AI Runtime Firewall
Focus
Focus
Prisma AIRS

AI Runtime Firewall

Table of Contents

AI Runtime Firewall

See all the new features made available for Prisma AIRS AI Runtime firewall.
Here are the new Prisma AIRS AI Runtime firewall features.

Multi-Cloud Security Fabric

November 2025
Supported for:
  • Prisma AIRS (Managed by Strata Cloud Manager)
You can use Multi-Cloud Security Fabric (MSF) Deployment to fully automate the deployment of AIRS and VM-Series firewall instances along with the complete networking infrastructure required for traffic redirection across your cloud environments. This feature eliminates the manual complexity of creating security VPCs in AWS or VNets in Azure, configuring load balancers, setting up subnets, and orchestrating cloud-native routing elements that was previously required when using basic Terraform templates from Strata Cloud Manager.
The automation handles multiple traffic flow scenarios including east-west flows within VPCs or VNets, between VPCs in single regions, across different regions in the same or multiple clouds, and north-south flows for internet egress traffic. You can deploy firewalls in any region regardless of where your applications are located, and the system automatically establishes the necessary tunnels, route tables, and cloud-native elements to ensure traffic reaches the appropriate firewall instances for inspection.
You benefit from this feature when you need to secure complex multi-cloud architectures without investing significant time in manual network configuration. The automated deployment reduces the risk of configuration errors that can occur when manually setting up VPC peering, transit gateway routing, and cross-account connectivity. You can redirect traffic from discovered applications with minimal clicks while maintaining visibility into all orchestration changes through both cloud dashboards and SCM.
The feature supports both new deployments where new security infrastructure is created and existing environments where you can integrate existing VM-series firewalls into the automated traffic paths. You maintain control over the deployment process with options to opt out of automatic networking setup if you prefer to handle routing configuration manually or if you have existing networking arrangements that should remain unchanged.
You can initiate deployments either from the Cloud Asset Map page where application context is automatically populated, or through the traditional deployment interface where you manually specify source and target details. The system minimizes traffic disruption by establishing tunnels before modifying route tables and provides end-to-end path tracing capabilities to validate traffic flows before and after firewall insertion.

Secure Private Cluster with Prisma AIRS

November 2025
Supported for:
  • Prisma AIRS (Managed by Strata Cloud Manager)
You can now deploy and manage security infrastructure for private Kubernetes clusters and across multiple cloud accounts using the enhanced deployment service on Strata Cloud Manager. This feature addresses the need to secure private cluster traffic that cannot be accessed directly from the public internet, while providing the flexibility to deploy application workloads and security components in separate accounts managed by different teams within your organization.
When you deploy Kubernetes workloads in private clusters, you can now use AIRS or VM-Series firewalls for traffic inspection through an enhanced Tag Collector deployment in your AWS or Azure environments. The Tag Collector connects to your private clusters to collect IP-tag information and forwards this data to the Cloud IP-Tag Service, enabling the Discovery service to maintain visibility into your container workloads. The generated Terraform templates accommodate both tag collection and traffic inspection from private clusters, eliminating the previous limitation that required public cluster endpoints.
You can select applications across multiple cloud accounts and deploy firewalls in different accounts than your application infrastructure. On AWS, the solution uses Resource Access Manager to share Transit Gateways across accounts, enabling the Tag Collector to collect IP-tags from private clusters and forward traffic to AIRS for inspection. Gateway Load Balancer service principals expose GWLB services across accounts for Kubernetes traffic inspection. On Azure, the solution leverages virtual network peering between the transit VNET and application VNET, with private DNS zone access enabling tag collection from private AKS clusters.
The Tag Collector automatically discovers clusters within your environment and generates monitoring definitions for each identified cluster. It continuously monitors for cluster additions or removals and communicates configuration changes to the Cloud IP-Tag service.
This enhancement decouples the tag collector Terraform templates, allowing you to deploy them standalone when generated through the deployment service. You maintain the option to deploy firewalls and tag collectors in separate accounts from your application account, provided those accounts are onboarded to Strata Cloud Manager.

Discovery Data Deletion

November 2025
Supported for:
  • Prisma AIRS (Managed by Strata Cloud Manager)
You can delete historical discovery data for cloud accounts in Prisma AIRS to meet data compliance requirements when you need to remove collected asset information, flow logs, and audit logs from your environment. This feature addresses regulatory compliance scenarios where you must permanently remove specific data sets while maintaining operational security coverage. When you initiate discovery data deletion, the system validates your request and places the cloud account in an inactive state to prevent new data collection while a background process removes all associated data from storage systems and discovery databases.
The deletion process handles firewall deployments differently based on their deployment method. Manually-deployed firewalls continue inspecting traffic during data deletion, ensuring uninterrupted security coverage, while auto-deployed firewalls stop traffic inspection as the system undeploys them. You must manually delete the Terraform template associated with the cloud account regardless of deployment type. For auto-deployed firewalls, deleting the Terraform template removes the firewall from your deployment, whereas manually deployed firewalls require separate removal since only the template is deleted. The deletion process runs asynchronously to maintain system performance, during which you cannot modify account settings or enable additional monitoring features.
Prisma AIRS maintains audit timestamps throughout the deletion process to track when deletion was requested and completed, providing the visibility needed for compliance reporting and data lifecycle management activities. Once deletion completes, the account remains inactive and no longer collects data until you manually reactivate it through the cloud account interface in Strata Cloud Manager.

Optimize Egress Traffic for EKS Containerized Workloads

August 2025
Supported for:
  • Prisma AIRS (Managed by Strata Cloud Manager)
The overlay routing feature for EKS traffic allows Prisma® AIRS™ AI Runtime: Network Intercept to eliminate traffic hairpinning. This is achieved by enabling direct egress from the intercept to next-hop destinations like Internet Gateways (IGWs) and NAT Gateways. This new capability prevents traffic from being double-inspected, which reduces latency, bandwidth usage, and resource consumption.
With overlay routing, Prisma AIRS can now function as a single component for both security inspection and network address translation, simplifying the network architecture. It consolidates these functions into a single step, ensuring comprehensive security for containerized workloads while maintaining an efficient and direct traffic flow.

Granular Kubernetes Traffic Inspection at the Namespace Level

August 2025
Supported for:
  • Prisma AIRS (Managed by Strata Cloud Manager)
You can apply granular security controls to containerized applications by managing traffic inspection at the individual Kubernetes namespace level, moving beyond an all-or-nothing approach. You can selectively inspect or bypass traffic flows based on CIDR ranges within specific namespaces. This provides an optimized security posture where critical traffic is thoroughly examined, while known benign traffic can bypass inspection. This selective approach helps improve performance and resource utilization without compromising security for your Kubernetes workloads. This enhancement strengthens security for your containerized applications, enabling more efficient and effective management of your security posture across diverse Kubernetes workloads.

Secure Serverless Workloads in Cloud Environments

August 2025
Supported for:
  • Prisma AIRS (Managed by Strata Cloud Manager)
Protect your serverless resources in Azure or AWS environments by defining security boundaries for them during cloud account onboarding. Once defined, these newly discovered serverless functions become visible on your application dashboard, integrating with your existing virtual machine and container workloads for a unified view of your entire cloud environment. This consolidation of visibility allows you to monitor and manage security for all your compute types from a single location.
The platform uses the same streamlined workflow you already use for other cloud assets. By extending this workflow to serverless functions, you can consistently deploy firewall protection, ensuring comprehensive security coverage as your cloud-native architectures evolve. This approach provides a repeatable, automated way to secure your dynamic cloud applications, helping to maintain a strong security posture without the need for manual, per-resource configurations. The integration of serverless resources into the centralized dashboard simplifies management and helps you quickly identify and protect newly deployed functions.

Refine Cloud Application Discovery for Enhanced Security

August 2025
Supported for:
  • Prisma AIRS (Managed by Strata Cloud Manager)
Gain granular control over cloud asset discovery and application organization using tags, subnets, and namespaces. This feature allows you to define precise application boundaries during cloud account onboarding, aligning with modern, dynamic cloud architectures. This feature provides enhanced application definition options during the cloud account onboarding process.

Centralized Firewall Management

August 2025
Supported for:
  • Prisma AIRS (Managed by Strata Cloud Manager)
You can now deploy and manage VM-Series firewalls directly from Strata Cloud Manager, which streamlines the deployment and monitoring of your entire security infrastructure from a single, unified interface. This centralized dashboard within Strata Cloud Manager consolidates threats detected by both VM-Series firewalls and Prisma AIRS AI Runtime: Network Intercept, giving you a unified view of your security operations.
You can also use the same streamlined workflow to deploy a VM-Series firewall as you would for other cloud assets. This capability helps you to accelerate your deployment processes and ensures consistent protection. Enhanced application details provide clear insights into network traffic flow paths, showing which firewall platform protects each application and displaying the firewall serial number and type (VM-Series or Prisma AIRS AI Runtime: Network Intercept).

Secure Custom AI Models on Private Endpoints

August 2025
Supported for:
  • Prisma AIRS (Managed by Panorama or Strata Cloud Manager)
You can extend AI security inspection to LLMs hosted on privately managed endpoints or input/output schemas that are not publicly known. By enabling this support within your AI security profile, all traffic that matches a security policy rule is forwarded to the AI cloud service for threat inspection, regardless of whether the model is a well-known public service or a custom-built private one. This ensures comprehensive security for your entire AI ecosystem.
The new AI security profile inspects and secures the AI traffic between AI applications and LLM models passing through Prisma AIRS: Network intercept that are managed by Strata Cloud Manager or Panorama. This profile protects against threats such as prompt injections and sensitive data leakage.

Gain Visibility into AI Security Threats

July 2025
Supported for:
  • Prisma AIRS (Managed by Panorama)
Gain enhanced visibility into AI-specific threats through an additional AI security report that displays comprehensive AI security threat logs forwarded by Prisma AIRS Network intercept. This gives you enhanced visibility into AI model protection, AI application protection, and AI data protection threats detected based on your AI security profile configurations. You can also filter logs by the `ai-security` threat type when configuring log forwarding profiles or building custom reports, enabling targeted analysis and streamlined security operations for AI-specific threats.

Multi-Region Network Intercept

July 2025
Supported for:
  • Prisma AIRS (Managed by Strata Cloud Manager)
Prisma AIRS AI Runtime: Network intercept now supports deployment across multiple regions, including US, UK, India, Canada, and Singapore. This expansion enables you to deploy the Prisma AIRS AI Runtime: Network intercepts on tenant service groups (TSG) in your preferred regions.

Security Lifecycle Review (SLR) for AWS

June 2025
Supported for:
  • Prisma AIRS (Managed by Strata Cloud Manager)
Gain comprehensive visibility, control, and protection for your AWS environment without deployment of an inline firewall. The Security Lifecycle Review (SLR) for AWS, within AI Runtime Security: Network intercept when deployed in the SLR mode, protects your inbound, outbound, and east-west traffic using mirrored traffic between the application Elastic Network Interfaces (ENIs). This non-inline deployment method allows security monitoring and enforcement without altering the existing data path. The platform can generate detailed reports and threat logs based on this analyzed traffic, providing insights into potential security incidents.
By leveraging mirrored traffic, you gain crucial threat detection and prevention capabilities for all directions of traffic flow, without the need to re-architect your network or introduce latency associated with inline deployments. This simplifies security operations while enhancing your ability to identify and respond to threats effectively, all while maintaining the agility of your cloud environment.

Streamline Upgrades for Prisma AIRS AI Runtime: Network Intercept

April 2025
Supported for:
  • Prisma AIRS (Managed by PAN-OS or Panorama)
You can now upgrade your Prisma® AIRS™ AI Runtime: Network Intercept to maintain protection against AI-specific threats. The platform now supports multiple upgrade paths, providing flexibility and ensuring continuous security.
The firewall image format, with a *.aingfw extension, ensures compatibility specifically with the Prisma AIRS environment. This dedicated *.aingfw format ensures compatibility with Prisma AIRS environments protecting AI workloads while simplifying security operations.

Extend AI Security to Private Clouds

April 2025
Supported for:
  • Prisma AIRS (Managed by Panorama or Strata Cloud Manager)
You can secure and monitor AI workloads that are deployed in private clouds, such as those built on ESXi and KVM servers. This capability extends protection to your AI applications and models even when they interact with public cloud Large Language Model (LLM) providers. By protecting the traffic between your private cloud workloads and external LLMs, you can safeguard against data exfiltration, prompt injection, and other threats specific to AI interactions. This functionality is essential for organizations with hybrid cloud strategies. It ensures that security is not a barrier to leveraging AI, allowing you to maintain control and visibility over your AI ecosystem regardless of where your data and applications are located.
To enable this, the Prisma AIRS™ AI Runtime: Network intercept can be manually deployed and bootstrapped in your private cloud environment. This deployment provides a crucial security layer for AI workloads that reside outside of public cloud infrastructure. Once deployed, the firewall can be centrally managed by either Strata™ Cloud Manager or Panorama, allowing for consistent policy enforcement and monitoring across your entire network.