{"raw":{"language":"json"}}},"url":"https://{{api-endpoint}}/timeline/usage","description":"<p>Get a breakdown of resource usage over time</p>\n","urlObject":{"protocol":"https","path":["timeline","usage"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"b9c7ff25-b8a3-48fd-a1a5-f7136d3b38d5"}],"id":"cc6bb588-8692-48de-984c-84742f04f90d","_postman_id":"cc6bb588-8692-48de-984c-84742f04f90d","description":""},{"name":"IP Whitelisting","item":[],"id":"8431bbf4-78be-40cb-8398-c1ba8f4905a2","_postman_id":"8431bbf4-78be-40cb-8398-c1ba8f4905a2","description":""},{"name":"Search Manager","item":[],"id":"a3e3d8b8-1dfc-484f-95fb-1f9530b6542e","_postman_id":"a3e3d8b8-1dfc-484f-95fb-1f9530b6542e","description":""},{"name":"Search","item":[],"id":"8d4f37c5-cb5c-434a-af68-84f984f796b0","_postman_id":"8d4f37c5-cb5c-434a-af68-84f984f796b0","description":""},{"name":"Alert Rules","item":[{"name":"Lists Alert Rules","id":"52ca2a2e-7afd-4bf5-a078-a115f6698447","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"application/json; charset=UTF-8"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"url":"https://{{api-endpoint}}/alert/rule","urlObject":{"protocol":"https","path":["alert","rule"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"52ca2a2e-7afd-4bf5-a078-a115f6698447"}],"id":"c342011f-c056-40b1-aed2-75f92b713f03","_postman_id":"c342011f-c056-40b1-aed2-75f92b713f03","description":""},{"name":"Notification Templates","item":[],"id":"36ad60b2-f263-4b65-ac83-1631db54068d","_postman_id":"36ad60b2-f263-4b65-ac83-1631db54068d","description":""},{"name":"Integrations","item":[{"name":"LIst Integrations Types","id":"d6a775e8-314f-4595-a0ca-d2306417b376","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"url":"https://{{api-endpoint}}/integration/type","description":"<p>Returns a list of all supported integration types.</p>\n","urlObject":{"protocol":"https","path":["integration","type"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"d6a775e8-314f-4595-a0ca-d2306417b376"},{"name":"List All Integrations","id":"e90ecb6b-7144-4a78-a4ab-0f176b988c26","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"application/json; charset=UTF-8","type":"text"},{"key":"x-redlock-auth","value":"{{token}}","type":"text"}],"url":"https://{{api-endpoint}}/integration","description":"<p>Returns all your integrations, optionally filtered by type.</p>\n","urlObject":{"protocol":"https","path":["integration"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"e90ecb6b-7144-4a78-a4ab-0f176b988c26"}],"id":"33b96efb-e71a-495b-82e3-4517e7ee7d05","_postman_id":"33b96efb-e71a-495b-82e3-4517e7ee7d05","description":""},{"name":"Settings","item":[{"name":"Enterprise Settings","id":"d893d08a-f898-474e-ab1c-c3bc52b2222f","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"GET","header":[{"key":"accept","value":"*/*"},{"key":"x-redlock-auth","value":"{{token}}"}],"url":"https://{{api-endpoint}}/settings/enterprise","description":"<p>Get Enterprise Settings for your tenant.</p>\n","urlObject":{"protocol":"https","path":["settings","enterprise"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"d893d08a-f898-474e-ab1c-c3bc52b2222f"}],"id":"5f51d087-3556-4a8f-9887-bb3245d9941b","_postman_id":"5f51d087-3556-4a8f-9887-bb3245d9941b","description":""},{"name":"Infrastructure as Code","item":[{"name":"Scan CloudFormation Template for Vulnerabilities","id":"018c8c7e-3a9b-464a-83f0-3e922b8ad5cd","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"resource \"aws_security_group\" \"iac_sec_grp\" {\n  name        = \"iac_sec_grp\"\n  description = \"Used in the terraform\"\n  vpc_id      = \"${aws_vpc.main.id}\"\n\n  # SSH access from anywhere\n  ingress {\n    from_port   = 22\n    to_port     = 22\n    protocol    = \"tcp\"\n    cidr_blocks = [\"0.0.0.0/0\"]\n  }\n\n  # outbound internet access\n  egress {\n    from_port   = 0\n    to_port     = 0\n    protocol    = \"-1\"\n    cidr_blocks = [\"0.0.0.0/0\"]\n  }\n}","options":{"raw":{"language":"text"}}},"url":"https://{{api-endpoint}}/iac/cft/v1/scan","description":"<p>Scans the given CloudFormation template content and tests against Prisma Cloud IaC policies to identify insecure configurations.</p>\n","urlObject":{"protocol":"https","path":["iac","cft","v1","scan"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"018c8c7e-3a9b-464a-83f0-3e922b8ad5cd"},{"name":"Scan Terraform Plan for Vulnerabilities","id":"91130fa0-ff25-43c9-940c-a613ff62f03d","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"# Specify the provider and access details\nprovider \"aws\" {\n  region = \"${var.aws_region}\"\n}\n\n# Create a VPC to launch our instances into\nresource \"aws_vpc\" \"default\" {\n  cidr_block = \"10.0.0.0/16\"\n}\n\n# Create an internet gateway to give our subnet access to the outside world\nresource \"aws_internet_gateway\" \"default\" {\n  vpc_id = \"${aws_vpc.default.id}\"\n}\n\n# Grant the VPC internet access on its main route table\nresource \"aws_route\" \"internet_access\" {\n  route_table_id         = \"${aws_vpc.default.main_route_table_id}\"\n  destination_cidr_block = \"0.0.0.0/0\"\n  gateway_id             = \"${aws_internet_gateway.default.id}\"\n}\n\n# Create a subnet to launch our instances into\nresource \"aws_subnet\" \"default\" {\n  vpc_id                  = \"${aws_vpc.default.id}\"\n  cidr_block              = \"10.0.1.0/24\"\n  map_public_ip_on_launch = true\n}\n\n# A security group for the ELB so it is accessible via the web\nresource \"aws_security_group\" \"elb\" {\n  name        = \"terraform_example_elb\"\n  description = \"Used in the terraform\"\n  vpc_id      = \"${aws_vpc.default.id}\"\n\n  # HTTP access from anywhere\n  ingress {\n    from_port   = 80\n    to_port     = 80\n    protocol    = \"tcp\"\n    cidr_blocks = [\"0.0.0.0/0\"]\n  }\n\n  # outbound internet access\n  egress {\n    from_port   = 0\n    to_port     = 0\n    protocol    = \"-1\"\n    cidr_blocks = [\"0.0.0.0/0\"]\n  }\n}\n\n# Our default security group to access\n# the instances over SSH and HTTP\nresource \"aws_security_group\" \"default\" {\n  name        = \"terraform_example\"\n  description = \"Used in the terraform\"\n  vpc_id      = \"${aws_vpc.default.id}\"\n\n  # SSH access from anywhere\n  ingress {\n    from_port   = 22\n    to_port     = 22\n    protocol    = \"tcp\"\n    cidr_blocks = [\"0.0.0.0/0\"]\n  }\n\n  # HTTP access from the VPC\n  ingress {\n    from_port   = 80\n    to_port     = 80\n    protocol    = \"tcp\"\n    cidr_blocks = [\"10.0.0.0/16\"]\n  }\n\n  # outbound internet access\n  egress {\n    from_port   = 0\n    to_port     = 0\n    protocol    = \"-1\"\n    cidr_blocks = [\"0.0.0.0/0\"]\n  }\n}\n\nresource \"aws_elb\" \"web\" {\n  name = \"terraform-example-elb\"\n\n  subnets         = [\"${aws_subnet.default.id}\"]\n  security_groups = [\"${aws_security_group.elb.id}\"]\n  instances       = [\"${aws_instance.web.id}\"]\n\n  listener {\n    instance_port     = 80\n    instance_protocol = \"http\"\n    lb_port           = 80\n    lb_protocol       = \"http\"\n  }\n}\n\nresource \"aws_key_pair\" \"auth\" {\n  key_name   = \"${var.key_name}\"\n  public_key = \"${file(var.public_key_path)}\"\n}\n\nresource \"aws_instance\" \"web\" {\n  # The connection block tells our provisioner how to\n  # communicate with the resource (instance)\n  connection {\n    # The default username for our AMI\n    user = \"ubuntu\"\n    host = \"${self.public_ip}\"\n    # The connection will use the local SSH agent for authentication.\n  }\n\n  instance_type = \"t2.micro\"\n\n  # Lookup the correct AMI based on the region\n  # we specified\n  ami = \"${lookup(var.aws_amis, var.aws_region)}\"\n\n  # The name of our SSH keypair we created above.\n  key_name = \"${aws_key_pair.auth.id}\"\n\n  # Our Security group to allow HTTP and SSH access\n  vpc_security_group_ids = [\"${aws_security_group.default.id}\"]\n\n  # We're going to launch into the same subnet as our ELB. In a production\n  # environment it's more common to have a separate private subnet for\n  # backend instances.\n  subnet_id = \"${aws_subnet.default.id}\"\n\n  # We run a remote provisioner on the instance after creating it.\n  # In this case, we just install nginx and start it. By default,\n  # this should be on port 80\n  provisioner \"remote-exec\" {\n    inline = [\n      \"sudo apt-get -y update\",\n      \"sudo apt-get -y install nginx\",\n      \"sudo service nginx start\",\n    ]\n  }\n}\n","options":{"raw":{"language":"text"}}},"url":"https://{{api-endpoint}}/iac/tf/v1/scan","description":"<p>Scans the given Terraform plan content and tests against Prisma Cloud IaC policies to identify insecure configurations.</p>\n","urlObject":{"protocol":"https","path":["iac","tf","v1","scan"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"91130fa0-ff25-43c9-940c-a613ff62f03d"},{"name":"Scan Kubernetes Manifest for Vulnerabilities","id":"35f11f71-151d-46f0-b295-a315c01d097c","protocolProfileBehavior":{"disableBodyPruning":true},"request":{"method":"POST","header":[{"key":"accept","type":"text","value":"application/json; charset=UTF-8"},{"key":"content-type","type":"text","value":"application/json"},{"key":"x-redlock-auth","type":"text","value":"{{token}}"}],"body":{"mode":"raw","raw":"# Specify the provider and access details\nprovider \"aws\" {\n  region = \"${var.aws_region}\"\n}\n\n# Create a VPC to launch our instances into\nresource \"aws_vpc\" \"default\" {\n  cidr_block = \"10.0.0.0/16\"\n}\n\n# Create an internet gateway to give our subnet access to the outside world\nresource \"aws_internet_gateway\" \"default\" {\n  vpc_id = \"${aws_vpc.default.id}\"\n}\n\n# Grant the VPC internet access on its main route table\nresource \"aws_route\" \"internet_access\" {\n  route_table_id         = \"${aws_vpc.default.main_route_table_id}\"\n  destination_cidr_block = \"0.0.0.0/0\"\n  gateway_id             = \"${aws_internet_gateway.default.id}\"\n}\n\n# Create a subnet to launch our instances into\nresource \"aws_subnet\" \"default\" {\n  vpc_id                  = \"${aws_vpc.default.id}\"\n  cidr_block              = \"10.0.1.0/24\"\n  map_public_ip_on_launch = true\n}\n\n# A security group for the ELB so it is accessible via the web\nresource \"aws_security_group\" \"elb\" {\n  name        = \"terraform_example_elb\"\n  description = \"Used in the terraform\"\n  vpc_id      = \"${aws_vpc.default.id}\"\n\n  # HTTP access from anywhere\n  ingress {\n    from_port   = 80\n    to_port     = 80\n    protocol    = \"tcp\"\n    cidr_blocks = [\"0.0.0.0/0\"]\n  }\n\n  # outbound internet access\n  egress {\n    from_port   = 0\n    to_port     = 0\n    protocol    = \"-1\"\n    cidr_blocks = [\"0.0.0.0/0\"]\n  }\n}\n\n# Our default security group to access\n# the instances over SSH and HTTP\nresource \"aws_security_group\" \"default\" {\n  name        = \"terraform_example\"\n  description = \"Used in the terraform\"\n  vpc_id      = \"${aws_vpc.default.id}\"\n\n  # SSH access from anywhere\n  ingress {\n    from_port   = 22\n    to_port     = 22\n    protocol    = \"tcp\"\n    cidr_blocks = [\"0.0.0.0/0\"]\n  }\n\n  # HTTP access from the VPC\n  ingress {\n    from_port   = 80\n    to_port     = 80\n    protocol    = \"tcp\"\n    cidr_blocks = [\"10.0.0.0/16\"]\n  }\n\n  # outbound internet access\n  egress {\n    from_port   = 0\n    to_port     = 0\n    protocol    = \"-1\"\n    cidr_blocks = [\"0.0.0.0/0\"]\n  }\n}\n\nresource \"aws_elb\" \"web\" {\n  name = \"terraform-example-elb\"\n\n  subnets         = [\"${aws_subnet.default.id}\"]\n  security_groups = [\"${aws_security_group.elb.id}\"]\n  instances       = [\"${aws_instance.web.id}\"]\n\n  listener {\n    instance_port     = 80\n    instance_protocol = \"http\"\n    lb_port           = 80\n    lb_protocol       = \"http\"\n  }\n}\n\nresource \"aws_key_pair\" \"auth\" {\n  key_name   = \"${var.key_name}\"\n  public_key = \"${file(var.public_key_path)}\"\n}\n\nresource \"aws_instance\" \"web\" {\n  # The connection block tells our provisioner how to\n  # communicate with the resource (instance)\n  connection {\n    # The default username for our AMI\n    user = \"ubuntu\"\n    host = \"${self.public_ip}\"\n    # The connection will use the local SSH agent for authentication.\n  }\n\n  instance_type = \"t2.micro\"\n\n  # Lookup the correct AMI based on the region\n  # we specified\n  ami = \"${lookup(var.aws_amis, var.aws_region)}\"\n\n  # The name of our SSH keypair we created above.\n  key_name = \"${aws_key_pair.auth.id}\"\n\n  # Our Security group to allow HTTP and SSH access\n  vpc_security_group_ids = [\"${aws_security_group.default.id}\"]\n\n  # We're going to launch into the same subnet as our ELB. In a production\n  # environment it's more common to have a separate private subnet for\n  # backend instances.\n  subnet_id = \"${aws_subnet.default.id}\"\n\n  # We run a remote provisioner on the instance after creating it.\n  # In this case, we just install nginx and start it. By default,\n  # this should be on port 80\n  provisioner \"remote-exec\" {\n    inline = [\n      \"sudo apt-get -y update\",\n      \"sudo apt-get -y install nginx\",\n      \"sudo service nginx start\",\n    ]\n  }\n}\n","options":{"raw":{"language":"text"}}},"url":"https://{{api-endpoint}}/iac/k8s/v1/scan","description":"<p>Scans the given Kubernetes manifest content and tests against Prisma Cloud IaC policies to identify insecure configurations.</p>\n","urlObject":{"protocol":"https","path":["iac","k8s","v1","scan"],"host":["{{api-endpoint}}"],"query":[],"variable":[]}},"response":[],"_postman_id":"35f11f71-151d-46f0-b295-a315c01d097c"}],"id":"29042f21-190c-4522-b85a-18f1df9c4989","_postman_id":"29042f21-190c-4522-b85a-18f1df9c4989","description":""}]}