Skip to content

Commit 4dc548e

Browse files
Merge pull request #18422 from DivyaGundreddy/LP159720-M4
Bug fixes
2 parents d809fed + 43499bf commit 4dc548e

5 files changed

Lines changed: 3 additions & 4 deletions

File tree

learn-pr/wwl-azure/implement-security-controls-azure-ai-ready-infrastructure/includes/3-implement-azure-governance-scopes-ai-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Building on this concept, resource groups provide your next level of organizatio
1212

1313
At the same time, resource groups establish cost tracking boundaries. Azure tags each resource with its parent resource group, enabling you to generate monthly reports showing exactly how much the sentiment analysis project costs. When your finance team asks "How much did we spend on AI infrastructure last quarter?", you filter costs by resource group tags rather than manually correlating dozens of individual resource charges. This becomes especially important when your AI platform scales to support multiple projects—without resource group organization, cost attribution becomes nearly impossible. Organizations that implement consistent resource group naming conventions (for example, "rg-[project-name]-[environment]") report 60-80% faster budget reconciliation compared to ad-hoc resource naming.
1414

15-
:::image type="content" source="../media/azure-tags-resource-resource-group.png" alt-text="Diagram showing how Azure tags each resource with its parent resource group.":::
15+
:::image type="content" source="../media/azure-tags-resource-group.png" alt-text="Diagram showing how Azure tags each resource with its parent resource group.":::
1616

1717
However, this changes when you have shared infrastructure that multiple projects depend on. Your AI platform likely includes centralized services like a common Azure Container Registry for model images, a shared Azure Key Vault for secrets, and enterprise-wide networking components. These shared resources belong in their own "shared-services" resource group, separate from project-specific groups. This pattern—often called the hub-and-spoke model—places shared infrastructure in a hub resource group with delegated access policies, while project workloads live in spoke resource groups with more permissive experimentation policies. As you see when we explore the Microsoft Foundry Account pattern, this separation simplifies both security management and cost chargeback.
1818

learn-pr/wwl-azure/implement-security-controls-azure-ai-ready-infrastructure/includes/7-summary.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,6 @@ Build on this foundation by exploring advanced governance patterns for enterpris
1414
Continue learning with these resources that extend the security concepts you've practiced:
1515

1616
- [Implement network isolation for Azure Machine Learning](/azure/machine-learning/how-to-network-isolation-planning): Configure virtual networks and private endpoints for production AI workloads
17-
- [Microsoft Defender for Cloud and AI services](/azure/defender-for-cloud/defender-for-ai-services): Automated security assessment and threat detection for Azure AI resources
1817
- [Azure landing zones for AI](/azure/cloud-adoption-framework/scenarios/ai): Enterprise-scale reference architectures combining governance, networking, and identity patterns
1918

2019

learn-pr/wwl-azure/implement-security-controls-azure-ai-ready-infrastructure/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
### YamlMime:Module
22
uid: learn.wwl.implement-security-controls-azure-ai-ready-infrastructure
33
metadata:
4-
title: "Implement security controls for Azure AI-ready infrastructure"
4+
title: "Implement Security Controls for Azure AI-ready Infrastructure"
55
description: "This module equips you to configure Azure's foundational security controls for AI workloads. You'll start by configuring Microsoft Entra ID security principals that define *who* and *what* can access your AI resources—from data scientists needing interactive workspace access to managed identities enabling secure service-to-service communication."
66
ms.date: 02/09/2026
77
author: wwlpublish
88
ms.author: bradj
99
ms.topic: module-intro-to-product
1010
ms.service: azure
11-
title: "Implement Security Controls for Azure AI-ready Infrastructure"
11+
title: "Implement security controls for Azure AI-ready infrastructure"
1212
summary: This module equips you to configure Azure's foundational security controls for AI workloads. You'll start by configuring Microsoft Entra ID security principals that define *who* and *what* can access your AI resources—from data scientists needing interactive workspace access to managed identities enabling secure service-to-service communication.
1313
abstract: |
1414
By the end of this module, you are able to:

learn-pr/wwl-azure/implement-security-controls-azure-ai-ready-infrastructure/media/azure-tags-resource-resource-group.png renamed to learn-pr/wwl-azure/implement-security-controls-azure-ai-ready-infrastructure/media/azure-tags-resource-group.png

File renamed without changes.
-89.1 KB
Loading

0 commit comments

Comments
 (0)