[](https://www.paloaltonetworks.com/?ts=markdown) * BR * [USA (ENGLISH)](https://www.paloaltonetworks.com/) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * BRAZIL (PORTUGUÉS) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Introdução](https://www.paloaltonetworks.com.br/get-started?ts=markdown) * [Entre em contato conosco](https://www.paloaltonetworks.com.br/company/contact?ts=markdown) * [Recursos](https://www.paloaltonetworks.com.br/resources?ts=markdown) * [Obtenha suporte](https://support.paloaltonetworks.com/support) * [Está sob ataque?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Produtos ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Produtos [Plataforma de segurança de rede com tecnologia de IA](https://www.paloaltonetworks.com.br/network-security?ts=markdown) * [IA protegida desde a concepção](https://www.paloaltonetworks.com.br/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com.br/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com.br/sase/ai-access-security?ts=markdown) * [SERVIÇOS DE SEGURANÇA ENTREGUES NA NUVEM](https://www.paloaltonetworks.com.br/network-security/security-subscriptions?ts=markdown) * [Threat Prevention avançado](https://www.paloaltonetworks.com.br/network-security/advanced-threat-prevention?ts=markdown) * [URL Filtering Avançado](https://www.paloaltonetworks.com.br/network-security/advanced-url-filtering?ts=markdown) * [WildFire avançado](https://www.paloaltonetworks.com.br/network-security/advanced-wildfire?ts=markdown) * [Segurança avançada de DNS](https://www.paloaltonetworks.com.br/network-security/advanced-dns-security?ts=markdown) * [Prevenção de perda de dados empresariais](https://www.paloaltonetworks.com.br/sase/enterprise-data-loss-prevention?ts=markdown) * [Segurança de IoT empresarial](https://www.paloaltonetworks.com.br/network-security/enterprise-device-security?ts=markdown) * [SEGURANÇA DE DISPOSITIVOS MÉDICOS DE IOT](https://www.paloaltonetworks.com.br/network-security/medical-iot-security?ts=markdown) * [SEGURANÇA INDUSTRIAL DE TO](https://www.paloaltonetworks.com.br/network-security/industrial-ot-security?ts=markdown) * [Segurança de SaaS](https://www.paloaltonetworks.com.br/sase/saas-security?ts=markdown) * [Firewalls de última geração](https://www.paloaltonetworks.com.br/network-security/next-generation-firewall?ts=markdown) * [Firewalls de hardware](https://www.paloaltonetworks.com.br/network-security/hardware-firewall-innovations?ts=markdown) * [Firewalls de software](https://www.paloaltonetworks.com.br/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com.br/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN para NGFW](https://www.paloaltonetworks.com.br/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com.br/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com.br/network-security/panorama?ts=markdown) * [BORDA DE SERVIÇO DE ACESSO SEGURO](https://www.paloaltonetworks.com.br/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com.br/sase?ts=markdown) * [Aceleração de aplicativos](https://www.paloaltonetworks.com.br/sase/app-acceleration?ts=markdown) * [Gerenciamento autônomo de experiência digital](https://www.paloaltonetworks.com.br/sase/adem?ts=markdown) * [DLP empresarial](https://www.paloaltonetworks.com.br/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com.br/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com.br/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com.br/sase/sd-wan?ts=markdown) * [Isolamento remoto do navegador](https://www.paloaltonetworks.com.br/sase/remote-browser-isolation?ts=markdown) * [Segurança de SaaS](https://www.paloaltonetworks.com.br/sase/saas-security?ts=markdown) [Plataforma de operações de segurança com IA](https://www.paloaltonetworks.com.br/cortex?ts=markdown) * [Segurança da nuvem](https://www.paloaltonetworks.com.br/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com.br/cortex/cloud?ts=markdown) * [Segurança de aplicativo](https://www.paloaltonetworks.com.br/cortex/cloud/application-security?ts=markdown) * [Segurança de postura na nuvem](https://www.paloaltonetworks.com.br/cortex/cloud/cloud-posture-security?ts=markdown) * [Segurança de tempo de execução na nuvem](https://www.paloaltonetworks.com.br/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com.br/prisma/cloud?ts=markdown) * [SOC com tecnologia de IA](https://www.paloaltonetworks.com.br/cortex?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com.br/cortex/advanced-email-security?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com.br/cortex/exposure-management?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com.br/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com.br/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com.br/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com.br/cortex/cortex-xpanse?ts=markdown) * [Detecção e resposta gerenciadas da Unit 42](https://www.paloaltonetworks.com.br/cortex/managed-detection-and-response?ts=markdown) * [XSIAM gerenciado](https://www.paloaltonetworks.com.br/cortex/managed-xsiam?ts=markdown) * Soluções ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Soluções Segurança de IA * [Ecossistema de IA seguro](https://www.paloaltonetworks.com.br/prisma/prisma-ai-runtime-security?ts=markdown) * [Uso seguro da GenAI](https://www.paloaltonetworks.com.br/sase/ai-access-security?ts=markdown) Segurança de rede * [Segurança de rede da nuvem](https://www.paloaltonetworks.com.br/network-security/software-firewalls?ts=markdown) * [Segurança do centro de dados](https://www.paloaltonetworks.com.br/network-security/data-center?ts=markdown) * [Segurança de DNS](https://www.paloaltonetworks.com.br/network-security/advanced-dns-security?ts=markdown) * [Detecção e prevenção de intrusões](https://www.paloaltonetworks.com.br/network-security/advanced-threat-prevention?ts=markdown) * [Segurança de IoT](https://www.paloaltonetworks.com.br/network-security/enterprise-device-security?ts=markdown) * [Segurança 5G](https://www.paloaltonetworks.com.br/network-security/5g-security?ts=markdown) * [Proteja todos os aplicativos, usuários e locais](https://www.paloaltonetworks.com.br/sase/secure-users-data-apps-devices?ts=markdown) * [Transformação segura de filiais](https://www.paloaltonetworks.com.br/sase/secure-branch-transformation?ts=markdown) * [Trabalhe com segurança em qualquer dispositivo](https://www.paloaltonetworks.com.br/sase/secure-work-on-any-device?ts=markdown) * [Substituição de VPN](https://www.paloaltonetworks.com.br/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Segurança da Web e contra phishing](https://www.paloaltonetworks.com.br/network-security/advanced-url-filtering?ts=markdown) Segurança da nuvem * [Gerenciamento de postura de segurança de aplicativos (ASPM)](https://www.paloaltonetworks.com.br/cortex/cloud/application-security-posture-management?ts=markdown) * [Segurança da cadeia de suprimentos de software](https://www.paloaltonetworks.com.br/cortex/cloud/software-supply-chain-security?ts=markdown) * [Segurança de código](https://www.paloaltonetworks.com.br/cortex/cloud/code-security?ts=markdown) * [Gerenciamento de postura de segurança na nuvem (CSPM)](https://www.paloaltonetworks.com.br/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Gerenciamento do direito de acesso à infraestrutura da nuvem (CIEM)](https://www.paloaltonetworks.com.br/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Gerenciamento de postura de segurança de dados (DSPM)](https://www.paloaltonetworks.com.br/cortex/cloud/cloud-posture-security?ts=markdown) * [Gerenciamento de postura de segurança de IA (AI-SPM)](https://www.paloaltonetworks.com.br/cortex/cloud/cloud-posture-security?ts=markdown) * [Detecção e resposta na nuvem (CDR)](https://www.paloaltonetworks.com.br/cortex/cloud-detection-and-response?ts=markdown) * [Proteção de cargas de trabalho na nuvem (CWP)](https://www.paloaltonetworks.com.br/cortex/cloud/cloud-workload-protection?ts=markdown) * [Segurança de APIs e aplicativos da Web (WAAS)](https://www.paloaltonetworks.com.br/cortex/cloud/web-app-api-security?ts=markdown) Operações de segurança * [Detecção e resposta da nuvem](https://www.paloaltonetworks.com.br/cortex/cloud-detection-and-response?ts=markdown) * [Automação de segurança da rede](https://www.paloaltonetworks.com.br/cortex/network-security-automation?ts=markdown) * [Gerenciamento de casos de incidentes](https://www.paloaltonetworks.com.br/cortex/incident-case-management?ts=markdown) * [Automação SOC](https://www.paloaltonetworks.com.br/cortex/security-operations-automation?ts=markdown) * [Gerenciamento de inteligência contra ameaças](https://www.paloaltonetworks.com.br/cortex/threat-intel-management?ts=markdown) * [Detecção e resposta gerenciadas](https://www.paloaltonetworks.com.br/cortex/managed-detection-and-response?ts=markdown) * [Gerenciamento de superfície de ataque](https://www.paloaltonetworks.com.br/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Gerenciamento de conformidade](https://www.paloaltonetworks.com.br/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Gerenciamento de operações da Internet](https://www.paloaltonetworks.com.br/cortex/cortex-xpanse/internet-operations-management?ts=markdown) Segurança de endpoints * [Proteção de endpoints](https://www.paloaltonetworks.com.br/cortex/endpoint-protection?ts=markdown) * [Detecção e resposta estendidas](https://www.paloaltonetworks.com.br/cortex/detection-and-response?ts=markdown) * [Proteção contra ransomware](https://www.paloaltonetworks.com.br/cortex/ransomware-protection?ts=markdown) * [Área forense digital](https://www.paloaltonetworks.com.br/cortex/digital-forensics?ts=markdown) [Setores](https://www.paloaltonetworks.com.br/industry?ts=markdown) * [Setor público](https://www.paloaltonetworks.com/industry/public-sector) * [Serviços financeiros](https://www.paloaltonetworks.com/industry/financial-services) * [Fábricas](https://www.paloaltonetworks.com/industry/manufacturing) * [Saúde](https://www.paloaltonetworks.com/industry/healthcare) * [Soluções para pequenas e médias empresas](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio) * Serviços ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Serviços [Serviços de inteligência de ameaças e resposta a incidentes](https://www.paloaltonetworks.com.br/unit42?ts=markdown) * [Avaliação](https://www.paloaltonetworks.com.br/unit42/assess?ts=markdown) * [Avaliação de segurança de IA](https://www.paloaltonetworks.com.br/unit42/assess/ai-security-assessment?ts=markdown) * [Avaliação da superfície de ataque](https://www.paloaltonetworks.com.br/unit42/assess/attack-surface-assessment?ts=markdown) * [Revisão da prontidão para violações](https://www.paloaltonetworks.com.br/unit42/assess/breach-readiness-review?ts=markdown) * [Avaliação da prontidão do BEC](https://www.paloaltonetworks.com/bec-readiness-assessment) * [Avaliação de segurança de nuvem](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment) * [Avaliação do comprometimento](https://www.paloaltonetworks.com.br/unit42/assess/compromise-assessment?ts=markdown) * [Avaliação de risco cibernético](https://www.paloaltonetworks.com.br/unit42/assess/cyber-risk-assessment?ts=markdown) * [Devida diligência de segurança cibernética em fusões e aquisições](https://www.paloaltonetworks.com.br/unit42/assess/mergers-acquisitions-cyber-due-dilligence?ts=markdown) * [Teste de penetração](https://www.paloaltonetworks.com.br/unit42/assess/penetration-testing?ts=markdown) * [Exercícios da purple team (equipe roxa)](https://www.paloaltonetworks.com.br/unit42/assess/purple-teaming?ts=markdown) * [Avaliação de prontidão para ransomware](https://www.paloaltonetworks.com.br/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [Avaliação do SOC](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment) * [Avaliação de risco da cadeia de suprimentos](https://www.paloaltonetworks.com.br/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Exercícios teóricos](https://www.paloaltonetworks.com.br/unit42/assess/tabletop-exercise?ts=markdown) * [Retenção Unit 42](https://www.paloaltonetworks.com.br/unit42/retainer?ts=markdown) * [Responder](https://www.paloaltonetworks.com.br/unit42/respond?ts=markdown) * [Resposta a incidentes na nuvem](https://www.paloaltonetworks.com.br/unit42/respond/cloud-incident-response?ts=markdown) * [Ciência forense digital](https://www.paloaltonetworks.com.br/unit42/respond/digital-forensics?ts=markdown) * [Resposta a incidentes](https://www.paloaltonetworks.com.br/unit42/respond/incident-response?ts=markdown) * [Detecção e resposta gerenciadas](https://www.paloaltonetworks.com.br/unit42/respond/managed-detection-response?ts=markdown) * [Busca gerenciada de ameaças](https://www.paloaltonetworks.com.br/unit42/respond/managed-threat-hunting?ts=markdown) * [XSIAM gerenciado](https://www.paloaltonetworks.com.br/cortex/managed-xsiam?ts=markdown) * [Retenção Unit 42](https://www.paloaltonetworks.com.br/unit42/retainer?ts=markdown) * [Transformar](https://www.paloaltonetworks.com.br/unit42/transform?ts=markdown) * [Desenvolvimento e revisão do plano de RI](https://www.paloaltonetworks.com.br/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Projeto do programa de segurança](https://www.paloaltonetworks.com.br/unit42/transform/security-program-design?ts=markdown) * [CISO virtual](https://www.paloaltonetworks.com.br/unit42/transform/vciso?ts=markdown) * [Assessoria Zero Trust](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment) [Serviços globais de atendimento ao cliente](https://www.paloaltonetworks.com.br/services?ts=markdown) * [Educação e treinamento](https://www.paloaltonetworks.com/services/education) * [Serviços profissionais](https://www.paloaltonetworks.com/services/consulting) * [Ferramentas de sucesso](https://www.paloaltonetworks.com/services/customer-success-tools) * [Serviços de suporte](https://www.paloaltonetworks.com/services/solution-assurance) * [Sucesso dos clientes](https://www.paloaltonetworks.com/services/customer-success) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) RETENÇÃO UNIT 42 Sob medida para atender às necessidades da sua organização, você pode optar por alocar suas horas da retenção em qualquer um de nossos serviços, incluindo gerenciamento proativo de riscos cibernéticos. Descubra como ter acesso direto e imediato à equipe reconhecida mundialmente de Resposta a incidentes da Unit 42. Saiba mais](https://www.paloaltonetworks.com.br/unit42/retainer?ts=markdown) * Parceiros ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Parceiros Parceiros NextWave * [Comunidade de parceiros NextWave](https://www.paloaltonetworks.com/partners) * [Fornecedores de serviços em nuvem](https://www.paloaltonetworks.com/partners/nextwave-for-csp) * [Integradores de sistemas globais](https://www.paloaltonetworks.com/partners/nextwave-for-gsi) * [Parceiros de tecnologia](https://www.paloaltonetworks.com/partners/technology-partners) * [Fornecedores de serviços](https://www.paloaltonetworks.com/partners/service-providers) * [Fornecedores de soluções](https://www.paloaltonetworks.com/partners/nextwave-solution-providers) * [Fornecedores de serviços gerenciados de segurança](https://www.paloaltonetworks.com/partners/managed-security-service-providers) Tomar medidas * [Login no portal](https://www.paloaltonetworks.com/partners/nextwave-partner-portal) * [Programa de serviços gerenciados](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program) * [Torne-se um parceiro](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Solicitar acesso](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Localizar um parceiro](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE A CYBERFORCE representa o 1% dos engenheiros parceiros mais confiáveis por sua experiência em segurança. Saiba mais](https://www.paloaltonetworks.com/cyberforce) * Empresa ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Empresa Palo Alto Networks * [Sobre nós](https://www.paloaltonetworks.com.br/about-us?ts=markdown) * [Equipe de gerenciamento](https://www.paloaltonetworks.com/about-us/management) * [Relações com investidores](https://investors.paloaltonetworks.com) * [Locais](https://www.paloaltonetworks.com/about-us/locations) * [Ética e conformidade](https://www.paloaltonetworks.com/company/ethics-and-compliance) * [Responsabilidade corporativa](https://www.paloaltonetworks.com/about-us/corporate-responsibility) * [Militares e veteranos](https://jobs.paloaltonetworks.com/military) [Por que Palo Alto Networks?](https://www.paloaltonetworks.com.br/why-paloaltonetworks?ts=markdown) * [Segurança com Precision AI](https://www.paloaltonetworks.com.br/precision-ai-security?ts=markdown) * [Nossa abordagem da plataforma](https://www.paloaltonetworks.com.br/why-paloaltonetworks/platformization?ts=markdown) * [Acelere a transformação da sua segurança cibernética](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio) * [Prêmios e reconhecimentos](https://www.paloaltonetworks.com/about-us/awards) * [Histórias dos clientes](https://www.paloaltonetworks.com.br/customers?ts=markdown) * [Certificações globais](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance) * [Programa Trust 360](https://www.paloaltonetworks.com/resources/whitepapers/trust-360) Carreiras * [Visão geral](https://jobs.paloaltonetworks.com/) * [Cultura e benefícios](https://jobs.paloaltonetworks.com/en/culture/) [Local de trabalho mais amado da Newsweek "Empresas justas com seus funcionários" Ler mais](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021) * Mais ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Mais Recursos * [Blog](https://www.paloaltonetworks.com/blog/?lang=pt-br) * [Pesquisa sobre ameaças da Unit 42](https://unit42.paloaltonetworks.com/) * [Comunidades](https://www.paloaltonetworks.com/communities) * [Biblioteca de conteúdos](https://www.paloaltonetworks.com.br/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com.br/cyberpedia?ts=markdown) * [Informações internas técnicas](https://techinsider.paloaltonetworks.com/) * [Base de conhecimento](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectivas dos líderes](https://www.paloaltonetworks.com/perspectives/) * [Revista Cyber Perspectives](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine) * [Locais regionais de nuvem](https://www.paloaltonetworks.com.br/products/regional-cloud-locations?ts=markdown) * [Documentos técnicos](https://docs.paloaltonetworks.com/) * [Avaliação da postura de segurança](https://www.paloaltonetworks.com/security-posture-assessment) * [Podcast sobre o vetor de ameaças](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) Conexão * [Comunidade ao vivo](https://live.paloaltonetworks.com/) * [Eventos](https://events.paloaltonetworks.com/) * [Centro de briefing executivo](https://www.paloaltonetworks.com/about-us/executive-briefing-program) * [Demonstrações](https://www.paloaltonetworks.com/demos) * [Entre em contato conosco](https://www.paloaltonetworks.com.br/company/contact?ts=markdown) [Blog Atualize-se sobre as tendências do setor e as mais recentes inovações da maior empresa de segurança cibernética do mundo Saiba mais](https://www.paloaltonetworks.com/blog/) * BR ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com/) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * BRAZIL (PORTUGUÉS) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Introdução](https://www.paloaltonetworks.com.br/get-started?ts=markdown) * [Entre em contato conosco](https://www.paloaltonetworks.com.br/company/contact?ts=markdown) * [Recursos](https://www.paloaltonetworks.com.br/resources?ts=markdown) * [Obtenha suporte](https://support.paloaltonetworks.com/support) * [Está sob ataque?](https://start.paloaltonetworks.com/contact-unit42.html) * [Explore a Confiança Zero](https://www.paloaltonetworks.com.br/zero-trust?ts=markdown) Pesquisar Close search modal [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com.br/cyberpedia?ts=markdown) 2. [What Is Improper Artifact Integrity Validation?](https://www.paloaltonetworks.com.br/cyberpedia/improper-artifact-integrity-validation-cicd-sec9?ts=markdown) Table of Contents * [CICD-SEC-9: Improper Artifact Integrity Validation Explained](#artifact) * [Importance of Artifact Integrity Validation in CI/CD](#importance) * [Preventing Improper Artifact Integrity Validation](#improper) * [Industry Practices to Promote Artifact Integrity in CI/CD](#promote) * [Improper Artifact Integrity Validation FAQs](#faqs) # What Is Improper Artifact Integrity Validation? [AppSec's New Horizon: A Virtual Event](https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html) Table of Contents * [CICD-SEC-9: Improper Artifact Integrity Validation Explained](#artifact) * [Importance of Artifact Integrity Validation in CI/CD](#importance) * [Preventing Improper Artifact Integrity Validation](#improper) * [Industry Practices to Promote Artifact Integrity in CI/CD](#promote) * [Improper Artifact Integrity Validation FAQs](#faqs) 1. CICD-SEC-9: Improper Artifact Integrity Validation Explained * [1. CICD-SEC-9: Improper Artifact Integrity Validation Explained](#artifact) * [2. Importance of Artifact Integrity Validation in CI/CD](#importance) * [3. Preventing Improper Artifact Integrity Validation](#improper) * [4. Industry Practices to Promote Artifact Integrity in CI/CD](#promote) * [5. Improper Artifact Integrity Validation FAQs](#faqs) Improper artifact integrity validation is a CI/CD security oversight that allows attackers to inject malicious code into the software delivery pipeline via artifacts within the pipeline. Tampering opportunities arise from the blend of internal and third-party resources within CI/CD systems. Failing to implement checks to verify the integrity of artifacts permits undetected tampering, which can lead to harmful code execution in the pipeline or production. This oversight results from various factors --- weak validation processes, inadequate security controls, lack of awareness about the importance of artifact integrity. ## CICD-SEC-9: Improper Artifact Integrity Validation Explained CICD-SEC-9, as identified on the OWASP Top 10 CI/CD Security Risks, stems from the potential of an attacker with access to a system within the [CI/CD pipeline](https://www.paloaltonetworks.com/cyberpedia/what-is-the-ci-cd-pipeline-and-ci-cd-security?ts=markdown) to push malicious code or artifacts down the pipeline. This risk is exacerbated by insufficient mechanisms to validate the authenticity and integrity of code and artifacts. As CI/CD processes combine internal resources with third-party packages fetched from assorted locations, the resulting mix creates multiple entry points susceptible to tampering. If a compromised resource infiltrates the delivery process undetected, it can flow through the pipeline, masquerading as a legitimate resource, and potentially reach production environments. Such a breach can lead to the execution of malicious code within CI/CD systems or, more concerning, in live production environments. ### Artifact Integrity Validation Defined An integral part of [CI/CD security](https://www.paloaltonetworks.com/cyberpedia/what-is-ci-cd-security?ts=markdown), artifact integrity validation provides assurance that digital artifacts, such as software packages, containers, and configuration files, remain unaltered and authentic from their original state. The security process involves using cryptographic methods, digital signatures, and checksums to confirm each artifact's origin while ensuring that the artifact hasn't been tampered with during transit or storage. By properly validating the integrity of artifacts, users can trust the reliability of the information, assured that deployed artifacts are free from unauthorized modifications. ### Components of Artifact Integrity Validation in the Delivery Pipeline Key components of effective artifact integrity validation --- in addition to cryptographic checksums and digital signatures --- include secure artifact storage, secure transport protocols, and secure key management practices. Each component plays a role in safeguarding the integrity and authenticity of artifacts at different stages of the CI/CD pipeline, from artifact creation and artifact transfer between stages to artifact deployment. ### How CICD-SEC-9 Happens To understand how improper artifact integrity validation exposes organizations to risk, let's look at a hypothetical attack scenario. **Initial Entry** A seasoned attacker discerns vulnerabilities in a prominent software company's CI/CD pipeline. Recognizing the potential to exploit lapses in artifact integrity validation, the attacker devises a plan to introduce a tampered artifact. **Reconnaissance** The attacker meticulously studies the company's CI/CD process. Noting the expected blend of internal resources with third-party packages, the attacker identifies potential weak points where the integrity of artifacts might lack rigorous validation. **Exploitation** Crafting a malicious library that mimics a widely used third-party package, the attacker infiltrates a mirror repository. By replacing the legitimate library with the tampered version, the attacker sets the stage for the company's CI/CD pipeline to inadvertently pull in the malicious code. **Bypassing Security Gates** The company's CI/CD system fetches the latest version of all dependencies. Due to lapses in secure artifact storage practices, the system unknowingly retrieves the tampered library from the compromised mirror repository. Although the company employs checksum validation, the attacker, having manipulated the mirror repository, updates the checksum file to match the tampered library's hash. The absence of a multisource validation mechanism allows the malicious library to pass unchecked. **Deployment and Execution** Once the tampered library is fetched and linked during the build process, the resulting application, now tainted with the malicious code from the library, progresses through the pipeline. Upon deployment in the production environment, the concealed malicious code activates, leading to system compromise. ## Importance of Artifact Integrity Validation in CI/CD The trustworthiness of artifacts is critical to [cloud-native application development](https://www.paloaltonetworks.com/cyberpedia/what-is-cloud-native?ts=markdown). By ensuring that only trustworthy artifacts are deployed, proper artifact integrity validation reduces the possibility of malicious code making it into production environments. ### Risks Associated with Improper Artifact Integrity Validation Organizations open themselves to potential security breaches, data leaks, and operational disruptions resulting from tampered artifacts that could have been detected prior to deployment if proper validation measures had been in place. **Case Study 1: Webmin Falls Victim to Stealthy Server Exploit** Attackers exploited Webmin's development build server in April 2018, introducing a vulnerability to the password\_change.cgi script. To conceal the malicious modification, they altered the file's timestamp, and the compromised file became part of Webmin version 1.890. Although developers reverted the file using GitHub's version, attackers altered it again by July 2018, impacting versions 1.900 to 1.920. The exploit remained active only when a specific feature was enabled. After receiving a zero-day exploit report in August 2019, Webmin promptly removed the exploit and released version 1.930. **Case Study 2: PHP's Internal Security Breach** In early 2021, PHP's git.php.net server faced a malicious attack. Initially considered an individual account compromise, two malicious commits were made under the names of prominent PHP contributors. A deeper investigation revealed that these commits bypassed the standard gitolite infrastructure, hinting at a server compromise. The commits were pushed using HTTPS and password-based authentication, raising suspicions of a potential leak in the master.php.net user database. The attacker's ability to authenticate after only a few username guesses further intensified these concerns. ## Preventing Improper Artifact Integrity Validation Understanding the risks associated with artifacts highlights the importance of implementing staunch checks to ensure their integrity. To mitigate risks, consider the following strategies: ### Integrity Validation from Development to Production Implement processes and technologies that validate resource integrity throughout the software delivery chain. As developers generate a resource, they should sign it using an external resource signing infrastructure. Before consuming a resource in subsequent pipeline stages, cross-check its integrity against the signing authority. Key measures include: **Code Signing** Source code management (SCM) solutions offer the capability to sign commits with a unique key for each contributor, preventing unsigned commits from progressing through the pipeline. **Artifact Verification Software** Tools designed for signing and verifying code and artifacts, such as the Linux Foundation's Sigstore, can thwart unverified software from advancing down the pipeline. **Configuration Drift Detection** Implement measures to detect configuration drifts, such as resources in cloud environments not managed using a signed [infrastructure as code (IAC)](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown) template. Such drifts could indicate deployments from untrusted sources or processes. ### Third-Party Resource Validation Third-party resources incorporated into build and deploy pipelines, like scripts executed during the build process, should undergo rigorous validation. Before utilizing these resources, compute their hash and compare it against the official hash provided by the resource provider. ## Industry Practices to Promote Artifact Integrity in CI/CD The industry has established standards and guidelines for artifact integrity validation. Examples include the use of cryptographic algorithms like SHA-256 for checksums, X.509 certificates for digital signatures, and secure transport protocols such as HTTPS for artifact transfer. Organizations should align their practices with these standards to maintain a reliable and secure software delivery pipeline. ### Establish Artifact Integrity Validation Policies and Audit Schedule To ensure proper artifact integrity validation, organizations should establish clear policies that define validation processes. Once established, regularly audit compliance with internal policies to identify and address weaknesses, as well as areas of noncompliances. Continuous monitoring and analysis will help detect anomalies or unauthorized activities. ### Employ Cryptographic Signing Use public key infrastructure (PKI) to cryptographically sign artifacts at each stage of the CI/CD pipeline. This practice validates signatures against a trusted certificate authority before consumption. Configure your CI/CD pipeline to reject artifacts with invalid or missing signatures to reduce risks of deploying tampered resources or unauthorized changes. ### Implement Secure Storage Establish a secure tamper-proof repository to store artifacts and enforce strict access controls, preventing unauthorized modifications. Enable versioning to maintain a historical record of artifact changes and implement real-time monitoring to track and alert on suspicious activity. In case of compromised artifacts, configure the system to facilitate rollbacks to previous, known-good versions. ### Enforce Multi-Source Validation Adopt a multisource validation strategy that verifies the integrity of artifacts using various sources, such as checksums, digital signatures, and secure hash algorithms, as well as trusted repositories. Keep the cryptographic algorithms and keys up to date to maintain their effectiveness. ### Integrate Security Scanning Incorporate vulnerability scanning tools and [static application security testing (SAST)](https://www.paloaltonetworks.com/cyberpedia/what-is-sast-static-application-security-testing?ts=markdown) into the CI/CD pipeline to identify potential security issues in artifacts --- including third-party dependencies --- before deployment. Taking a proactive approach allows [DevOps](https://www.paloaltonetworks.com/cyberpedia/what-is-devops?ts=markdown) teams to address vulnerabilities early in the development process, reducing the risk of security incidents and maintaining a high level of [code quality](https://www.paloaltonetworks.com/cyberpedia/what-is-code-security?ts=markdown). ### Foster a Security-Aware Culture Educate and train development teams about the importance of artifact integrity validation and the potential risks associated with improper validation. Encourage adherence to secure coding practices and emphasize the role each individual plays in maintaining a [secure CI/CD environment](https://www.paloaltonetworks.com/cyberpedia/what-is-ci-cd-security?ts=markdown). ## Improper Artifact Integrity Validation FAQs ### What are digital signatures? A digital signature is a cryptographic technique used to validate the authenticity and integrity of a message, software, or digital document. ### What are hash functions? Hash functions are cryptographic algorithms that take inputs of any length and generate fixed-size outputs called hashes or digests. Designed to be deterministic, hash functions ensure the same input consistently produces the same hash value. Additionally, their one-way nature makes it computationally infeasible to deduce the input from the hash value. Common applications for hash functions include data integrity verification, digital signature creation, and secure password storage. Well-known hash functions include SHA-256, MD5, and SHA-1. ### What is a library? In the context of CI/CD, a library is a collection of precompiled routines that a program can use. These routines, sometimes called modules or functions, are stored in object format. Libraries are particularly useful for storing frequently used routines because developers don't need to explicitly link them to every program that uses them. The linker automatically looks for them when linking modules together. Libraries can be static (linked at compile time) or dynamic (linked at runtime). ### What is a repository? A repository, in the context of software development, refers to a centralized file storage location. It's used by version control systems to store multiple versions of files. While a repository can contain libraries, it can also contain individual code files, images, scripts, documentation, etc. ### What is in-toto? In-toto is an open-source framework for securing software supply chains. It cryptographically ensures that the entire development process has been conducted as planned and the final artifact hasn't been tampered with. ### What is SLSA? Supply-chain levels for software artifacts, or SLSA, refers to an end-to-end framework for ensuring the integrity of software artifacts throughout the software supply chain. ### What is Sigstore? Sigstore is a Linux Foundation project that provides a nonrepudiable software supply chain. It offers services to software developers for signing software artifacts, storing the signatures, and verifying them. ### What is configuration drift detection? Configuration drift detection is a process that ensures the current state of the system configuration hasn't deviated or 'drifted' from its intended state. Configuration drift can be a sign of tampering or misconfiguration. ### What is a software configuration management (SCM) solution? A software configuration management (SCM) solution is a tool or system that manages and tracks changes made to software projects throughout their development lifecycle. By controlling modifications to source code, files, and documentation, it aids in maintaining consistency, traceability, and accountability across the development process. SCM solutions enable developers to collaborate efficiently, prevent conflicting changes, and easily revert changes to previous versions. They also facilitate branching and merging, allowing simultaneous development of multiple features or bug fixes in isolated environments. SCM solutions streamline the build and deployment processes, ensuring the right versions of software components are combined and released. Popular SCM tools include Git, Subversion, and Mercurial. ### What is a signed IaC template? [Infrastructure as code (IAC)](https://www.paloaltonetworks.com/cyberpedia/what-is-iac?ts=markdown) templates describe the desired state of system infrastructure. Signing these templates helps ensure their integrity. ### What is artifact verification software? Artifact verification software refers to tools for signing and verifying the integrity of code and artifacts, such as those provided by in-toto, SLSA, and Sigstore. ### What is checksum validation? Checksum validation is a method used to ensure the integrity of data, especially during transmission or storage. It involves generating a checksum from the data and then regenerating and comparing the checksum at the point of use. Related Content [ASPM Buyer's Guide Gain a comprehensive framework for evaluating and choosing an ASPM solution that shifts your AppSec strategy from reactive to proactive.](https://start.paloaltonetworks.com/application-security-posture-management-buyers-guide.html) [Accelerate Secure Development with Prevention-First Application Security Posture Management (ASPM) Learn how Cortex Cloud's ASPM centralizes and correlates findings from disparate security scanning tools with complete context across code, application infrastructure, and cloud ru...](https://www.paloaltonetworks.com/resources/datasheets/application-security-posture-management-solution-brief?ts=markdown) [Introducing Cortex Cloud ASPM Cortex Cloud ASPM gives security and engineering teams the control to prevent exploitable risk early and respond with full context across the software lifecycle.](https://www.paloaltonetworks.com/blog/cloud-security/introducing-aspm-cortex-cloud/?ts=markdown) [AppSec's New Horizon Join this virtual event to get a practical, prevention-first blueprint --- backed by new Unit 42 research --- to modernize your AppSec strategy.](https://start.paloaltonetworks.com/appsecs-new-horizon-virtual-event.html) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=What%20Is%20Improper%20Artifact%20Integrity%20Validation%3F&body=%20at%20https%3A//www.paloaltonetworks.com.br/cyberpedia/improper-artifact-integrity-validation-cicd-sec9) Voltar ao topo {#footer} ## Produtos e serviços * [Plataforma de segurança de rede com tecnologia de IA](https://www.paloaltonetworks.com.br/network-security?ts=markdown) * [IA protegida desde a concepção](https://www.paloaltonetworks.com.br/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com.br/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com.br/sase/ai-access-security?ts=markdown) * [Serviços de segurança entregues na nuvem](https://www.paloaltonetworks.com.br/network-security/security-subscriptions?ts=markdown) * [Prevenção contra ameaças avançada](https://www.paloaltonetworks.com.br/network-security/advanced-threat-prevention?ts=markdown) * [URL Filtering avançado](https://www.paloaltonetworks.com.br/network-security/advanced-url-filtering?ts=markdown) * [WildFire avançado](https://www.paloaltonetworks.com.br/network-security/advanced-wildfire?ts=markdown) * [Segurança de DNS avançada](https://www.paloaltonetworks.com.br/network-security/advanced-dns-security?ts=markdown) * [Prevenção de perda de dados empresariais](https://www.paloaltonetworks.com.br/sase/enterprise-data-loss-prevention?ts=markdown) * [Segurança de IoT empresarial](https://www.paloaltonetworks.com.br/network-security/enterprise-iot-security?ts=markdown) * [Segurança de IoT médica](https://www.paloaltonetworks.com.br/network-security/medical-iot-security?ts=markdown) * [Segurança de TO industrial](https://www.paloaltonetworks.com.br/network-security/industrial-ot-security?ts=markdown) * [Segurança de SaaS](https://www.paloaltonetworks.com.br/sase/saas-security?ts=markdown) * [Firewalls de próxima geração](https://www.paloaltonetworks.com.br/network-security/next-generation-firewall?ts=markdown) * [Firewalls de hardware](https://www.paloaltonetworks.com.br/network-security/hardware-firewall-innovations?ts=markdown) * [Firewalls de software](https://www.paloaltonetworks.com.br/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com.br/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN para NGFW](https://www.paloaltonetworks.com.br/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com.br/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com.br/network-security/panorama?ts=markdown) * [Borda de serviço de acesso seguro](https://www.paloaltonetworks.com.br/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com.br/sase?ts=markdown) * [Aceleração de aplicativos](https://www.paloaltonetworks.com.br/sase/app-acceleration?ts=markdown) * [Gerenciamento autônomo de experiência digital](https://www.paloaltonetworks.com.br/sase/adem?ts=markdown) * [DLP empresarial](https://www.paloaltonetworks.com.br/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com.br/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com.br/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com.br/sase/sd-wan?ts=markdown) * [Isolamento remoto do navegador](https://www.paloaltonetworks.com.br/sase/remote-browser-isolation?ts=markdown) * [Segurança de SaaS](https://www.paloaltonetworks.com.br/sase/saas-security?ts=markdown) * [Plataforma de operações de segurança orientadas por IA](https://www.paloaltonetworks.com.br/cortex?ts=markdown) * [Segurança da nuvem](https://www.paloaltonetworks.com.br/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com.br/cortex/cloud?ts=markdown) * [Segurança de aplicativos](https://www.paloaltonetworks.com.br/cortex/cloud/application-security?ts=markdown) * [Segurança da postura na nuvem](https://www.paloaltonetworks.com.br/cortex/cloud/cloud-posture-security?ts=markdown) * [Segurança de tempo de execução na nuvem](https://www.paloaltonetworks.com.br/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com.br/prisma/cloud?ts=markdown) * [SOC orientado por IA](https://www.paloaltonetworks.com.br/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com.br/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com.br/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com.br/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com.br/cortex/cortex-xpanse?ts=markdown) * [Detecção e resposta gerenciadas da Unit 42](https://www.paloaltonetworks.com.br/cortex/managed-detection-and-response?ts=markdown) * [XSIAM gerenciado](https://www.paloaltonetworks.com.br/cortex/managed-xsiam?ts=markdown) * [Serviços de inteligência de ameaças e resposta a incidentes](https://www.paloaltonetworks.com.br/unit42?ts=markdown) * [Avaliações proativas](https://www.paloaltonetworks.com.br/unit42/assess?ts=markdown) * [Resposta a incidentes](https://www.paloaltonetworks.com.br/unit42/respond?ts=markdown) * [Transforme sua estratégia de segurança](https://www.paloaltonetworks.com.br/unit42/transform?ts=markdown) * [Descubra a inteligência contra ameaças](https://www.paloaltonetworks.com.br/unit42/threat-intelligence-partners?ts=markdown) ## Empresa * [Sobre nós](https://www.paloaltonetworks.com.br/about-us?ts=markdown) * [Carreiras](https://jobs.paloaltonetworks.com/en/) * [Entre em contato conosco](https://www.paloaltonetworks.com.br/company/contact?ts=markdown) * [Responsabilidade corporativa](https://www.paloaltonetworks.com/about-us/corporate-responsibility) * [Clientes](https://www.paloaltonetworks.com.br/customers?ts=markdown) * [Relações com investidores](https://investors.paloaltonetworks.com/) * [Local](https://www.paloaltonetworks.com/about-us/locations) * [Notícias](https://www.paloaltonetworks.com.br/company/newsroom?ts=markdown) ## Links populares * [Blog](https://www.paloaltonetworks.com/blog/?lang=pt-br) * [Comunidades](https://www.paloaltonetworks.com/communities) * [Biblioteca de conteúdo](https://www.paloaltonetworks.com.br/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com.br/cyberpedia?ts=markdown) * [Centro de eventos](https://events.paloaltonetworks.com/) * [Gerenciar preferências de e-mail](https://start.paloaltonetworks.com/preference-center) * [Produtos de A a Z](https://www.paloaltonetworks.com/products/products-a-z) * [Certificações de produtos](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance) * [Relatar uma vulnerabilidade](https://www.paloaltonetworks.com/security-disclosure) * [Mapa do site](https://www.paloaltonetworks.com.br/sitemap?ts=markdown) * [Documentos técnicos](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Não venda nem compartilhe minhas informações pessoais](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacidade](https://www.paloaltonetworks.com/legal-notices/privacy) * [Centro de confiança](https://www.paloaltonetworks.com/legal-notices/trust-center) * [Termos de uso](https://www.paloaltonetworks.com/legal-notices/terms-of-use) * [Documentos](https://www.paloaltonetworks.com/legal) Copyright © 2026 Palo Alto Networks. Todos os direitos reservados * [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * BR Select your language