Dashboard: AI Runtime Security
Focus
Focus
Strata Cloud Manager

Dashboard: AI Runtime Security

Table of Contents

Dashboard: AI Runtime Security

Use the AI Runtime Security dashboard in Strata Cloud Manager (SCM) to understand the cloud assets discovery and AI traffic network flows.
The Strata Cloud Manager (SCM) Command Center dashboard provides a consolidated view of the cloud workloads deployed in Clusters and VMs, such as the pods, the models, the apps, the VMs, and namespaces.
Where Can I Use This?
What Do I Need?
  • AI Runtime Security

Discover Cloud Resources

On successfully onboarding your cloud account in SCM and activating your service account, the SCM dashboard provides a unified real-time asset discovery of your cloud workloads.
The
Cloud Application Command Center
in SCM under
Insights
→ AI Runtime Security
provides actionable insights into discovering all the cloud assets in your onboarded cloud account.
The assets discovery on the SCM dashboard is classified into the operational view and security view.
The discovery shows the threats breakdown based on threat urgency and risk categories such as vulnerability detection, URL Security, and Prompt Injection.
  1. The
    Operational view
    is an aggregated view of:
    1. A total count and breakdown of assets discovered in your onboarded cloud environments
    2. Traffic flows - protected and unprotected by AI Runtime Security instance
    3. Application workloads (Containers, Serverless functions, and VMs)
    4. AI models being queried
    5. User applications accessing the internet destinations
    6. Application users applications being accessed from external applications
    7. Inbound and outbound traffic statistics
  2. In
    Security view
    :
    1. You can add an (“+” icon) AI Runtime Security instance to protect the unprotected network traffic as identified in the operational view.
    2. If the AI Runtime Security instance protection already exists, redirect the unprotected traffic through the available AI Runtime Security instance.
Next, detect the risky network flow paths between the user apps, AI models, and the internet. See
AI Traffic Network Risk Analysis
and
Deploy an AI Runtime Security instance
to monitor and defend your cloud network architecture.

Recommended For You