Strata Cloud Manager
Monitor Compliance Summary
Table of Contents
Expand All
|
Collapse All
Strata Cloud Manager Docs
-
- Strata Copilot
- Command Center: Strata Cloud Manager
-
- Dashboard: Build a Custom Dashboard
- Dashboard: Executive Summary
-
- WildFire Dashboard: Filters
- WildFire Dashboard: Total Samples Submitted
- WildFire Dashboard: Analysis Insights
- WildFire Dashboard: Session Trends For Samples Submitted
- WildFire Dashboard: Verdict Distribution
- WildFire Dashboard: Top Applications Delivering Malicious Samples
- WildFire Dashboard: Top Users Impacted By Malicious Samples
- WildFire Dashboard: Top Malware Regions
- WildFire Dashboard: Top Firewalls
- Dashboard: DNS Security
- Dashboard: AI Runtime Security
- Dashboard: IoT Security
- Dashboard: Prisma Access
-
- Application Experience Dashboard: Mobile User Experience Card
- Application Experience Dashboard: Remote Site Experience Card
- Application Experience Dashboard: Experience Score Trends
- Application Experience Dashboard: Experience Score Across the Network
- Application Experience Dashboard: Global Distribution of Application Experience Scores
- Application Experience Dashboard: Experience Score for Top Monitored Sites
- Application Experience Dashboard: Experience Score for Top Monitored Apps
- Application Experience Dashboard: Application Performance Metrics
- Application Experience Dashboard: Network Performance Metrics
- Dashboard: Best Practices
- Dashboard: Compliance Summary
-
- Prisma SD-WAN Dashboard: Device to Controller Connectivity
- Prisma SD-WAN Dashboard: Applications
- Prisma SD-WAN Dashboard: Top Alerts by Priority
- Prisma SD-WAN Dashboard: Overall Link Quality
- Prisma SD-WAN Dashboard: Bandwidth Utilization
- Prisma SD-WAN Dashboard: Transaction Stats
- Prisma SD-WAN Dashboard: Predictive Analytics
- Dashboard: PAN-OS CVEs
- Dashboard: CDSS Adoption
- Dashboard: Feature Adoption
- Dashboard: On Demand BPA
- Manage: IoT Policy Recommendation
- Manage: Enterprise DLP
- Manage: SaaS Security
- Manage: Prisma Access Browser
- Reports: Strata Cloud Manager
-
-
- Strata Cloud Manager Release Information
-
- New Features in February 2025
- New Features in January 2025
- New Features in December 2024
- New Features in November 2024
- New Features in October 2024
- New Features in September 2024
- New Features in August 2024
- New Features in July 2024
- New Features in June 2024
- New Features in May 2024
- New Features in April 2024
- New Features in March 2024
- New Features in February 2024
- New Features in January 2024
- New Features in November 2023
- New Features in October 2023
- New Features in September 2023
- Known Issues
- Addressed Issues
- Getting Help
Monitor Compliance Summary
Learn how to monitor compliance summary.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
To get to the Compliance Summary Dashboard, go to Dashboards, and then select
the Compliance Summary tab. You can view a history of changes to the security
checks made up to 12 months in the past, grouped together by the Center for Internet
Security (CIS) and the National Institute of Standards and Technology (NIST) frameworks.
For each framework, you’ll see a list of controls as well as the percentage of current
and average compliance rate, total number of best practice checks, and the number of
failed checks for each control. Interact with the chart and the list to see the
relationship between controls and their historical statistics. View details of
individual controls and their associated checks, and select a best practice check to
view the firewall configuration that is failing the check.The CIS Critical Security
Controls framework is a prioritized set of recommended actions and best
practices that help protect organizations and their data from known cyber attack
vectors.

You can view check summaries for 11 of the 16 basic and foundational CIS controls:
- CSC 3: Continuous Vulnerability Management
- CSC 4: Controlled Use of Administrative Privileges
- CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
- CSC 7: Email and Web Browser Protections
- CSC 8: Malware Defenses
- CSC 9: Limitation and Control of Network Ports, Protocols, and Services
- CSC 11: Secure configuration for Network Devices, such as Firewalls, Routers, and Switches
- CSC 12: Boundary Defense
- CSC 13: Data Protection
- CSC 14: Controlled Access Based on the Need to Know
- CSC 16: Account Monitoring and Control
The NIST Cybersecurity Framework SP 800-53 Controls framework provides guidance
for federal agencies and other organizations to implement and maintain security and
privacy controls for their information systems. You can view check summaries for eight
families of NIST controls:
- SC: Access Control
- AU: Audit and Accountability
- CM: Configuration Management
- CP: Contingency Planning
- IA: Identification and Authentication
- RA: Risk Assessment
- SC: System and Communications Protection
- SI: System and Information Integrity
For more information, see Dashboard: Compliance Summary.