WildFire U.S. Government Cloud
Table of Contents
Expand all | Collapse all
-
- Mach-O Support for WildFire Inline ML
- Advanced WildFire Public Sector Cloud
- Advanced WildFire Government Cloud
- WildFire Spain Cloud
- WildFire Saudi Arabia Cloud
- WildFire Israel Cloud
- WildFire South Korea Cloud
- WildFire Qatar Cloud
- WildFire France Cloud
- WildFire Taiwan Cloud
- WildFire Indonesia Cloud
- WildFire Poland Cloud
- WildFire Switzerland Cloud
- Advanced WildFire Support for Intelligent Run-time Memory Analysis
- Shell Script Analysis Support for Wildfire Inline ML
- Standalone WildFire API Subscription
- WildFire India Cloud
- MSI, IQY, and SLK File Analysis
- MS Office Analysis Support for Wildfire Inline ML
- WildFire Germany Cloud
- WildFire Australia Cloud
- Executable and Linked Format (ELF) Analysis Support for WildFire Inline ML
- Global URL Analysis
- WildFire Canada Cloud
- WildFire UK Cloud
- HTML Application and Link File Analysis
- Recursive Analysis
- Perl Script Analysis
- WildFire U.S. Government Cloud
- Real Time WildFire Verdicts and Signatures for PDF and APK Files
- Batch File Analysis
- Real Time WildFire Verdicts and Signatures for PE and ELF Files
- Real Time WildFire Verdicts and Signatures for Documents
- Script Sample Analysis
- ELF Malware Test File
- Email Link Analysis Enhancements
- Sample Removal Request
- Updated WildFire Cloud Data Retention Period
- DEX File Analysis
- Network Traffic Profiling
- Additional Malware Test Files
- Dynamic Unpacking
- Windows 10 Analysis Environment
- Archive (RAR/7z) and ELF File Analysis
- WildFire Analysis of Blocked Files
- WildFire Phishing Verdict
WildFire U.S. Government Cloud
As of July 15, 2024, the Palo Alto Networks WildFire U.S. Government Cloud has
been superseded by the Advanced WildFire Government Cloud and Advanced WildFire Public Sector Cloud, which provides access to high-security
Advanced WildFire Cloud environments operating a newer codebase with an enhanced
feature set. As a result, Palo Alto Networks no longer onboards new customers to
the WildFire U.S. Government Cloud. Existing customers can continue to access
the WildFire U.S. Government Cloud until the decommission date of November 30,
2024, at which point, the existing URI will be redirected to the Advanced
WildFire Public Sector Cloud.
For details about the new cloud offerings, contact your Palo Alto Networks sales
representative point of contact to discuss any additional operational
details.
The Palo Alto Networks WildFire U.S. Government cloud is a high-security malware analysis
platform that is FedRAMP (Federal Risk and Authorization Management
Program) authorized. This WildFire cloud environment is intended for use only by
U.S. Federal agencies which require a standardized approach to security assessment,
authorization, and continuous monitoring for cloud products and services. This
allows you to prevent evasive zero-day threats and malware affecting critical
government agencies with the added advantage of a reliable cloud-based service that
meets stringent federal requirements for data privacy and regulatory integrity.
For
additional details, including usage limitations, on the U.S. Government
malware analysis service, go to WildFire U.S. Government Cloud.
In
order to connect to the WildFire: U.S. Government cloud, you must
apply for access. Follow any internal procedural measures to determine
the suitability of using the WildFire: U.S Government cloud within
your network, such as, but not limited to conducting a risk analysis,
evaluation of the CSP submission package, and authorization approvals.
Please contact your Palo Alto Networks sales representative / WildFire:
U.S. Government Cloud point of contact to discuss any additional
operational details.
Requests to access the WildFire U.S. Government cloud begins when you have met the proper
organization requirements for operating a FedRAMP authorized service. There are two
entity categories who can access the WildFire U.S. Government cloud: U.S. Government
contractors and U.S. federal agencies (and other approved governmental departments).
Both entities have specific requirements for accessing the WildFire U.S. Government
cloud:
- U.S. Federal AgenciesU.S. Federal agencies, departments, and bureaus must receive an Authority to Operate (ATO) by the Designated Approving Authority (DAA), which authorizes operation of the WildFire U.S. Government cloud within an agencies operations, before access is granted.
-
Inform the Palo Alto Networks FedRAMP Point of Contact (fedramp@paloaltonetworks.com) of the intention to use the WildFire U.S. Government cloud.
-
Send a request to info@fedramp.gov.
-
Complete the Package Access Request Form and submit it to info@fedramp.gov.The FedRAMP Program Management Office (PMO) reviews the form and typically issues a temporary 30 day access to the WildFire FedRAMP package.
-
Complete any internal processes required to adapt the WildFire FedRAMP package to your deployment.
-
Issue the Authorization to Operate (ATO).
-
Send a request to the FedRAMP PMO for permanent access to the WildFire U.S. Government cloud.
-
- U.S. Government ContractorsU.S. Government contractors who use or access the WildFire U.S. Government cloud must meet the following requirements.
-
Must be a citizen of the United States.
-
Hold an active contract (or subcontract) with a U.S. Federal government agency with an occupational requirement for information exchange using the Internet, such as email correspondence, sharing of documents, and other forms of Internet communication.
-
Upon termination of a contractor’s employment, the user must cease using or accessing the WildFire U.S. government cloud.
-
Abide by the confidentiality provisions contained within the Palo Alto Networks EULA.
-
After your organization issues an Authorization to Operate (ATO) or when applicable U.S.
Government contractors meet all usage requirements, only then can a request be made
to access the WildFire U.S. Government cloud by contacting your Palo Alto Networks
Account team.
- Contact your FedRAMP Program Management Office (PMO) to determine the viability of the U.S. Government cloud for your security needs.
- Contact the Palo Alto Networks point of contact specified in the FedRAMP Marketplace. The point of contact provides additional information about the service, as well as any other operational details pertinent to your particular WildFire deployment.
- Contact the Palo Alto Networks Account Team to begin the on-boarding process. The Account Team will request the following information regarding customer details and deployment specifics.
- Contact information.
- A brief description for migrating to the WildFire U.S. Government cloud.
- A statement of organizational compliance with the confidentiality provisions outlined within the Palo Alto Networks EULA.
- Egress IP addresses of all firewall gateways (including management planes), as well as all instances of Panorama.
- After WildFire Program Management grants approval to use the WildFire U.S. Government cloud (typically in one to three business days), Palo Alto Networks Development Operations applies the appropriate controls.
- After access to the WildFire U.S. Government cloud is granted, reconfigure the firewall to forward unknown files and email links for analysis using the following URL: wildfire.gov.paloaltonetworks.com. For more information, see Forward Files for Wildfire Analysis. If you require any additional assistance, contact Palo Alto Networks Customer Support.