How to Protect Your Critical Cloud AI Workloads and Data Without Slowing the Pace of Innovation
15-minute read
The integration of AI into hybrid and cloud environments is rapidly gaining momentum,
as companies across all industries recognize AI’s potential in driving digital transformation and future growth.
To handle the colossal volumes of data and execute energy-intensive AI workloads, organizations are turning to
cloud services, increasingly adopting multicloud and hybrid cloud deployments to support and scale their AI
initiatives. Virtual machines, cloud container services like Kubernetes, and extensive cloud data stores form
the backbone of large language models (LLMs), retrieval augmented generation (RAG), and AI agents.
The allure of the cloud lies in its provision of a scalable, adaptable, and cost-efficient foundation for AI
workloads with the required compute power. This allows organizations to seamlessly scale up or down without
incurring exorbitant physical infrastructure costs.
There’s Power in the Cloud
Gartner estimates that by 2025, 95% of new digital workloads will be deployed on cloud-native platforms—up from
31% in 2021.1
Forrester predicts that from 2023 to 2030, the compound annual growth rate of the off-the-shelf AI software
market will be 36%, reflecting the growing adoption of AI technologies as part of strategic growth
initiatives.2
Multifaceted Risks of Multicloud
To run the most demanding AI/ML workloads, organizations rely on multiple cloud service providers to develop,
deploy, and consume AI products. Virtual machines, containers, and APIs are essential for AI innovation and
dedicated cloud environments for testing, staging, and production are essential to manage workloads, compute
resources, and the separation of sensitive assets.
Multicloud infrastructures may be necessary for AI projects. However, the complexities of managing and securing
each cloud environment become more difficult in our era of advanced threats. The growing attack surfaces created
by multicloud deployments introduce visibility gaps, policy inconsistencies, and disparate access controls,
which in turn open the door to bad actors.
One of the key hacker targets within the infrastructure of cloud-centric organizations are the sensitive and
proprietary datasets that form the DNA of their AI workloads.
AI Datastores Are Essential—and at Risk
We’re all familiar with the risks of a data breach. Losing employee or customer information, trade secrets,
intellectual property, source code, operational information, business forecasts, and other sensitive data opens
a company up to tremendous financial, reputational, and legal risks.
AI feeds on data, and it’s hungry. To train LLM and other AI models, organizations must create massive
datastores of their most sensitive information.
Breaches have increasingly severe repercussions. In 2023, the global average cost of a data breach was US$4.5
million, a 15% increase since 2020.4
But in the data-reliant world of AI, data breaches can be catastrophic, existential events.
Types of attacks on AI data
The type of data used in AI/ML datastores has been referred to
as “radioactive gold.” It’s extremely
valuable, but it must be handled, stored, and controlled very carefully because in the wrong hands it can
be
dangerous.
In addition to conventional security threats like SQL
injection, AI datastores are subject to constantly
evolving, unique attacks that target them specifically. Here are just five threats to look out for:
The Challenge of Securing AI Data
The cloud delivers the scalable reservoir of data storage and processing power needed to run today’s and
tomorrow’s AI workloads, but running AI workloads across different cloud environments can pose challenges.
The pace of innovation is stretching many organizations beyond their cloud security comfort zone, endangering
the very AI projects that will drive growth.
Mission-critical, cloud-stored data is at risk. Attackers can exfiltrate and sell your proprietary data or
leverage it for ransomware. Bad actors and malicious insiders can inject tainted and malicious data into your
datastore, compromising your AI outputs.
More Tools, More Problems
So, how do you protect your vital AI tools and datasets in this rapidly changing technology landscape?
The answer isn’t more disconnected security tools and siloed solutions. The more tools you have, the less secure
your AI datastores and cloud workloads really are.
More tools mean:
More maintenance, more training, and more processes.
More work with fewer results and an increased number of alerts.
More effort to implement, maintain, and integrate with other solutions in your cloud security stack—and that
means investigation and remediation slows to a crawl.
More risk in visibility overload and the inability to correlate attack paths.
The answer is an integrated, comprehensive CNAPP that makes cloud security less complex—a solution that
leverages AI/ML to secure your cloud-based AI workloads without slowing down the pace of innovation.
The answer is Prisma® Cloud.
Automation, AI/ML, and a centralized platform approach enable organizations to more securely lock down their
mission-critical, cloud-stored data and maintain a proactive—not reactive—stance.
Prisma Cloud helps you seamlessly manage and optimize security for your AI workloads in a multicloud/hybrid
cloud environment.
Organizations that harness security AI and automation capabilities like those in Prisma Cloud can identify and
contain a data breach in just 66% of the time it takes organizations that don’t use those
capabilities.6
Seamless Integration and Visibility Across All Your Cloud Workloads
Too many organizations can’t achieve true multicloud visibility because of their fractured security tools.
We designed Prisma Cloud to deliver complete, continuous visibility into inventory of all assets across clouds.
By consolidating data into a single platform, Prisma Cloud provides security architects and professionals with a
wealth of real-time information to help reduce risks in their AI workloads and maintain the integrity of their
AI datasets.
Prisma Cloud is compatible with all public cloud environments, providing deep visibility into
internet-accessible assets, including cloud-based systems and services, for more effective management of your
attack surface and mission-critical data.
Prisma Cloud provides seamless integration with twice as many cloud service providers as other platforms. More
than 2,000 out-of-the-box policies enable you to detect attack paths, misconfigurations, vulnerabilities,
identity, data, and other compliance and security issues in over 380 cloud services.
This full cloud visibility and centralized control means you may spend 60% less time every year patching
vulnerabilities in code.7
Prisma Cloud offers:
Continuous visibility of all cloud assets from single pane of glass.
Risk analysis across all your public cloud services.
Full lifecycle asset change attribution.
Advanced Automation of Policy Management
We're only human
Through 2025, 99% of breaches will be caused by misconfigurations that are directly the result of human error,
according to Gartner.8 Once a misconfiguration occurs, the complexity of multicloud environments and
the shared
responsibility model between companies and cloud service providers make it extremely difficult to manually
identify and remediate the mistake.
In short, the human beings in your organization are responsible for introducing policy misconfigurations into
the cloud, but the same human beings are poorly equipped to quickly identify, prioritize, and act upon
vulnerabilities using manual processes alone.
There’s a better way
Prisma Cloud helps teams easily review and update cloud configurations to ensure they align with best practices
and address any potential security risks. Teams can use the graphs and tables to assess policy coverage and
better monitor and manage potential misconfigurations across cloud infrastructure.
Once they spot something wrong, they can quickly take action with a range of progressively automated remediation
capabilities.
Five
Cloud
Misconfigurations to Watch For
Cloud resource misconfigsHardcoded secrets left in codeOver permissive access
Disabled logging and monitoringSensitive data not encrypted
Real-Time Runtime Protection for Your AI Datastores
Agent and Agentless Scanning
Prisma Cloud supports the agentless scanning of cloud workloads on AWS, Azure, GCP, and OCI for vulnerabilities
and compliance. In AWS, Azure, and GCP you can also use agentless scanning for containers, virtual machines, and
serverless functions.
Instead of installing an agent into your cloud environment, Prisma Cloud agentless scanning allows you to
inspect the risks and vulnerabilities in cloud workloads, like AI datastores, without impacting the execution of
the workload.
The Prisma Cloud agent-based solutions offer continuous visibility, risk assessment, web application firewall,
API security, and runtime protection to stop attacks. Deploying a mix of agentless and agent-based protection
across a multicloud and hybrid-cloud environment is made easier because there’s a single policy configuration
for both in Prisma Cloud.
User and Entity Behavior Analytics
Using the powerful UEBA engine in Prisma Cloud, you can quickly identify sensitive activities such as risky
privileged user behavior, security group changes, IAM configuration updates, and more before your AI datastores
are compromised.
With Prisma Cloud, you can leverage ML to take the human element out of finding indicators of compromise in your
cloud environments. The UEBA engine uses an autonomous system to establish a baseline of “normal” activity, then
flags deviations from that baseline.
Continuous API Visibility
Web apps and APIs are the most common medium for sharing and modifying data today, but they’re also a growing
attack surface. Modern cloud-native architectures need a comprehensive approach to security that protects
against the OWASP API Top 10 attacks, manages API vulnerabilities, and ensures compliance and protection in
runtime.
Prisma Cloud provides complete API discovery, risk profiling, and real-time protection integrated into one
comprehensive cloud-native application protection platform.
Advanced Attack Path Visualization
Attack path visualization brings alerts to life in a user-friendly, intuitive way, providing instant context for
the most critical vulnerabilities and the potential impact of an attack on your AI datastores or any cloud
workload.
A user can view the runtime environment and the instance that’s affected, where the attack came from, and where
the attacker could go within the affected instance. They can click into vulnerable containers for greater
context on what data is at risk—all from a single pane of glass. For an internet exposure, for example, security
professionals can trace the full exposure path from the internet to the VPC, subnet, and the corresponding EC2.
With all your threat data correlated and visualized in one place, Prisma Cloud allows for immediate
prioritization and remediation. This deep context and intuitive visualization helps ensure your security teams
stay focused on the threats that matter.