Posture Control (ZPC)
Step-by-Step Configuration Guide for ZPC
This guide takes you through the configuration steps you need to complete to begin using Zscaler Posture Control (ZPC) for your organization.
Before you begin configuring ZPC, Zscaler recommends reading the following articles:
- What is Zscaler Posture Control?
- Accepting the End User Subscription Agreement (EUSA)
- Using the Zscaler Help Browser
Configuring ZPC
To configure ZPC, complete the following steps:
- Step 1: Log in to ZPC Admin Portal
After your organization is provisioned for ZPC, you will receive an email with a link to create your password. Click the link to set the password. Log in to the ZPC Admin Portal with your registered email ID and the newly created password.
Close - Step 2: Onboard Cloud Accounts
You can onboard multiple cloud accounts from different cloud service providers (CSPs) into ZPC. When onboarded, ZPC monitors your cloud accounts for any vulnerabilities and threats, and provides comprehensive data of your cloud deployment's security posture. To learn more, see Onboarding Cloud Accounts.
Close - Step 3: Configure Administrators & Roles
ZPC implements role-based access control (RBAC) and enables you to delegate roles to users and granularly control their level of access to specific cloud accounts in your organization. You can add users, groups, business units, and assign predefined or custom roles as applicable. To learn more, see About Administrators.
Close - Step 4: Configure Single-Sign-On Authentication
ZPC supports single-sign-on (SSO) via SAML 2.0 so that users can access ZPC directly from the IdP portal. To learn more, see Configuring SAML for SSO.
Close - Step 6: Configure Alerts Rules
ZPC enables you to configure and manage alert rules and notifications, so individuals in your organization can receive email notifications for any security policy violations that occur in your cloud environment. To learn more, see About Alerts.
Close - Step 7: Manage Security Policies
ZPC enables you to create and manage custom security policies to cater to your cloud deployment's compliance requirements. ZPC offers over 400 security policies across multiple cloud service providers (CSPs), including Amazon Web Services, Microsoft Azure, and Google Cloud Platform. To learn more, see About Security Policies.
Close - Step 8: Configure 3rd-Party Integrations
ZPC integrates with your cloud storage services, such as Amazon S3 buckets, Azure Blob Storage, Splunk, or Amazon Security Lake, and sends data logs (alerts) to these storage services. To learn more, see About Third-Party Integrations.
ZPC offers incident management by integrating with ITSM tools, cloud storage services, and ChatOps tools. You can send alert data to these tools for further investigation and remediation. To learn more, see About Third-Party Integrations.
Close - Step 9: Configure Scheduled Reports
ZPC allows you to schedule custom compliance reports for regular distribution to specific recipients. To learn more, see About Scheduled Reports.
Close - Step 10: Configure IaC Integrations
The Infrastructure as Code (IaC) feature is available based on your ZPC subscription. The IaC feature enables you to apply security controls on your IaC infrastructure across various continuous integration (CI) and continuous deployment/delivery (CD) tools, and integrated development environments (IDEs) before deployment. To learn more, see About IaC Integrations.
Close - Step 11: Configure Vulnerability Integrations
The Vulnerability Integration feature is available based on your ZPC subscription. You can use this feature to scan your cloud workloads and container registries for vulnerabilities, remediate issues, secure your cloud assets, and thereby protect your organization from cyber threats. To learn more, see About Vulnerability Integrations.
Close