You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl/design-responsible-ai-security-governance-risk-management-compliance/includes/1-introduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
## Overview
2
2
3
-
Modern AI agents operate across complex cloud environments where security, compliance, and responsible design are essential. This module introduces the foundational concepts solution architects must apply when designing safe and trustworthy agentbased systems.
3
+
Modern AI agents operate across complex cloud environments where security, compliance, and responsible design are essential. This module introduces the foundational concepts solution architects must apply when designing safe and trustworthy agent-based systems.
4
4
5
5
It focuses on building AI experiences that protect data, respect organizational policies, and uphold responsible AI expectations throughout the solution lifecycle.
6
6
7
-
You will explore how identity, access control, data governance, model security, and observability work together to create a defenseindepth posture for autonomous and semiautonomous agents. The module highlights how to translate business and compliance requirements into practical technical controls that regulate what agents can access, how they behave, and how their actions are monitored.
7
+
You will explore how identity, access control, data governance, model security, and observability work together to create a defense-in-depth posture for autonomous and semi-autonomous agents. The module highlights how to translate business and compliance requirements into practical technical controls that regulate what agents can access, how they behave, and how their actions are monitored.
8
8
9
9
Architects will also learn how to identify vulnerabilities across prompts, models, data flows, and agent workflows. The content emphasizes proactive risk mitigation, layered safeguards, and structured evaluation practices to ensure solutions remain secure, predictable, and aligned with organizational standards.
Copy file name to clipboardExpand all lines: learn-pr/wwl/design-responsible-ai-security-governance-risk-management-compliance/includes/11-summary.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ Learners also examined vulnerabilities unique to AI—such as prompt manipulatio
10
10
11
11
By the end of the module, architects gained the skills to design AI solutions that balance innovation with accountability. They can now build and evaluate secure, governed, and compliant agent ecosystems that scale responsibly across diverse cloud environments.
12
12
13
-
## Key Takeaways
13
+
## Key takeaways
14
14
15
15
- AI solutions must use identity, RBAC, and managed identities to enforce least‑privilege access for every agent, tool, and model.
Design a defense in depth approach for autonomous and semiautonomous agents that operate across Microsoft clouds. You'll translate business and compliance requirements into identity, access, data protection, observability, and threatprotection controls. You'll also define how agents authenticate, what they can do, what they can see, and how their behavior is monitored and governed at scale.
3
+
Design a defense in depth approach for autonomous and semi-autonomous agents that operate across Microsoft clouds. You'll translate business and compliance requirements into identity, access, data protection, observability, and threat protection controls. You'll also define how agents authenticate, what they can do, what they can see, and how their behavior is monitored and governed at scale.
4
4
5
-
### By the end of this unit, solution architects will be able to:
5
+
### By the end of this unit, solution architects will be able to
6
6
7
-
- Map agent personas to leastprivilege roles and scopes using Azure rolebased access control and managed identities.
7
+
- Map agent personas to least-privilege roles and scopes using Azure role-based access control and managed identities.
8
8
9
9
- Select secure authentication and authorization patterns for agents, tools, and backend services.
10
10
11
11
- Apply data governance controls (DLP, sensitivity labels, and data residency) to constrain agent knowledge and outputs.
12
12
13
-
- Establish organizationwide observability for agent behavior, usage, and cost.
13
+
- Establish organization-wide observability for agent behavior, usage, and cost.
14
14
15
-
- Integrate AIspecific threat protection, red teaming, and incident response into the agent lifecycle.
15
+
- Integrate AI-specific threat protection, red teaming, and incident response into the agent lifecycle.
16
16
17
17
- Standardize development and interoperability choices to reduce risk and improve maintainability.
18
18
19
19
## Key concepts and decisions
20
20
21
-
### 1. Identity and access design
21
+
### Identity and access design
22
22
23
-
**Goal:** Every agent, tool, and pipeline has a firstclass identity, clear ownership, and leastprivilege access.
23
+
**Goal:** Every agent, tool, and pipeline has a first-class identity, clear ownership, and least-privilege access.
24
24
25
25
**Agent identity**
26
26
27
-
Assign a unique cloud identity per agent (prod, preprod, dev) and record ownership, version, and lifecycle metadata.
27
+
-Assign a unique cloud identity per agent (prod, pre-prod, dev) and record ownership, version, and lifecycle metadata.
28
28
29
-
Prefer **managed identities** for agenttoAzure authentication to remove secrets and simplify rotation.
29
+
-Prefer **managed identities** for agent-to-Azure authentication to remove secrets and simplify rotation.
30
30
31
31
**Authorization patterns**
32
32
33
-
Enforce **least privilege** with narrowly scoped role assignments (subscription/resource group/resource).
33
+
-Enforce **least privilege** with narrowly scoped role assignments (subscription/resource group/resource).
34
34
35
-
When an agent acts **on behalf of a user**, propagate the user's permissions; when it acts **as itself**, scope a service role with only the actions the agent needs.
35
+
-When an agent acts **on behalf of a user**, propagate the user's permissions; when it acts **as itself**, scope a service role with only the actions the agent needs.
36
36
37
37
**Separation of duties**
38
38
39
-
Distinct roles for Maker, Publisher, Environment Admin, and Security Admin.
39
+
-Distinct roles for Maker, Publisher, Environment Admin, and Security Admin.
40
40
41
-
Require approvals for publishing to production and for changes to highrisk capabilities (for example, actions that modify data).
41
+
-Require approvals for publishing to production and for changes to high-risk capabilities (for example, actions that modify data).
0 commit comments