Dashboard: AI Runtime Security
Focus
Focus
Strata Cloud Manager

Dashboard: AI Runtime Security

Table of Contents

Dashboard: AI Runtime Security

Use the AI Runtime Security dashboard in Strata Cloud Manager (SCM) to understand the cloud assets discovery and AI traffic network flows.
The Strata Cloud Manager (SCM) Command Center dashboard provides a consolidated view of the cloud workloads deployed in Clusters and VMs, such as the pods, the models, the apps, the VMs, and namespaces.
Where Can I Use This?What Do I Need?
  • AI Runtime Security

Discover Cloud Resources

On successfully onboarding your cloud account in SCM and activating your service account, the SCM dashboard provides a unified real-time asset discovery of your cloud workloads.
The Cloud Application Command Center in SCM under Insights → AI Runtime Security provides actionable insights into discovering all the cloud assets in your onboarded cloud account.
The assets discovery on the SCM dashboard is classified into the operational view and security view.
The discovery shows the threats breakdown based on threat urgency and risk categories such as vulnerability detection, URL Security, and Prompt Injection.
  1. The Operational view is an aggregated view of:
    1. A total count and breakdown of assets discovered in your onboarded cloud environments
    2. Traffic flows - protected and unprotected by AI Runtime Security instance
    3. Application workloads (Containers, Serverless functions, and VMs)
    4. AI models being queried
    5. User applications accessing the internet destinations
    6. Application users applications being accessed from external applications
    7. Inbound and outbound traffic statistics
  2. In Security view:
    1. You can add an (“+” icon) AI Runtime Security instance to protect the unprotected network traffic as identified in the operational view.
    2. If the AI Runtime Security instance protection already exists, redirect the unprotected traffic through the available AI Runtime Security instance.
Next, detect the risky network flow paths between the user apps, AI models, and the internet. See AI Traffic Network Risk Analysis and Deploy an AI Runtime Security instance to monitor and defend your cloud network architecture.