Software AI Defense
Activity Manage

Runtime Policies for Runtime Protection

Last updated: Jul 23, 2025

Policies for Runtime Protection

Create policies using built-in guardrails and templates to ensure data protection, legal compliance, and responsible AI use. These policies are applied to your connected endpoints, helping to secure and govern their interactions.


 

Policies you edit in the AI Defense UI apply only to gateway-deployed Runtime and on-demand Runtime. For Multicloud Defense-deployed Runtime, you must edit your policies in the Multicloud Defense guardrails profile, managed in the Multicloud Defense UI.

Where to manage your policies

For each environment you protect with AI Defense, you will apply a policy that specifies which runtime guardrails are applied. Where you configure your policies depends on which type of Runtime enforcement point you choose:

  • Gateway-enforced runtime protection: Manage your policies in the AI Defense Policies tab.

  • API-enforced runtime protection: Manage your policies in the AI Defense Policies tab.

  • Multicloud Defense-enforced runtime protection: Manage your policies as AI Guardrails profiles in Multicloud Defense.

To create a new policy, click Create Policy on the right top corner of the Policies page. Select from Gateway and API.


 

A left slide-in pane is displayed. This pane has a step-by-step guide for creating a new policy.

To create a new policy

Begin on the New Policy page, under Policy Details:

  1. Enter a Name for the policy.

  2. The Description is optional, you can add details if required.

  3. In Language rule configuration, specify the language of the content that will be monitored. English and Japanese are supported. The set of available guardrail rules depends on the language.

  4. Click Next.

Connections

A list of connections is displayed.


 

A connection represents an LLM endpoint that you are protecting with an Runtime policy. The connection is where you will apply a guardrail policy to the LLM. Each connection may have only one policy applied to it, but a policy may be applied to many connections.

  1. Select the checkbox(es) of one or multiple connections to which you wish to apply this policy.

  2. Click Next.

Security guardrails

Under Security guardrails, configure security rules:

  1. Move the slider to Enabled for the rule.

  2. Click the dropdown for Rule directionality to apply this rule to prompts, responses, or both. Some rules are useful only for monitoring prompts, and others only for responses.

  3. Click the dropdown for Action to select the action this policy rule will take. You can select: Block or Allow.


     

    For API-enforced Runtime protection, the Block action is not available.

  4. Click Next.

Privacy guardrails

To protect data and maintain confidentiality, under Privacy guardrails, configure privacy rules:

  1. Move the slider to Enabled for the rule.

  2. Move the slider to Enabled for one or multiple entities.

  3. Click the dropdown for Rule directionality to apply this rule to prompts, responses, or both. Some rules are useful only for monitoring prompts, and others only for responses.

  4. Click the dropdown for Action to select the action this policy rule will take. You can select: Block or Allow. Important! For API-enforced Runtime protection, the Block action is not available.

  5. Click Next.

Safety guardrails

Under Safety guardrails, configure safety rules:

  1. Move the slider to Enabled for the rule.

  2. Click the dropdown for Rule directionality to apply this rule to prompts, responses, or both. Some rules are useful only for monitoring prompts, and others only for responses.

  3. Click the dropdown for Action to select the action this policy rule will take. You can select: Block or Allow. Important! For API-enforced AI Runtime protection, the Block action is not available.

  4. Click Next.

Summary

On the Summary page:

  1. Review your policy details.

  2. Click Save to create the policy.


 

The policies are disabled by default, you would need to enable the policies.