Skip to content

Model Security

Daystrom integrates with Palo Alto Prisma AIRS AI Model Security to manage ML model supply chain security. This enables scanning model artifacts for vulnerabilities, malicious code, and compliance issues before deployment.

Overview

The daystrom model-security command group provides access to Model Security operations:

  • Groups — manage security groups that define scanning policies per source type
  • Rules — browse available security rules (read-only, managed by AIRS)
  • Rule Instances — configure rule enforcement within groups (BLOCKING, ALLOWING, DISABLED)
  • Scans — create, list, and inspect model security scans with evaluations, violations, and file results
  • Labels — organize scans with key-value labels
  • PyPI Auth — get authentication for Google Artifact Registry

Concepts

Security Groups

A security group ties a source type (LOCAL, S3, GCS, AZURE, HUGGING_FACE) to a set of rule instances. Each group defines the security policy applied when scanning models from that source.

Security Rules

Rules are the individual checks AIRS performs — unsafe deserialization detection, malicious code injection scanning, license compliance, etc. Rules are managed by AIRS and cannot be created or deleted via the API.

Rule Instances

When a group is created, AIRS automatically provisions rule instances for all compatible rules. Each instance can be configured independently:

State Behavior
BLOCKING Scan fails if rule triggers
ALLOWING Rule evaluates but doesn't block
DISABLED Rule is skipped entirely

Workflow

1. List available groups

daystrom model-security groups list

2. Browse security rules

daystrom model-security rules list
daystrom model-security rules get <uuid>

3. Configure rule enforcement

# View current rule instances in a group
daystrom model-security rule-instances list <groupUuid>

# Update a rule instance state
echo '{"state": "BLOCKING"}' > update.json
daystrom model-security rule-instances update <groupUuid> <instanceUuid> --config update.json

4. Create custom groups

echo '{"name": "Strict S3 Policy", "source_type": "S3"}' > group.json
daystrom model-security groups create --config group.json

5. Inspect scan results

# List scans
daystrom model-security scans list

# View evaluations for a scan
daystrom model-security scans evaluations <scanUuid>

# View violations
daystrom model-security scans violations <scanUuid>

# View scanned files
daystrom model-security scans files <scanUuid>

6. Organize with labels

daystrom model-security labels add <scanUuid> --labels '[{"key":"env","value":"prod"}]'
daystrom model-security labels keys

CLI Reference

See CLI Commands — model-security for full option details.

See Model Security Examples for hands-on walkthroughs.