Skip to content

Commit 5c71306

Browse files
authored
Updates to M11
1 parent 4edaf15 commit 5c71306

25 files changed

Lines changed: 232 additions & 286 deletions

learn-pr/wwl/design-responsible-ai-security-governance-risk-management-compliance/includes/1-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
## Overview
22

3-
Modern AI agents operate across complex cloud environments where security, compliance, and responsible design are essential. This module introduces the foundational concepts solution architects must apply when designing safe and trustworthy agentbased systems.
3+
Modern AI agents operate across complex cloud environments where security, compliance, and responsible design are essential. This module introduces the foundational concepts solution architects must apply when designing safe and trustworthy agent-based systems.
44

55
It focuses on building AI experiences that protect data, respect organizational policies, and uphold responsible AI expectations throughout the solution lifecycle.
66

7-
You will explore how identity, access control, data governance, model security, and observability work together to create a defenseindepth posture for autonomous and semiautonomous agents. The module highlights how to translate business and compliance requirements into practical technical controls that regulate what agents can access, how they behave, and how their actions are monitored.
7+
You will explore how identity, access control, data governance, model security, and observability work together to create a defense-in-depth posture for autonomous and semi-autonomous agents. The module highlights how to translate business and compliance requirements into practical technical controls that regulate what agents can access, how they behave, and how their actions are monitored.
88

99
Architects will also learn how to identify vulnerabilities across prompts, models, data flows, and agent workflows. The content emphasizes proactive risk mitigation, layered safeguards, and structured evaluation practices to ensure solutions remain secure, predictable, and aligned with organizational standards.
1010

learn-pr/wwl/design-responsible-ai-security-governance-risk-management-compliance/includes/11-summary.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Learners also examined vulnerabilities unique to AI—such as prompt manipulatio
1010

1111
By the end of the module, architects gained the skills to design AI solutions that balance innovation with accountability. They can now build and evaluate secure, governed, and compliant agent ecosystems that scale responsibly across diverse cloud environments.
1212

13-
## Key Takeaways
13+
## Key takeaways
1414

1515
- AI solutions must use identity, RBAC, and managed identities to enforce least‑privilege access for every agent, tool, and model.
1616

Lines changed: 50 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -1,148 +1,142 @@
11
## Overview
22

3-
Design a defense in depth approach for autonomous and semiautonomous agents that operate across Microsoft clouds. You'll translate business and compliance requirements into identity, access, data protection, observability, and threatprotection controls. You'll also define how agents authenticate, what they can do, what they can see, and how their behavior is monitored and governed at scale.
3+
Design a defense in depth approach for autonomous and semi-autonomous agents that operate across Microsoft clouds. You'll translate business and compliance requirements into identity, access, data protection, observability, and threat protection controls. You'll also define how agents authenticate, what they can do, what they can see, and how their behavior is monitored and governed at scale.
44

5-
### By the end of this unit, solution architects will be able to:
5+
### By the end of this unit, solution architects will be able to
66

7-
- Map agent personas to leastprivilege roles and scopes using Azure rolebased access control and managed identities.
7+
- Map agent personas to least-privilege roles and scopes using Azure role-based access control and managed identities.
88

99
- Select secure authentication and authorization patterns for agents, tools, and backend services.
1010

1111
- Apply data governance controls (DLP, sensitivity labels, and data residency) to constrain agent knowledge and outputs.
1212

13-
- Establish organizationwide observability for agent behavior, usage, and cost.
13+
- Establish organization-wide observability for agent behavior, usage, and cost.
1414

15-
- Integrate AIspecific threat protection, red teaming, and incident response into the agent lifecycle.
15+
- Integrate AI-specific threat protection, red teaming, and incident response into the agent lifecycle.
1616

1717
- Standardize development and interoperability choices to reduce risk and improve maintainability.
1818

1919
## Key concepts and decisions
2020

21-
### 1. Identity and access design
21+
### Identity and access design
2222

23-
**Goal:** Every agent, tool, and pipeline has a firstclass identity, clear ownership, and leastprivilege access.
23+
**Goal:** Every agent, tool, and pipeline has a first-class identity, clear ownership, and least-privilege access.
2424

2525
**Agent identity**
2626

27-
Assign a unique cloud identity per agent (prod, preprod, dev) and record ownership, version, and lifecycle metadata.
27+
- Assign a unique cloud identity per agent (prod, pre-prod, dev) and record ownership, version, and lifecycle metadata.
2828

29-
Prefer **managed identities** for agenttoAzure authentication to remove secrets and simplify rotation.
29+
- Prefer **managed identities** for agent-to-Azure authentication to remove secrets and simplify rotation.
3030

3131
**Authorization patterns**
3232

33-
Enforce **least privilege** with narrowly scoped role assignments (subscription/resource group/resource).
33+
- Enforce **least privilege** with narrowly scoped role assignments (subscription/resource group/resource).
3434

35-
When an agent acts **on behalf of a user**, propagate the user's permissions; when it acts **as itself**, scope a service role with only the actions the agent needs.
35+
- When an agent acts **on behalf of a user**, propagate the user's permissions; when it acts **as itself**, scope a service role with only the actions the agent needs.
3636

3737
**Separation of duties**
3838

39-
Distinct roles for Maker, Publisher, Environment Admin, and Security Admin.
39+
- Distinct roles for Maker, Publisher, Environment Admin, and Security Admin.
4040

41-
Require approvals for publishing to production and for changes to highrisk capabilities (for example, actions that modify data).
41+
- Require approvals for publishing to production and for changes to high-risk capabilities (for example, actions that modify data).
4242

4343
:::image type="content" source="../media/role-based-access-control.png" alt-text="RBAC design matrix.":::
4444

45-
## 2. Data governance and protection
45+
## Data governance and protection
4646

4747
**Goal:** Agents use only the right data, in the right places, for the right duration.
4848

4949
**Data boundaries**
5050

51-
Separate internal vs. public workloads. Keep confidential sources out of publicfacing agents.
51+
- Separate internal vs. public workloads. Keep confidential sources out of public-facing agents.
5252

53-
Honor **data residency** by selecting compliant regions for knowledge, logs, and memory.
53+
- Honor **data residency** by selecting compliant regions for knowledge, logs, and memory.
5454

5555
**Data loss prevention and sensitivity**
5656

57-
Use **DLP policies** to restrict connectors, actions, and data movement.
57+
- Use **DLP policies** to restrict connectors, actions, and data movement.
5858

59-
Apply **sensitivity labels** to knowledge sources; surface the highest label in responses where supported.
59+
- Apply **sensitivity labels** to knowledge sources; surface the highest label in responses where supported.
6060

6161
**Retention and minimization**
6262

63-
Define retention windows for logs, agent memories, and training data. Automate purge/anonymization.
63+
- Define retention windows for logs, agent memories, and training data. Automate purge/anonymization.
6464

6565
**Transparency**
6666

67-
Disclose AI involvement and data usage to users and stakeholders. Provide data deletion mechanisms.
67+
- Disclose AI involvement and data usage to users and stakeholders. Provide data deletion mechanisms.
6868

69-
:::image type="content" source="../media/data-flow-and-residency-map.png" alt-text="Data flow and residency map.":::
70-
71-
## 3. Observability and cost governance
69+
## Observability and cost governance
7270

7371
**Goal:** Make agent actions auditable and costs predictable.
7472

7573
**Unified logging**
7674

77-
Centralize telemetry for prompts, tool calls, errors, and safety events in a single workspace.
75+
- Centralize telemetry for prompts, tool calls, errors, and safety events in a single workspace.
7876

79-
Capture custom business metrics (successful task completion, escalation rates).
77+
- Capture custom business metrics (successful task completion, escalation rates).
8078

8179
**Inventory and ownership**
8280

83-
Maintain an authoritative catalog of agents with owner, version, environment, and purpose.
81+
- Maintain an authoritative catalog of agents with owner, version, environment, and purpose.
8482

8583
**Cost controls**
8684

87-
Tag resources by agent and cost center. Track token and API consumption.
88-
89-
Set alerts for spend thresholds and anomalous usage.
85+
- Tag resources by agent and cost center. Track token and API consumption.
9086

91-
:::image type="content" source="../media/observability-blueprint.png" alt-text="Observability blueprint.":::
87+
- Set alerts for spend thresholds and anomalous usage.
9288

93-
## 4. Threat protection and assurance
89+
## Threat protection and assurance
9490

95-
**Goal:** Reduce the blast radius of adversarial input and modelspecific risks.
91+
**Goal:** Reduce the blast radius of adversarial input and model-specific risks.
9692

9793
**AI threat protection**
9894

99-
Enable protections that detect prompt manipulation, data leakage attempts, and risky outputs.
95+
- Enable protections that detect prompt manipulation, data leakage attempts, and risky outputs.
10096

10197
**Input/output filtering**
10298

103-
Sanitize tool inputs, enforce type/size limits, and apply safety moderation to freetext channels.
99+
- Sanitize tool inputs, enforce type/size limits, and apply safety moderation to free-text channels.
104100

105101
**Adversarial testing**
106102

107-
Run **red team** evaluations preproduction and after major changes; gate releases on findings closure.
103+
- Run **red team** evaluations pre-production and after major changes; gate releases on findings closure.
108104

109105
**Incident response**
110106

111-
Define how to disable an agent quickly, preserve logs, notify stakeholders, and recover safely.
107+
- Define how to disable an agent quickly, preserve logs, notify stakeholders, and recover safely.
112108

113-
Rehearse drills for critical agents.
109+
- Rehearse drills for critical agents.
114110

115-
## 5. Development and interoperability standards
111+
## Development and interoperability standards
116112

117113
**Goal:** Standardize how agents connect to tools, data, and each other.
118114

119115
**Frameworks and SDKs**
120116

121-
Adopt a standard agent framework with builtin governance hooks and documentation.
117+
- Adopt a standard agent framework with built-in governance hooks and documentation.
122118

123119
**Protocols**
124120

125-
Use **Model Context Protocol (MCP)** for structured tool/data access.
121+
- Use **Model Context Protocol (MCP)** for structured tool/data access.
126122

127-
Use **AgenttoAgent (A2A)** for controlled delegation and context sharing across agents.
123+
- Use **Agent-to-Agent (A2A)** for controlled delegation and context sharing across agents.
128124

129125
**Environment strategy**
130126

131-
Provide safe maker spaces via environment routing. Separate dev/test from production.
127+
- Provide safe maker spaces via environment routing. Separate dev/test from production.
132128

133129
**Change control**
134130

135-
Version artifacts, enforce approvals, and use automated checks for security posture before publish.
136-
137-
:::image type="content" source="../media/four-layer-control-model.png" alt-text="Four layer control model.":::
131+
- Version artifacts, enforce approvals, and use automated checks for security posture before publish.
138132

139-
## Implementation guide (step by step)
133+
## Implementation guide
140134

141135
**Establish identities and access**
142136

143137
- Create managed identities per agent per environment.
144138

145-
- Assign leastprivilege Azure roles to the identities at the narrowest scope.
139+
- Assign least-privilege Azure roles to the identities at the narrowest scope.
146140

147141
- Define maker/publisher/admin role mappings and access review cadence.
148142

@@ -162,7 +156,7 @@ Version artifacts, enforce approvals, and use automated checks for security post
162156

163157
**Enable threat protection and testing**
164158

165-
- Turn on AIaware threat protections and content safety checks.
159+
- Turn on AI-aware threat protections and content safety checks.
166160

167161
- Schedule red team assessments; track findings to closure before production release.
168162

@@ -176,11 +170,11 @@ Version artifacts, enforce approvals, and use automated checks for security post
176170

177171
- Document disable/rollback steps, comms templates, and evidence preservation.
178172

179-
- Run tabletop exercises for highimpact agents.
173+
- Run tabletop exercises for high-impact agents.
180174

181175
- Identify proactive alerting for emerging potential threats
182176

183-
## Design checklist (use in reviews)
177+
## Design checklist
184178

185179
- Agent identities exist for each environment; owners recorded.
186180

@@ -194,15 +188,15 @@ Version artifacts, enforce approvals, and use automated checks for security post
194188

195189
- Centralized logging, dashboards, and spend alerts in place.
196190

197-
- AIspecific threat protection and output moderation enabled.
191+
- AI-specific threat protection and output moderation enabled.
198192

199193
- Red team performed; open risks addressed.
200194

201195
- MCP/A2A usage documented; allowed external endpoints approved.
202196

203197
- Incident response runbook tested.
204198

205-
## Practice (30-45 minutes)
199+
## Practice
206200

207201
**Scenario:** A customer wants a helpdesk triage agent that reads ticket data, summarizes trends, and updates knowledge articles.
208202

@@ -222,10 +216,10 @@ Version artifacts, enforce approvals, and use automated checks for security post
222216

223217
## References
224218

225-
- [https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ai-agents/governance-security-across-organization](/azure/cloud-adoption-framework/ai-agents/governance-security-across-organization)
219+
- [Governance and security for AI agents across the organization](/azure/cloud-adoption-framework/ai-agents/governance-security-across-organization)
226220

227-
- [https://learn.microsoft.com/en-us/training/modules/perform-admin-tasks-microsoft-365-copilot-agents/7-examine-agent-approval-governance](/training/modules/perform-admin-tasks-microsoft-365-copilot-agents/7-examine-agent-approval-governance)
221+
- [Examine agent approval governance](/training/modules/perform-admin-tasks-microsoft-365-copilot-agents/7-examine-agent-approval-governance)
228222

229-
- [https://learn.microsoft.com/en-us/microsoft-copilot-studio/security-and-governance](/microsoft-copilot-studio/security-and-governance)
223+
- [Security and governance in Microsoft Copilot Studio](/microsoft-copilot-studio/security-and-governance)
230224

231-
- [https://learn.microsoft.com/en-us/training/paths/manage-iam-for-ai-workloads-on-azure/?sharingId=6F81B482FD5357F5](/training/paths/manage-iam-for-ai-workloads-on-azure/)
225+
- [Manage IAM for AI workloads on Azure](/training/paths/manage-iam-for-ai-workloads-on-azure/)

0 commit comments

Comments
 (0)