Skip to content

Exciting News! Palo Alto Networks Has Announced Intent to Acquire Protect AI

Security Spotlight: Securing Cloud & AI Products with Guardrails

17 min read
May 28, 2025

In today’s landscape where Cloud and AI are becoming the very fabric of digital innovation, security has transcended from its traditional role as an add-on or checklist item into a fundamental component integrated into every phase. Security acts as the specification, a critical gate within the CI/CD pipeline, and a vital runtime safeguard. It’s an intrinsic part of every system, ranging from a public REST API serving millions to the specialized GPU cluster training tomorrow's autonomous agents.

This article outlines the modern security paradigm we at Protect AI have adopted and championed. We translate core tenets such as Secure by Design, Zero Trust, and Defense in Depth from abstract ideals into practical automated guardrails that we are continuously developing and refining. For us, this framework is key to actively enforcing security at each stage of the development lifecycle ensuring that as we continue to innovate, security provides an uncompromised automated assurance.

At the core of our approach are three fundamental pillars that underpin every security control we implement:

  1. Secure by Design: Build security in every stage of the software development lifecycle.
  2. Zero Trust: “Never trust, always verify” across users, apps, networks and processes.
  3. Defense in Depth: Include layered controls so no single miss is fatal.

These pillars are operationalized through a unified framework of guardrails that we meticulously integrate with our engineering practices. This framework integrates machine-enforced security checks and validations into every phase of the software development lifecycle (SDLC) ensuring continuous security assurance.

SDLC Phase

Purpose of Guardrails

Pillars

Plan

Create a safe architecture and threat model before code

Secure By Design 

Code

Trust every commit

Secure By Design, Zero Trust 

Build

Ensure a trusted build, attestable artifacts, and a model software bill of materials (SBOM)

Secure By Design 

Test

Break it first, measure blast radius

Secure By Design, Defense in Depth 

Deploy

Ship only policy-compliant workloads

Secure by Design, Zero Trust 

Operate

Run least-privilege, immutable infrastructure

Zero Trust, Defense in Depth 

Monitor

Detect drift and feed lessons back to the Plan phase

Secure by Design, Zero Trust, Defense in Depth

Implementing Guardrails across the SDLC

Plan | Architecture Review & Threat Modeling

During the "Plan" phase, threat modeling is performed before implementation followed by a comprehensive security review prior to general availability. This process covers reviewing network flows, data flows, identities, AI model provenance, memory-safe language choices, secure defaults, and the overall blast radius.

Code | Trustworthy Commits

During the “Code” phase, we focus on ensuring every commit is trustworthy, aligning with Secure by Design and Zero Trust principles. Automated guardrails proactively verify code integrity, enforce secure practices, and prevent vulnerabilities. 

Guardrail

Implementation

Signed commits

Version Control System blocks unsigned pushes

Two-person merge

Branch protection enforces duty segregation

Secrets lint

Local Hook + Server Scan

Pinned CI dependency

Workflows reference immutable digests

Commit-signature policy

Only signed commits reach production branches

Build | Attestable Artifacts

In the “Build” phase, our guardrails are dedicated to producing trusted/attestable artifacts and model SBOMs, aligning to Secure By Design principles. Automated guardrails verify each artifact's security, component validation, and build process, ensuring software supply chain integrity and transparency. 

Guardrail

Implementation

Minimal base images

Signed images pinned to immutable digest verified before pull/run 

Static scanning

SAST, Secret, SCA, Infrastructure-as-code with hard fail gates

SBOM for every model

SPDX/CycloneDX

Artifact signing

Images and SBOMs cryptographically signed

Figure 1: The Build guardrail incorporating static and model scans within the CI pipeline.

Test | Break It Before Attackers Do

In the “Test phase, the goal is rigorous, multi-layered testing from unit testing to AI behaviors with the goal to identify and mitigate system weaknesses.

Layer

Guardrail

Unit/API

Security unit tests and fuzzing

Infrastructure

Infrastructure-as-code smoke tests in sandbox 

Cluster

Policy-as-code suite blocks privileged/non-compliant specs

AI Behaviour

Prompt injection and jailbreak tests

Deploy | GitOps + Policy-as-Code

Guardrails within the “Deploy” phase use GitOps practice and policy-as-code to ship only policy-compliant workloads. This is accomplished through automated enforcement at deployment.

Guardrail

Implementation

Declarative State Reconciliation (GitOps)

The deployment tool continuously reconciles declarative states to each cluster

Kubernetes Admission Control

Verifies image signatures and SBOM, Rejects workloads that violate pod-security context or network-segmentation policy

Trusted Registry & Signature Verification

Containers are pulled only from trusted registries with verified signatures at pull time

Operate | Runtime Least-Privilege

In the “Operate” phase, the goal is to enforce least privilege during runtime.

Area

Guardrail

Container Security

Containers run as non-privileged users with read-only root File System, read-only ConfigMaps, Seccomp and AppArmor profiles

Network Security

Default-deny policy, layered segmentation, pod-level allow-lists

Credential Management

Short-lived tokens issued by identity broker, avoid static secrets on disk

LLM/Agent Runtime

Each agent runs in its own pod with syscall allow-list and scoped/context based identity

Monitor | Feedback Loop

During the “Monitor” phase, we establish a vital feedback loop with SOC and automation to identify drifts, take actions, feed lessons back to the Plan phase, reinforcing all security pillars. This cycle aims for an adaptive security posture that is responsive to evolving threats.

Signal

Action

GitOps drift

Revert and SOC alert

Container runtime anomaly

Alert/Kill pod, take forensic snapshot

New CVE in SBOM

Trigger fast-patch build with merge review 

Prompt anomaly/Jailbreak

Log prompt/response pair, alert SOC

Beyond the SDLC

Zero Trust Anchors

We align to the Zero Trust pillar by establishing robust controls across key anchors of our environment. These anchors (Users, Machines, Workloads, Network, Processes, and Infrastructure) are secured with essential controls embodying the "never trust, always verify" principle. Trust chain is established through Identity system that is grounded in “Root of Trust” ensuring comprehensive trust evaluation.

Anchor

Controls 

Users

SSO and MFA, short-lived tokens, quarterly access review

Machines

Secure boot through trusted host provisioning, PKI 

Workloads

Signed images and model artifacts,LLM output sanitization,  image scanning, runtime sensor

Network

mTLS, tier segmentation, egress allow-lists/network gateway

Infrastructure

Identity-aware network plane, micro-segmented subnets, default-deny policy

Team Processes

Security review and sign off, SBOM publication, table tops/incident drills

Defense in Depth Onion 

Complementing Zero Trust, our Defense in Depth strategy materializes as a layered security model often visualized as an onion. Each concentric layer is designed to fortify the ones it encloses. This ensures that even if an attacker bypasses one control such as a WAF at the perimeter or injects a rogue AI prompt deeper inside, they must still overcome multiple independent barriers.

  • Perimeter and Identity: Web app firewall/CDN, DDoS shield, TLS 1.3 + HSTS, MFA-backed IdP/IAM
  • Network Isolation: VPC/subnet tiers, default-deny security groups and Kubernetes net policies, service-to-service mTLS
  • Workload and Application Control: Signed distroless/alpine images, read-only File System, Seccomp/AppArmor, runtime sensor, AuthZ, input validation, content security policy
  • Data/Model Protection: Encryption at rest and in transit, dynamic secrets and key vaults, integrity monitoring

Figure 2: The Defense in Depth Onion illustrating layered security controls.

Seamless Expansion to Hyperscale

A critical aspect of our security framework is its ability to scale effectively. As systems expand, our core security pillars are designed for hyperscale environments, ensuring that security remains robust and manageable.

Pillar

Hyperscale Shift

Immutable Truth

Secure by Design

Guardrails shipped as reusable blueprints injected into every repository/cluster

Security is still baked-in Plan → Build → Deploy

Zero Trust

Federated identity/policy engines answer “who/what/why” at edge scale

Every call still authenticated and authorized with provable intent

Defense in Depth

Fleet-wide chaos tests ensure blast radius stays local

Layers stay the same; only the proof of isolation scales

Guiding Principles and Lessons Learned at Protect AI

As a company, our journey in pioneering AI security while iteratively building our comprehensive guardrail system has taught us several valuable lessons:

  1. Embrace pragmatic progress: Prioritize pragmatic, incremental security enhancements over unattainable perfection as systems continue to evolve.
  2. Build on foundational controls: Implement fundamental controls like signed commits, secure base images, and default-deny networking first, then iteratively expand.
  3. Design helpful guardrails: Create developer-friendly security gates with clear feedback to encourage adoption, not workarounds.
  4. Collaborate to overcome challenges: Partner deeply with Infrastructure and Product teams to co-create effective, engineering-friendly solutions for integration and workflow.
  5. Drive systemic improvements: Focus on addressing root causes of issues, not just one-off fixes, to build lasting resilience.
  6. Establish a feedback loop: Continuously refine security designs using operational learnings and incident data (Monitor → Plan).
  7. Scale with reusable blueprints: Template controls into reusable blueprints and federated policies to scale security with system growth.

This holistic and evolving approach to security is our launchpad, empowering Protect AI to innovate with unwavering confidence and deliver a future of Secure by Design products for our customers.

Are You Ready to Start Securing Your AI End-to-End?