Back to controls

AI endpoints should not be internet exposed

Public AI endpoints increase the blast radius of prompt injection, data extraction, model abuse, and denial-of-wallet attacks. AI inference and agent endpoints should be private by default and exposed only through approved gateways with authentication, rate limits, logging, and abuse controls.

Category

Controls

High

Applies to

AWSGoogle CloudKubernetesMicrosoft Azure

Coverage

1 queries

Asset types

4 covered

Overview

Public AI endpoints increase the blast radius of prompt injection, data extraction, model abuse, and denial-of-wallet attacks. AI inference and agent endpoints should be private by default and exposed only through approved gateways with authentication, rate limits, logging, and abuse controls.

Remediation guidance

Remediation

Move AI endpoints behind private networking or an approved application gateway. Require authentication and authorization, restrict source networks, enable request logging, and apply rate limits.

Azure

Disable public network access where supported and use private endpoints for Azure AI Foundry, Azure OpenAI, Azure Machine Learning, AI Search, and Bot Services.

GCP

Prefer private endpoints or Private Service Connect for Vertex AI endpoints. Review deployed model service accounts before exposing an endpoint.

Kubernetes

Avoid internet-facing LoadBalancer, NodePort, or Ingress resources for AI workloads unless they are fronted by approved identity, WAF, and rate-limit controls.

Operational rollout

  1. Identify public AI endpoints and classify production or sensitive workloads first.
  2. Move access through private networking or an approved gateway.
  3. Re-scan and document any exception with an owner, business reason, and expiry date.

Query logic

These are the stored checks tied to this control.

AI endpoints should not be internet exposed

Connectors

AWSGoogle CloudKubernetesMicrosoft Azure

Covered asset types

AI ServicesEndpointIngressService

Expected check: eq []

{
  azureAIServiceAccounts(where: { publicEndpoint: { eq: true } }) { ...AssetFragment }
  azureOpenAIDeployments(where: { publicEndpoint: { eq: true } }) { ...AssetFragment }
  azureMachineLearningWorkspaces(where: { publicEndpoint: { eq: true } }) { ...AssetFragment }
  azureMachineLearningEndpoints(where: { publicEndpoint: { eq: true } }) { ...AssetFragment }
  azureAISearchServices(where: { publicEndpoint: { eq: true } }) { ...AssetFragment }
  azureAIVideoIndexerAccounts(where: { publicEndpoint: { eq: true } }) { ...AssetFragment }
  azureBotServices(where: { publicEndpoint: { eq: true } }) { ...AssetFragment }
  azureSynapseWorkspaces(where: { publicEndpoint: { eq: true } }) { ...AssetFragment }
  vertexAIEndpoints(where: { publicEndpoint: { eq: true } }) { ...AssetFragment }
  services(where: { annotations_SOME: { key: { eq: "cyscale.com/ai-service" }, value: { eq: "true" } }, type_IN: ["LoadBalancer", "NodePort"] }) { ...AssetFragment }
  ingresses(where: { annotations_SOME: { key: { eq: "cyscale.com/ai-service" }, value: { eq: "true" } } }) { ...AssetFragment }
}
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon