Palo Alto Networks Prisma AIRS
Comprehensive AI security platform providing runtime protection against prompt injections, data leakage, and AI-specific threats
Palo Alto Networks Prisma AIRS™ is a purpose-built, centralized security platform that protects your entire AI ecosystem. It provides comprehensive protection for AI applications, models, data, and agents through real-time threat detection and inline security enforcement across all OSI layers (1-7).
Prisma AIRS offers two protection modes:
- Network Intercept: Real-time, inline protection for cloud network architectures
- API Intercept: Security-as-Code embedded directly into your applications
To get started with Prisma AIRS, visit their documentation:
Get Started with Palo Alto Networks Prisma AIRS
Using Prisma AIRS with Portkey
1. Set Up Prisma AIRS
Before integrating with Portkey:
- Onboard and activate Prisma AIRS in Strata Cloud Manager
- Create security profiles with your desired threat detection rules
- Note your Profile Name - you’ll need this for Portkey configuration
2. Add Prisma AIRS Credentials to Portkey
- Navigate to the
Integrations
page underSettings
- Click on the edit button for the Palo Alto Networks Prisma AIRS integration
- Add your Prisma AIRS credentials (API keys from Strata Cloud Manager)
3. Add Prisma AIRS Guardrail Check
- Navigate to the
Guardrails
page and click theCreate
button - Search for “PANW Prisma AIRS Guardrail” and click
Add
- Configure the guardrail parameters:
- Profile Name (required): Enter the security profile name from your Prisma AIRS configuration
- AI Model: Specify the AI model identifier (optional)
- App User: Specify the application user context (optional)
- Set any
actions
you want on your check, and create the Guardrail!
Guardrail Actions allow you to orchestrate your guardrails logic. You can learn more about them here
Check Name | Description | Parameters | Supported Hooks |
---|---|---|---|
PANW Prisma AIRS Guardrail | Blocks prompt/response when Palo Alto Networks Prisma AI Runtime Security returns action=block | Profile Name (string, required), AI Model (string), App User (string) | beforeRequestHook , afterRequestHook |
4. Add Guardrail ID to a Config and Make Your Request
- When you save a Guardrail, you’ll get an associated Guardrail ID - add this ID to the
input_guardrails
oroutput_guardrails
params in your Portkey Config - Create these Configs in Portkey UI, save them, and get an associated Config ID to attach to your requests. More here.
Here’s an example config:
For more, refer to the Config documentation.
Your requests are now protected by Prisma AIRS’s comprehensive AI security capabilities, and you can see the verdict and any actions taken directly in your Portkey logs!
What Prisma AIRS Protects Against
Prisma AIRS provides multi-layered protection against various AI-specific threats:
Security Threats Detected
- Prompt Injections: Detects and blocks attempts to manipulate AI behavior through malicious prompts
- Sensitive Data Leakage: Prevents PII, secrets, and confidential information from being exposed
- Insecure Outputs: Blocks responses containing malware, malicious URLs, or harmful content
- Model DoS Attacks: Protects against attempts to overwhelm or disable AI models
- Jailbreak Attempts: Identifies and prevents attempts to bypass AI safety mechanisms
- Toxic Content: Filters harmful, offensive, or inappropriate content
Protection Layers
- Network Level (OSI Layers 1-7): Complete inline protection for all network traffic
- API Level (OSI Layers 4-7): Security-as-Code embedded directly in your applications
- Real-time Analysis: Continuous monitoring and threat detection
- Policy Enforcement: Custom security rules based on your organization’s requirements
Best Practices
- Profile Configuration: Create different security profiles in Prisma AIRS for different use cases (development, staging, production)
- Context Awareness: Use the
aiModel
andappUser
parameters to provide context for better threat detection - Monitoring: Regularly review both Portkey logs and Prisma AIRS dashboard for security insights
- Policy Updates: Keep your Prisma AIRS security policies updated based on emerging threats
Get Support
If you face any issues with the Prisma AIRS integration, reach out to:
- Portkey team on the community forum
- Palo Alto Networks support through your enterprise account