Create Security Policy Rule to Prevent AI Security Threats
Focus
Focus
AI Runtime Security

Create Security Policy Rule to Prevent AI Security Threats

Table of Contents

Create Security Policy Rule to Prevent AI Security Threats

Prevent AI security threats by creating and enforcing security policy rules.
This page helps you create a security policy to secure your cloud assets from potential threats.
On this page, you will create an AI security profile with specific asset protections and add it to a security profile group. Next, create a security policy and attach the profile group to the security policy. Push the security configurations for the security rule from Strata Cloud Manager to the AI Runtime Security instance in your cloud.
Where Can I Use This?What Do I Need?
  • Secure Cloud Architecture with Security Policies
The AI Runtime Security: Network intercept deployed in your cloud environment gives you continuous real-time discovery and monitoring of your cloud resources. After you identify the malicious threats in your AI network traffic and correlate these with the cloud assets such as AI applications, AI models, and AI datasets, you can then prevent threats by creating policy rules between the cloud resources.
To prevent network security threats:
  1. Create Security Profile Groups and attach the AI Security profile to each profile group.
  2. In Strata Cloud Manager, navigate to Manage → Configuration → NGFW and Prisma Access → Security Services → Security Policy and create a security policy rule.
  3. Attach the security profile group to the security policy under Profile Group.
  4. Navigate to Manage → Operations → Push Config and push the policy configurations to the AI Runtime Security: Network intercept in your AI network architecture to enforce the policy rules on the traffic.
  5. Navigate to Incidents and Alerts → Log Viewer.
    • Select Firewall/AI Security.
    • Review the logs in AI Security Log Viewer to see traffic blocked according to your AI Security profile.
    For information on log fields, see the Strata Logging Service Log Reference Guide.