Analyze the unprotected cloud assets and the traffic flow between them.
This page helps you to assess the network traffic flow between AI applications, AI
models, and the internet. It also enables you to evaluate and correlate identified
network threats with discovered resources, providing a comprehensive view of potential
vulnerabilities and risks.
Assess application threats to identify vulnerabilities
and risks post
AI Runtime Security
instance deployment.
Select the
Security
view on the SCM dashboard.
Click on the
Apps
icon. This view will:
Group application threats under
Applications
,
Cloud
Providers
, and
Application Assets
.
Classify apps as protected or unprotected apps, including metadata
such as
Application Asset IP
address,
Cloud Networks
,
Region, Cloud Provider
, and
Tags
used to
categorize the apps.
Drill down to see the network traffic flows between
Apps →
Models, Users → Apps, and Apps → Internet.
Select
Application Breakdown
to view applications grouped by your
cloud workloads such as VMs and Pods (including containerized environments,
Clusters, VMs, and Serverless architectures).