Deploy Prisma AIRS AI Runtime: Network Intercept in Public Clouds
Focus
Focus
Prisma AIRS

Deploy Prisma AIRS AI Runtime: Network Intercept in Public Clouds

Table of Contents

Deploy Prisma AIRS AI Runtime: Network Intercept in Public Clouds

Deploy Prisma AIRS AI Runtime: Network intercept in public clouds.
Where Can I Use This?What Do I Need?
  • Prisma AIRS AI Runtime Security
This section provides an overview of the deployment workflow overview for Prisma AIRS AI Runtime: Network intercept and VM-Series firewalls in public cloud environments. It can be deployed in-line with your traffic to actively monitor and protect your network in real-time.
You can use the deployment workflow in Strata Cloud Manager (Insights → Prisma AIRS > Prisma AIRS AI Runtime: Network intercept) to generate a Terraform template. This template deploys either Prisma AIRS AI Runtime: Network intercept or VM-Series firewalls in your cloud environment.
Management: Depending on the deployment Terraform type that you create and deploy in your environment, the firewall can be managed by either Strata Cloud Manager or Panorama.
The following sections summarize the deployment workflow, provide links to detailed steps, and explain how to view and manage your deployment Terraform templates.
Additional Deployment Options:

Deploy, Configure, and Secure High-Level Workflow

This is the high-level workflow to:
  • Deploy Prisma AIRS AI Runtime: Network intercept and VM-Series firewall.
    Select the deployment workflow for your chosen platform and cloud provider.
  • Configure Strata Cloud Manager or Panorama to secure your resources: VM workloads and Kubernetes clusters (at the namespace level with traffic steering inspection). Also, configure interfaces, zones, NAT policy, and routers.
    Enable SSL/TLS decryption on Prisma AIRS: Network intercept to decrypt traffic between AI applications and the AI models to detect and enforce AI security protection.
  • (Optional) Configure IP-tag harvesting to collect the application tags from your public and hybrid Kubernetes clusters and enforce security policy rules based on these harvested application tags.
  • Create security policy rules to inspect AI and traditional traffic.
  • Monitor: Threat Logs and AI Security Logs.

View and Manage Terraform Templates

  1. Log in to Strata Cloud Manager.
  2. Navigate to Insights Prisma AIRS Prisma AIRS AI Runtime: Network intercept.
  3. Select Network from the AI Runtime Security drop-down list at the top.
  4. Click on the Terraform deployment shield icon on the top right.
  5. View a list of Terraform templates under the Firewall Protection tab:
    1. Terraform template name.
    2. Deployment Status (deployed or not deployed).
    3. Application Type (AI Runtime Security or VMSeries).
      To confirm that the Prisma AIRS AI Runtime: Network intercept is deployed in your cloud environment, ensure that the Application Type is listed as "AI Runtime Security."
    4. Cloud type, which the network intercept will protect.
    5. Strata Cloud Manager Region.
    6. Managed by column indicates the platform used to manage your firewall:
      • cloud for firewalls managed by Strata Cloud Manager.
      • panorama:<ip-address> for firewalls managed by Panorama.
      For Panorama managed firewalls, the dashboard displays a status of "Not Deployed". To verify successful deployment, check that the Managed By field shows the IP address of your Panorama instance.
    7. Number of Applications discovered (protected and unprotected).
    8. Terraform Creation date.
    9. In the Actions tab you can:
      • Download Terraform templates
      • Delete Terraform templates
      • View associated firewalls for each template