CNI Chaining: How Prisma AIRS Protects Containers
To effectively inspect containerized applications, Prisma AIRS
AI Runtime: Network intercept uses CNI chaining to create secure tunnels between
your applications and Prisma AIRS AI Runtime: Network
intercept. The CNI chaining redirects container traffic out of your Kubernetes
cluster to Prisma AIRS AI Runtime: Network intercept, which
is deployed outside the cluster. This provides complete visibility and control that
internal-only solutions can’t achieve and enables comprehensive east-west traffic
analysis that traditional security approaches often miss.
The architecture diagram in figure 1 illustrates how
Prisma AIRS achieves application-specific visibility and control of container traffic in all
directions, including both inbound and outbound, as well as east-west traffic within
the Kubernetes cluster.
Prisma AIRS AI Runtime: Network
intercept delivers comprehensive security through native Kubernetes integration by
acting as an additional CNI plugin alongside your existing primary CNI plugin, such
as Calico or Flannel. This CNI chaining is used to bypass network address
translation (NAT) limitations, providing direct access to the Kubernetes network for
enhanced visibility. When containers communicate, traffic flows through both plugins
before reaching its destination:
- First, through your primary CNI for basic networking functions, like IP
assignment and routing.
- Then, through Prisma AIRS AI Runtime: Network
security for deep inspection.
CNI chaining establishes tunnels to redirect traffic from your pod applications to
Prisma AIRS AI Runtime: Network intercept, enabling
thorough traffic inspection.