Skip to content

Commit 0ac40fa

Browse files
authored
Fixes Module 11
1 parent 438cc04 commit 0ac40fa

5 files changed

Lines changed: 27 additions & 95 deletions

File tree

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,11 @@
1-
Modern AI agents operate across complex cloud environments where security, compliance, and responsible design are essential. This module introduces the foundational concepts solution architects must apply when designing safe and trustworthy agentbased systems. It focuses on building AI experiences that protect data, respect organizational policies, and uphold responsible AI expectations throughout the solution lifecycle.
1+
## Overview
2+
3+
Modern AI agents operate across complex cloud environments where security, compliance, and responsible design are essential. This module introduces the foundational concepts solution architects must apply when designing safe and trustworthy agentbased systems.
4+
5+
It focuses on building AI experiences that protect data, respect organizational policies, and uphold responsible AI expectations throughout the solution lifecycle.
26

37
You will explore how identity, access control, data governance, model security, and observability work together to create a defenseindepth posture for autonomous and semiautonomous agents. The module highlights how to translate business and compliance requirements into practical technical controls that regulate what agents can access, how they behave, and how their actions are monitored.
48

59
Architects will also learn how to identify vulnerabilities across prompts, models, data flows, and agent workflows. The content emphasizes proactive risk mitigation, layered safeguards, and structured evaluation practices to ensure solutions remain secure, predictable, and aligned with organizational standards.
610

7-
By the end of the module, you will understand how to design AI systems that balance innovation with accountability. You will gain the skills to build secure, governed, and compliant agent solutions that scale responsibly across the enterprise.
11+
By the end of the module, you will understand how to design AI systems that balance innovation with accountability. You will gain the skills to build secure, governed, and compliant agent solutions that scale responsibly across the enterprise.

learn-pr/wwl/design-responsible-ai-security-governance-risk-management-compliance/includes/2-design-security-agents.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -182,25 +182,25 @@ Version artifacts, enforce approvals, and use automated checks for security post
182182

183183
## Design checklist (use in reviews)
184184

185-
- [ ] Agent identities exist for each environment; owners recorded.
185+
- Agent identities exist for each environment; owners recorded.
186186

187-
- [ ] Managed identities used; no embedded secrets.
187+
- Managed identities used; no embedded secrets.
188188

189-
- [ ] Role assignments scoped minimally; access reviews scheduled.
189+
- Role assignments scoped minimally; access reviews scheduled.
190190

191-
- [ ] DLP policies active; sensitivity labels applied to knowledge sources.
191+
- DLP policies active; sensitivity labels applied to knowledge sources.
192192

193-
- [ ] Data residency and retention configured; purge jobs implemented.
193+
- Data residency and retention configured; purge jobs implemented.
194194

195-
- [ ] Centralized logging, dashboards, and spend alerts in place.
195+
- Centralized logging, dashboards, and spend alerts in place.
196196

197-
- [ ] AIspecific threat protection and output moderation enabled.
197+
- AIspecific threat protection and output moderation enabled.
198198

199-
- [ ] Red team performed; open risks addressed.
199+
- Red team performed; open risks addressed.
200200

201-
- [ ] MCP/A2A usage documented; allowed external endpoints approved.
201+
- MCP/A2A usage documented; allowed external endpoints approved.
202202

203-
- [ ] Incident response runbook tested.
203+
- Incident response runbook tested.
204204

205205
## Practice (30-45 minutes)
206206

@@ -222,10 +222,10 @@ Version artifacts, enforce approvals, and use automated checks for security post
222222

223223
## References
224224

225-
[https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ai-agents/governance-security-across-organization](/azure/cloud-adoption-framework/ai-agents/governance-security-across-organization)
225+
- [https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ai-agents/governance-security-across-organization](/azure/cloud-adoption-framework/ai-agents/governance-security-across-organization)
226226

227-
[https://learn.microsoft.com/en-us/training/modules/perform-admin-tasks-microsoft-365-copilot-agents/7-examine-agent-approval-governance](/training/modules/perform-admin-tasks-microsoft-365-copilot-agents/7-examine-agent-approval-governance)
227+
- [https://learn.microsoft.com/en-us/training/modules/perform-admin-tasks-microsoft-365-copilot-agents/7-examine-agent-approval-governance](/training/modules/perform-admin-tasks-microsoft-365-copilot-agents/7-examine-agent-approval-governance)
228228

229-
[https://learn.microsoft.com/en-us/microsoft-copilot-studio/security-and-governance](/microsoft-copilot-studio/security-and-governance)
229+
- [https://learn.microsoft.com/en-us/microsoft-copilot-studio/security-and-governance](/microsoft-copilot-studio/security-and-governance)
230230

231-
[https://learn.microsoft.com/en-us/training/paths/manage-iam-for-ai-workloads-on-azure/?sharingId=6F81B482FD5357F5](/training/paths/manage-iam-for-ai-workloads-on-azure/)
231+
- [https://learn.microsoft.com/en-us/training/paths/manage-iam-for-ai-workloads-on-azure/?sharingId=6F81B482FD5357F5](/training/paths/manage-iam-for-ai-workloads-on-azure/)

learn-pr/wwl/design-responsible-ai-security-governance-risk-management-compliance/includes/4-design-model-security.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,13 @@ Harden the environment where AI models operate to reduce attack surfaces.
8888

8989
### Model Hardening Blueprint
9090

91-
:::image type="content" source="../media/model-blue-print.png" alt-text="Modeling hardhening blue print.":::
91+
| Step | Component | Description / Focus Area |
92+
|------|---------|---------|
93+
| 1 | Secure Compute | Protect computation environments to ensure model safety and confidentiality.|
94+
| 2 |Private Endpoints | Use private network endpoints to limit exposure and control access.|
95+
| 3 | Threat Protection | Implement safeguards to detect and mitigate security threats. |
96+
| 4 | Validation Pipeline | Validate models and data to maintain quality and compliance. |
97+
| 5 | Monitoring and Drift Detection | Continuously monitor model performance and identify data or model drift. |
9298

9399
## 5. Threat detection and response
94100

learn-pr/wwl/design-responsible-ai-security-governance-risk-management-compliance/includes/5-analyze-solution-ai-vulnerabilities-mitigations-prompt-manipulation.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -112,10 +112,6 @@ Models may respond unpredictably when encountering ambiguous, adversarial, or se
112112

113113
- Reviewing access logs for anomalous elevation attempts.
114114

115-
#### RBAC Boundary Diagram
116-
117-
:::image type="content" source="../media/rbac-boundary-diagram.png" alt-text="RBAC Boundary Diagram.":::
118-
119115
### 5. Agent and workflow-level vulnerabilities
120116

121117
#### AI agents that automate tasks increase risk through:

learn-pr/wwl/design-responsible-ai-security-governance-risk-management-compliance/includes/9-design-audit-trails-changes-models-data.md

Lines changed: 0 additions & 74 deletions
Original file line numberDiff line numberDiff line change
@@ -152,80 +152,6 @@ Define retention requirements with Legal, Compliance, and Information Security t
152152

153153
- Indefinite retention for incidentrelated archives
154154

155-
## 7. Professional Visual — Audit Trail Architecture
156-
157-
+-------------------------------+
158-
159-
| User / Developer |
160-
161-
+---------------+---------------+
162-
163-
|
164-
165-
v
166-
167-
+----------------------------------------------------+
168-
169-
| AI Model and Data Systems |
170-
171-
| (Model Registry, Datasets, Pipelines, Agents) |
172-
173-
+----------------------------------------------------+
174-
175-
|
176-
177-
Change Events
178-
179-
|
180-
181-
v
182-
183-
+-----------------------------+
184-
185-
| Audit & Trace Layer |
186-
187-
+-----------------------------+
188-
189-
| - Activity Logs |
190-
191-
| - Model Event Logs |
192-
193-
| - Data Change Records |
194-
195-
| - Tracing (Spans) |
196-
197-
+-----------------------------+
198-
199-
|
200-
201-
Export / Route
202-
203-
|
204-
205-
v
206-
207-
+-----------------------------------------------+
208-
209-
| Monitoring & Compliance Platform |
210-
211-
| (Azure Monitor, Log Analytics, Sentinel) |
212-
213-
+-----------------------------------------------+
214-
215-
|
216-
217-
Dashboards / Alerts
218-
219-
|
220-
221-
v
222-
223-
+-----------------------------------------------+
224-
225-
| Governance, Compliance, and Review Teams |
226-
227-
+-----------------------------------------------+
228-
229155
## References
230156

231157
- [https://learn.microsoft.com/en-us/azure/ai-foundry/control-plane/overview?view=foundry](/azure/ai-foundry/control-plane/overview)

0 commit comments

Comments
 (0)