AI Access Security
App Users
Table of Contents
Expand All
|
Collapse All
AI Access Security Docs
Discover Risks Posed by GenAI Apps by App Users
Discover the risks posed by risky users accessing generative AI (GenAI)
applications.
- Log in toStrata Cloud Manager.
- Selectto view theInsightsAI AccessAI Access SecurityInsights dashboard.This displays the top GenAI apps that risky users accessed to help narrow your focus.
- ClickReview use casefor the GenAI app Use Case associated with the GenAI app your risky users are accessing.TheAI Access SecurityInsights dashboard displays the GenAI application accessed on your network by use case by default and displays the following high-level information about your top GenAI app users. Click on the user count o view theUser NameorIP Addressand the number of GenAIApplicationsthat user accessed.
- User BreakdownThe provides a summary of the total number of users accessing any GenAI app associated with the selected GenAI use case. A breakdown is provided of how many users are accessingSanctioned,Tolerated, andUnsanctionedapplications.ClickTotal Usersto view a list of all users accessing GenAI apps associated with the selected use case.
- Users by GenAI Use CaseThis provides a summary of the total number of users accessing each individual GenAI app associated with the selected GenAI use case. TheSanctioned,Tolerated, andUnsanctionedGenAI apps are listed with the total user count for each individual app.Apply theUser CountSort Byfilter to sort GenAI apps from higher to lowest user count.
- Create a custom Security policy rule to control access to a GenAI application for specific users.For example, based on your investigation you discover that a large number of users are accessing thebing-ai-uploadingGenAI app. While this is aSanctionedGenAI, it's only sanctioned for a specific set of users within your organization. You can decide to write a policy rule to explicitly block access to users which shouldn't have access to this GenAI app to prevent misuse and a Security policy rule to explicitly allow access to users who are approved to access the GenAI app. Alternatively, you can write a policy rule to allow access for all users but implement data loss and threat prevention measures to prevent exfiltration of sensitive data and prevent threats such as malicious and phishing URLs, malicious files, or malware.