- Network Intercept: Real-time, inline protection for cloud network architectures
- API Intercept: Security-as-Code embedded directly into your applications
Get Started with Palo Alto Networks Prisma AIRS
Using Prisma AIRS with Portkey
1. Set Up Prisma AIRS
Before integrating with Portkey:- Onboard and activate Prisma AIRS in Strata Cloud Manager
- Create security profiles with your desired threat detection rules
- Note your Profile Name - you’ll need this for Portkey configuration
2. Add Prisma AIRS Credentials to Portkey
- Navigate to the
Integrations
page underSettings
- Click on the edit button for the Palo Alto Networks Prisma AIRS integration
- Add your Prisma AIRS credentials (API keys from Strata Cloud Manager)
3. Add Prisma AIRS Guardrail Check
- Navigate to the
Guardrails
page and click theCreate
button - Search for “PANW Prisma AIRS Guardrail” and click
Add
- Configure the guardrail parameters:
- Profile Name (required): Enter the security profile name from your Prisma AIRS configuration
- AI Model: Specify the AI model identifier (optional)
- App User: Specify the application user context (optional)
- Set any
actions
you want on your check, and create the Guardrail!
Guardrail Actions allow you to orchestrate your guardrails logic. You can learn more about them here
Check Name | Description | Parameters | Supported Hooks |
---|---|---|---|
PANW Prisma AIRS Guardrail | Blocks prompt/response when Palo Alto Networks Prisma AI Runtime Security returns action=block | Profile Name (string, required), AI Model (string), App User (string) | beforeRequestHook , afterRequestHook |
4. Add Guardrail ID to a Config and Make Your Request
- When you save a Guardrail, you’ll get an associated Guardrail ID - add this ID to the
input_guardrails
oroutput_guardrails
params in your Portkey Config - Create these Configs in Portkey UI, save them, and get an associated Config ID to attach to your requests. More here.
What Prisma AIRS Protects Against
Prisma AIRS provides multi-layered protection against various AI-specific threats:Security Threats Detected
- Malicious URL Detection: Detects and block Malicious URLs in your LLM requests/response
- Prompt Injections: Detects and blocks attempts to manipulate AI behavior through malicious prompts
- Sensitive Data Leakage: Prevents PII, secrets, and confidential information from being exposed
- Insecure Outputs: Blocks responses containing malware, malicious URLs, or harmful content
- Model DoS Attacks: Protects against attempts to overwhelm or disable AI models
- Jailbreak Attempts: Identifies and prevents attempts to bypass AI safety mechanisms
- Toxic Content: Filters harmful, offensive, or inappropriate content
Best Practices
- Profile Configuration: Create different security profiles in Prisma AIRS for different use cases (development, staging, production)
- Context Awareness: Use the
aiModel
andappUser
parameters to provide context for better threat detection - Monitoring: Regularly review both Portkey logs and Prisma AIRS dashboard for security insights
- Policy Updates: Keep your Prisma AIRS security policies updated based on emerging threats
Get Support
If you face any issues with the Prisma AIRS integration, reach out to:- Portkey team on the community forum
- Palo Alto Networks support through your enterprise account