|
| 1 | +--- |
| 2 | +title: Azure SRE Agent security and compliance FAQ |
| 3 | +description: Security, compliance, and enterprise evaluation questions for Azure SRE Agent. |
| 4 | +#customer intent: As an IT security professional, I want to understand the encryption methods used by Azure SRE Agent so that I can ensure compliance with my organization's data protection policies. |
| 5 | +author: craigshoemaker |
| 6 | +ms.author: cshoe |
| 7 | +ms.reviewer: cshoe |
| 8 | +ms.topic: faq |
| 9 | +ms.date: 02/06/2026 |
| 10 | +ms.service: azure-sre-agent |
| 11 | +ms.collection: rai-skilling-ai-copilot |
| 12 | +--- |
| 13 | + |
| 14 | +# Azure SRE Agent security and compliance FAQ |
| 15 | + |
| 16 | +> [!IMPORTANT] |
| 17 | +> Azure SRE Agent is currently in **Preview**. Security details, compliance certifications, and data handling policies might change before General Availability. |
| 18 | +> |
| 19 | +> For the most current information, see the [Azure SRE Agent overview](overview.md). |
| 20 | +
|
| 21 | +This FAQ addresses security, compliance, and data handling questions that enterprise teams ask when evaluating Azure SRE Agent for production use. |
| 22 | + |
| 23 | +## Architecture overview |
| 24 | + |
| 25 | +Azure SRE Agent follows a multi-layered cloud-native architecture built on standard Azure services to ensure enterprise-grade security, compliance, and scalability. |
| 26 | + |
| 27 | +### What is the high-level architecture? |
| 28 | + |
| 29 | +Azure SRE Agent is a cloud-native AI service with three main layers: |
| 30 | + |
| 31 | +:::image type="content" source="media/faq/azure-sre-agent-architecture-diagram.png" alt-text="Diagram of high-level architecture of Azure SRE Agent."::: |
| 32 | + |
| 33 | +### What data stores does SRE Agent use? |
| 34 | + |
| 35 | +SRE Agent uses several Azure data services: |
| 36 | + |
| 37 | +| Data Type | Storage Service | Purpose | |
| 38 | +|--|--|--| |
| 39 | +| Conversation threads | Cosmos DB | Thread and message history | |
| 40 | +| User memories | Cosmos DB | Per-user context storage | |
| 41 | +| Knowledge documents | Azure Blob Storage + AI Search | Document storage and semantic search | |
| 42 | +| Telemetry/traces | Azure Data Explorer (optional) | Investigation traces | |
| 43 | +| Workflow state | Durable Task Hub | Long-running workflow state | |
| 44 | + |
| 45 | +## Access control and identity |
| 46 | + |
| 47 | +Azure SRE Agent uses Azure Role-Based Access Control (RBAC) and Managed Identities to provide granular access control over resources and operations. |
| 48 | + |
| 49 | +### How is access controlled? |
| 50 | + |
| 51 | +Azure SRE Agent uses **Azure Role-Based Access Control (RBAC)**. |
| 52 | + |
| 53 | +To create an agent, your user account needs `Microsoft.Authorization/roleAssignments/write` permissions, typically through: |
| 54 | + |
| 55 | +- Role Based Access Control Administrator |
| 56 | +- User Access Administrator |
| 57 | +- Owner |
| 58 | + |
| 59 | +### What identities does SRE Agent use internally? |
| 60 | + |
| 61 | +The agent uses **Managed Identities** for all Azure resource access: |
| 62 | + |
| 63 | +| Component | Identity Type | Access Scope | |
| 64 | +|--|--|--| |
| 65 | +| Agent Runtime | System-Assigned Managed Identity | Cosmos DB, AI Search, Blob Storage, LLM Provider | |
| 66 | +| Tool Execution | System-Assigned Managed Identity | Azure ARM, Log Analytics, Kusto | |
| 67 | +| AI Search | User-Assigned Managed Identity | Blob Storage | |
| 68 | + |
| 69 | +The configuration doesn't store any secrets or connection strings. |
| 70 | + |
| 71 | +### How do I control what resources the agent can access? |
| 72 | + |
| 73 | +Associate specific resource groups with your agent during creation. The agent only accesses resources within those associated resource groups. |
| 74 | + |
| 75 | +RBAC assignments grant the minimum required permissions: |
| 76 | + |
| 77 | +- **Log Analytics:** Reader access for queries |
| 78 | +- **Azure Resources:** Reader for ARM operations |
| 79 | +- **Storage:** Blob Data Contributor for knowledge base |
| 80 | + |
| 81 | +### What user authentication does the solution use? |
| 82 | + |
| 83 | +Users authenticate by using **Azure AD (Microsoft Entra ID)**. The Frontend API validates tokens and enforces access policies. |
| 84 | + |
| 85 | +## Data handling and storage |
| 86 | + |
| 87 | +Azure SRE Agent stores and processes data using enterprise-grade Azure services with configurable retention policies and regional data residency controls. |
| 88 | + |
| 89 | +### Where is my data stored? |
| 90 | + |
| 91 | +You store data in the Azure region where you deploy your agent. The data plane uses: |
| 92 | + |
| 93 | +| Service | Data Stored | Replication | |
| 94 | +|--|--|--| |
| 95 | +| Cosmos DB | Threads, messages, memories | Configurable (single-region default) | |
| 96 | +| Blob Storage | Knowledge documents, files | LRS default (configurable) | |
| 97 | +| AI Search | Document indexes, embeddings | Single-region | |
| 98 | +| LLM Provider | Prompts/completions (transient) | Regional | |
| 99 | + |
| 100 | +### What data is sent to the LLM? |
| 101 | + |
| 102 | +When you interact with Azure SRE Agent, the following data types might be sent to the underlying LLM: |
| 103 | + |
| 104 | +| Data Type | Sent to LLM | Purpose | |
| 105 | +|-----------|-------------|----------| |
| 106 | +| User message | Yes | Your question or request | |
| 107 | +| System prompt | Yes | Agent behavior instructions | |
| 108 | +| Conversation history | Yes (limited) | Multi-turn context | |
| 109 | +| Retrieved knowledge | Yes | RAG context from your docs | |
| 110 | +| Tool results | Yes | Output from Azure API calls | |
| 111 | + |
| 112 | +Azure SRE Agent uses enterprise-grade AI services with the following data handling policies: |
| 113 | + |
| 114 | +- Your data isn't used to train models. |
| 115 | +- Prompts and completions aren't stored unless you opt in. |
| 116 | +- Abuse monitoring might store data for up to 30 days, but you can opt out. |
| 117 | + |
| 118 | +### What actions can the agent take? |
| 119 | + |
| 120 | +Azure SRE Agent operates in one of two access modes: |
| 121 | + |
| 122 | +| Mode | Capabilities | |
| 123 | +|------|-------------| |
| 124 | +| **Reader Mode** | Read-only access. The agent can investigate, query logs, and analyze resources but can't make changes. | |
| 125 | +| **Privileged Mode** | Full access. The agent can take remediation actions (restart services, scale resources, and more) on your resources. | |
| 126 | + |
| 127 | +By default, agents start in **Reader mode**. To upgrade to Privileged mode: |
| 128 | + |
| 129 | +1. Connect resource groups. |
| 130 | +1. Grant write permissions to the agent's managed identity. |
| 131 | +1. Enable the agent to execute remediation actions. |
| 132 | +1. Log all actions with user context. |
| 133 | + |
| 134 | +You can downgrade back to Reader mode at any time. |
| 135 | + |
| 136 | +## Network security |
| 137 | + |
| 138 | +Azure SRE Agent provides enterprise-grade network security with support for private endpoints, VNet integration, and firewall controls to meet your organization's connectivity requirements. |
| 139 | + |
| 140 | +### What firewall settings are required? |
| 141 | + |
| 142 | +Add `*.azuresre.ai` to your firewall allowlist. Some networking profiles might block access to this domain by default. |
| 143 | + |
| 144 | +### Can I deploy in a private network? |
| 145 | + |
| 146 | +Yes, Azure SRE Agent supports: |
| 147 | + |
| 148 | +| Capability | Supported | |
| 149 | +|------------|----------| |
| 150 | +| Private endpoints | Yes (Cosmos DB, AI Search, Storage) | |
| 151 | +| VNet integration | Yes (outbound traffic) | |
| 152 | +| IP allowlisting | Yes | |
| 153 | +| Azure Firewall | Yes (control egress traffic) | |
| 154 | +| Internal-only (no public endpoint) | Yes | |
| 155 | + |
| 156 | +### What network paths does the agent use? |
| 157 | + |
| 158 | +| Connection | Path | |
| 159 | +|------------|------| |
| 160 | +| Agent to Cosmos DB | Azure backbone | |
| 161 | +| Agent to AI Search | Azure backbone | |
| 162 | +| Agent to LLM Provider | Azure backbone | |
| 163 | +| Agent to ARM API | Azure backbone | |
| 164 | +| Agent to Log Analytics | Azure backbone | |
| 165 | +| Agent to MCP Servers | Customer-defined | |
| 166 | + |
| 167 | +## Compliance and certifications |
| 168 | + |
| 169 | +Azure SRE Agent inherits compliance certifications from its underlying Azure platform services, providing enterprise-grade regulatory compliance for security-conscious organizations. |
| 170 | + |
| 171 | +### What compliance certifications apply? |
| 172 | + |
| 173 | +Azure SRE Agent is built on Azure platform services, such as Cosmos DB, AI Search, and Blob Storage. These underlying services hold compliance certifications, which SRE Agent inherits through its architecture: |
| 174 | + |
| 175 | +| Certification | Status | How Inherited | |
| 176 | +|---------------|--------|---------------| |
| 177 | +| SOC 1 Type 2 | Yes | Via Azure platform services | |
| 178 | +| SOC 2 Type 2 | Yes | Via Azure platform services | |
| 179 | +| ISO 27001 | Yes | Via Azure platform services | |
| 180 | +| ISO 27017 | Yes | Via Azure platform services | |
| 181 | +| ISO 27018 | Yes | Via Azure platform services | |
| 182 | +| HIPAA BAA | Contact support | May require configuration | |
| 183 | +| FedRAMP High | Contact support | Check current status | |
| 184 | +| PCI DSS | Contact support | Customer responsibility | |
| 185 | + |
| 186 | +For authoritative compliance information, see [Azure Compliance Documentation](/azure/compliance/). |
| 187 | + |
| 188 | +### What about European data protection compliance? |
| 189 | + |
| 190 | +Azure SRE Agent supports compliance with European data protection regulations: |
| 191 | + |
| 192 | +- **Data residency:** Single-region deployment available |
| 193 | +- **Right to erasure:** Delete threads and memories via API |
| 194 | +- **Data portability:** Export conversations via API |
| 195 | +- **DPA available:** Via Microsoft DPA |
| 196 | + |
| 197 | +## Data retention and deletion |
| 198 | + |
| 199 | +Azure SRE Agent provides configurable data retention policies with APIs for data deletion to help organizations meet their data governance requirements. |
| 200 | + |
| 201 | +### How long is data retained? |
| 202 | + |
| 203 | +Data retention depends on the underlying services: |
| 204 | + |
| 205 | +- **Threads/Messages:** Stored until you delete them (configurable TTL in Cosmos DB). |
| 206 | +- **Knowledge Documents:** Stored until you delete them. |
| 207 | +- **Application Insights:** 90 days default (configurable). |
| 208 | +- **Activity Logs:** 90 days (configurable via diagnostic settings). |
| 209 | + |
| 210 | +### Can I delete my data? |
| 211 | + |
| 212 | +Yes. The APIs support: |
| 213 | + |
| 214 | +- Deleting individual threads. |
| 215 | +- Removing user memories. |
| 216 | +- Purging knowledge documents. |
| 217 | + |
| 218 | +### What happens if Microsoft support needs access? |
| 219 | + |
| 220 | +Microsoft follows standard Azure support procedures. For sensitive access, [Customer Lockbox](/azure/security/fundamentals/customer-lockbox-overview) provides approval workflows for Microsoft engineer access. |
| 221 | + |
| 222 | +## Audit and monitoring |
| 223 | + |
| 224 | +Azure SRE Agent provides comprehensive logging, audit trails, and approval workflows to meet enterprise monitoring and compliance requirements. |
| 225 | + |
| 226 | +### What logging and audit capabilities exist? |
| 227 | + |
| 228 | +| Activity | Log Location | |
| 229 | +|--|--| |
| 230 | +| User authentication | Azure AD Sign-in logs | |
| 231 | +| API calls | Azure Activity Log | |
| 232 | +| LLM interactions | Application Insights | |
| 233 | +| Tool executions | Application Insights traces | |
| 234 | +| Approvals | Cosmos DB (queryable via API) | |
| 235 | + |
| 236 | +You can export all logs to a SIEM through Azure Event Hub. |
| 237 | + |
| 238 | +### Is there an approval workflow for sensitive actions? |
| 239 | + |
| 240 | +When the agent is in Privileged mode, it can execute remediation actions, but: |
| 241 | + |
| 242 | +- The system tracks all actions with user context, timestamps, and decision history. |
| 243 | +- You can configure scheduled tasks, runbooks, and subagents with specific action scopes. |
| 244 | +- Azure RBAC still limits what the managed identity can access. |
| 245 | +- You can downgrade to Reader mode at any time to disable all write operations. |
| 246 | + |
| 247 | +## Encryption |
| 248 | + |
| 249 | +Azure SRE Agent uses industry-standard AES-256 encryption for data at rest and TLS 1.3 for data in transit across all Azure services. |
| 250 | + |
| 251 | +### What encryption is used? |
| 252 | + |
| 253 | +| Data State | Encryption | |
| 254 | +|------------|------------| |
| 255 | +| Data at rest | AES-256 | |
| 256 | +| Data in transit | TLS 1.3 | |
| 257 | +| Database encryption | Transparent Data Encryption (TDE) | |
| 258 | +| Storage encryption | Azure Storage Service Encryption (SSE) | |
| 259 | + |
| 260 | +## Quick reference: Security checklist |
| 261 | + |
| 262 | +Use this checklist to quickly verify that Azure SRE Agent meets your organization's security requirements. |
| 263 | + |
| 264 | +### Agent Access Modes |
| 265 | + |
| 266 | +| Question | Answer | |
| 267 | +|----------|--------| |
| 268 | +| Default mode? | Reader (read-only) | |
| 269 | +| Can agent take actions? | Only in Privileged mode | |
| 270 | +| How to enable writes? | Upgrade to Privileged mode in Overview | |
| 271 | +| Can I restrict later? | Yes, downgrade to Reader anytime | |
| 272 | + |
| 273 | +### Data Handling |
| 274 | + |
| 275 | +| Question | Answer | |
| 276 | +|----------|--------| |
| 277 | +| Where is data stored? | Customer's selected Azure region | |
| 278 | +| Is data replicated cross-region? | No, by default (configurable) | |
| 279 | +| Is data used to train models? | No | |
| 280 | +| How long is data retained? | Configurable (default: 90 days) | |
| 281 | + |
| 282 | +### Access control |
| 283 | + |
| 284 | +| Question | Answer | |
| 285 | +|----------|--------| |
| 286 | +| Authentication method? | Azure AD (Entra ID) | |
| 287 | +| Authorization model? | Azure RBAC | |
| 288 | +| Service identity? | Managed identity (no secrets) | |
| 289 | +| Can access be scoped? | Yes, standard Azure RBAC | |
| 290 | + |
| 291 | +### Network security |
| 292 | + |
| 293 | +| Question | Answer | |
| 294 | +|----------|--------| |
| 295 | +| Private endpoint support? | Yes | |
| 296 | +| VNet integration? | Yes | |
| 297 | +| Public endpoint required? | No (can be internal-only) | |
| 298 | +| IP allowlisting? | Yes | |
| 299 | + |
| 300 | +## Related content |
| 301 | + |
| 302 | +- [General FAQ](faq.md) |
| 303 | +- [Operations troubleshooting FAQ](faq-troubleshooting.md) |
| 304 | +- [Roles and permissions overview](roles-permissions-overview.md) |
| 305 | +- [Agent run modes](agent-run-modes.md) |
| 306 | +- [Data residency and privacy](data-privacy.md) |
0 commit comments