Skip to content

Commit 077b24a

Browse files
added yml's
1 parent 086ca44 commit 077b24a

7 files changed

Lines changed: 126 additions & 0 deletions
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.govern-ai-ready-workloads-microsoft-foundry.introduction
3+
title: "Introduction"
4+
metadata:
5+
title: "Introduction"
6+
description: "Introduction"
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/1-introduction.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.govern-ai-ready-workloads-microsoft-foundry.configure-policy-driven-governance
3+
title: "Configure policy-driven governance with Microsoft Foundry"
4+
metadata:
5+
title: "Configure Policy-driven Governance with Microsoft Foundry"
6+
description: "Learn about configure policy-driven governance with Microsoft Foundry."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 12
12+
content: |
13+
[!include[](includes/2-configure-policy-driven-governance.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.govern-ai-ready-workloads-microsoft-foundry.implement-identity-access-management
3+
title: "Implement identity and access management for AI workloads"
4+
metadata:
5+
title: "Implement Identity and Access Management for AI Workloads"
6+
description: "Learn about implement identity and access management for AI workloads."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 11
12+
content: |
13+
[!include[](includes/3-implement-identity-access-management.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.govern-ai-ready-workloads-microsoft-foundry.establish-monitor-compliance-workflows
3+
title: "Establish monitoring and compliance workflows"
4+
metadata:
5+
title: "Establish Monitoring and Compliance Workflows"
6+
description: "Learn about establish monitoring and compliance workflows."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 10
12+
content: |
13+
[!include[](includes/4-establish-monitor-compliance-workflows.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.govern-ai-ready-workloads-microsoft-foundry.exercise-configure-governance-controls
3+
title: "Apply governance controls to AI model lifecycle and resource consumption"
4+
metadata:
5+
title: "Apply Governance Controls to AI Model Lifecycle and Resource Consumption"
6+
description: "Learn about apply governance controls to AI Model Lifecycle and Resource Consumption."
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 45
12+
content: |
13+
[!include[](includes/5-exercise-configure-governance-controls.md)]
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.govern-ai-ready-workloads-microsoft-foundry.knowledge-check
3+
title: "Module assessment"
4+
metadata:
5+
title: "Knowledge check"
6+
description: "Knowledge check"
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
module_assessment: true
12+
durationInMinutes: 3
13+
content: "Choose the best response for each of the following questions."
14+
quiz:
15+
questions:
16+
- content: "Your organization operates in both the United States and European Union, with separate compliance requirements for each region. Data scientists in the EU must deploy Azure OpenAI resources only in West Europe, while US teams require access to East US and West US regions. Which policy assignment strategy best enforces these geographic restrictions?"
17+
choices:
18+
- content: "Create a single policy at the management group level that allows all three regions, then rely on teams to self-govern their deployment choices."
19+
isCorrect: false
20+
explanation: "Assigning separate policies to each subscription provides the strongest enforcement by preventing noncompliant deployments at the Azure Resource Manager level. A single management group policy allowing all three regions defeats the purpose of geographic separation because any team could deploy to any region. Conditional access policies control user authentication locations, not Azure resource deployment regions, making them ineffective for data residency compliance. Subscription-scoped policies automatically evaluate every deployment attempt and block resources that violate location restrictions without requiring manual oversight."
21+
- content: "Assign separate location restriction policies to each region's subscription, specifying only the approved regions for that geography."
22+
isCorrect: true
23+
explanation: "Assigning separate policies to each subscription provides the strongest enforcement by preventing noncompliant deployments at the Azure Resource Manager level. A single management group policy allowing all three regions defeats the purpose of geographic separation because any team could deploy to any region. Conditional access policies control user authentication locations, not Azure resource deployment regions, making them ineffective for data residency compliance. Subscription-scoped policies automatically evaluate every deployment attempt and block resources that violate location restrictions without requiring manual oversight."
24+
- content: "Configure conditional access policies in Microsoft Entra ID that block authentication from unapproved Azure regions."
25+
isCorrect: false
26+
explanation: "Assigning separate policies to each subscription provides the strongest enforcement by preventing noncompliant deployments at the Azure Resource Manager level. A single management group policy allowing all three regions defeats the purpose of geographic separation because any team could deploy to any region. Conditional access policies control user authentication locations, not Azure resource deployment regions, making them ineffective for data residency compliance. Subscription-scoped policies automatically evaluate every deployment attempt and block resources that violate location restrictions without requiring manual oversight."
27+
- content: "A development team needs to run inference queries against predeployed Azure OpenAI models but shouldn't be able to deploy new models, modify existing configurations, or access training data. Which role assignment meets these requirements with the least privilege?"
28+
choices:
29+
- content: "Assign the Cognitive Services User role at the resource group scope containing the deployed models."
30+
isCorrect: true
31+
explanation: "The Cognitive Services User built-in role grants exactly the permissions needed for inference operations while explicitly excluding deployment and configuration capabilities, following the principle of least privilege. A custom role with wildcard permissions at the subscription level violates least privilege by granting broader access than required and increases the blast radius if credentials are compromised. Using Contributor with deny policies creates unnecessary complexity and administrative overhead because you must maintain policy definitions to restrict a role that already grants excessive permissions. The User role provides read and inference permissions only, preventing the team from modifying infrastructure while enabling their core job function."
32+
- content: "Create a custom role with Microsoft.CognitiveServices/* permissions and assign it at the subscription level."
33+
isCorrect: false
34+
explanation: "The Cognitive Services User built-in role grants exactly the permissions needed for inference operations while explicitly excluding deployment and configuration capabilities, following the principle of least privilege. A custom role with wildcard permissions at the subscription level violates least privilege by granting broader access than required and increases the blast radius if credentials are compromised. Using Contributor with deny policies creates unnecessary complexity and administrative overhead because you must maintain policy definitions to restrict a role that already grants excessive permissions. The User role provides read and inference permissions only, preventing the team from modifying infrastructure while enabling their core job function."
35+
- content: "Assign the Contributor role at the resource group scope but use Azure Policy to deny deployment operations."
36+
isCorrect: false
37+
explanation: "The Cognitive Services User built-in role grants exactly the permissions needed for inference operations while explicitly excluding deployment and configuration capabilities, following the principle of least privilege. A custom role with wildcard permissions at the subscription level violates least privilege by granting broader access than required and increases the blast radius if credentials are compromised. Using Contributor with deny policies creates unnecessary complexity and administrative overhead because you must maintain policy definitions to restrict a role that already grants excessive permissions. The User role provides read and inference permissions only, preventing the team from modifying infrastructure while enabling their core job function."
38+
- content: "Your monitoring dashboard shows that Azure OpenAI token consumption increased 300% over the past week, but usage patterns appear normal and no policy violations were detected. Investigation reveals that a marketing campaign generated higher-than-expected traffic. What governance action should you take to prevent future budget overruns while maintaining service availability?"
39+
choices:
40+
- content: "Configure an Azure Monitor alert rule that triggers when token consumption exceeds 150% of the monthly baseline and automatically scales up capacity."
41+
isCorrect: false
42+
explanation: "Cost management budget alerts with approval workflows balance governance control with operational flexibility by warning stakeholders before overages occur while allowing justified increases through approval processes. Automatically scaling capacity addresses availability but bypasses financial oversight, potentially allowing uncontrolled spending that finance teams discover only at month-end. Denying all deployments with a blanket policy creates operational disruption and blocks legitimate business needs while the approval process completes. Budget alerts at 80% thresholds provide sufficient warning time for stakeholders to evaluate whether increased spending aligns with business value, request more budgets, or implement usage controls before actual overages occur."
43+
- content: "Implement an Azure Policy that denies all Azure OpenAI deployments until finance approves a revised budget allocation."
44+
isCorrect: false
45+
explanation: "Cost management budget alerts with approval workflows balance governance control with operational flexibility by warning stakeholders before overages occur while allowing justified increases through approval processes. Automatically scaling capacity addresses availability but bypasses financial oversight, potentially allowing uncontrolled spending that finance teams discover only at month-end. Denying all deployments with a blanket policy creates operational disruption and blocks legitimate business needs while the approval process completes. Budget alerts at 80% thresholds provide sufficient warning time for stakeholders to evaluate whether increased spending aligns with business value, request more budgets, or implement usage controls before actual overages occur."
46+
- content: "Create a cost management budget alert that notifies stakeholders when spending reaches 80% of the allocated amount and requires approval for overages."
47+
isCorrect: true
48+
explanation: "Cost management budget alerts with approval workflows balance governance control with operational flexibility by warning stakeholders before overages occur while allowing justified increases through approval processes. Automatically scaling capacity addresses availability but bypasses financial oversight, potentially allowing uncontrolled spending that finance teams discover only at month-end. Denying all deployments with a blanket policy creates operational disruption and blocks legitimate business needs while the approval process completes. Budget alerts at 80% thresholds provide sufficient warning time for stakeholders to evaluate whether increased spending aligns with business value, request more budgets, or implement usage controls before actual overages occur."
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.govern-ai-ready-workloads-microsoft-foundry.summary
3+
title: "Summary"
4+
metadata:
5+
title: "Summary"
6+
description: "Summary"
7+
ms.date: 02/02/2026
8+
author: wwlpublish
9+
ms.author: bradj
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/7-summary.md)]

0 commit comments

Comments
 (0)