Skip to content

Commit 6187d32

Browse files
committed
finetune for acrolinx score
1 parent 4f35fe6 commit 6187d32

2 files changed

Lines changed: 8 additions & 8 deletions

File tree

learn-pr/wwl-azure/introduction-agentic-devops-microsoft-tools-azure/includes/4-set-autonomy-boundaries-human-control.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -37,29 +37,29 @@ Combine these dimensions and you get a quick classification model:
3737
| Low | Low | Execute on approval |
3838
| Low | Medium or High | Suggest only — human executes |
3939

40-
**Never grant autonomous execution** to actions that combine low reversibility with any meaningful blast radius. Several examples fall in this quadrant, such as production deployments, and how you handle secret or credential operations. Or think of network security group modifications or role assignment changes. Regardless of how well-tested your agent instructions are, keep human oversight as guardrail for these.
40+
**Never grant autonomous execution** to actions that combine low reversibility with any meaningful blast radius. Several examples fall in this quadrant, such as production deployments, and how you handle secret or credential operations. Or think of network security group modifications or role assignment changes. Regardless of how well-tested your agent instructions are, keep human oversight (*human-in-the-loop*)as guardrail.
4141

4242
## Define human control points for production-facing operations
4343

4444
Human control points are the specific moments in a workflow where agent execution pauses and human authorization is required before continuing. Designing them deliberately — rather than letting them be ad-hoc — is what makes agentic DevOps governable.
4545

4646
For DevOps engineers on Azure, several operations require hard human control points:
4747

48-
- **Production environment deployments** — any agent-initiated resource change in a production subscription must transit an approval gate. This isn't a maturity question. It's a change management and compliance requirement in most regulated environments.
48+
- **Production environment deployments** — any agent-initiated resource change in a production subscription must transit an approval gate. It's a change management and compliance requirement in most regulated environments.
4949
- **Secret and credential operations** — agent actions that read from or write to Azure Key Vault should require explicit approval and create an audit log entry. Even read access to secrets should be scoped tightly.
5050
- **Pipeline configuration changes** — modifications to pipeline YAML, variable groups, or service connections in production branches must follow your existing branch protection and PR review policies. Agents should not bypass these controls.
5151
- **Security group and RBAC modifications** — role assignment changes and network security group rule additions must be human-authorized regardless of the principal making the change.
5252
- **Policy exception creation** — agents should never autonomously create Azure Policy exemptions or exclusions, even temporarily.
5353

54-
These aren't arbitrary restrictions. They map to the areas where audit regulators, security teams, and incident post-mortems consistently find the highest risk. Keeping humans in the loop at these points doesn't slow down your deployment frequency but rather keeps the agentic layer from becoming a liability.
54+
These points aren't arbitrary restrictions. They map to the areas where audit regulators, security teams, and incident post-mortems consistently find the highest risk. Keeping humans in the loop at these points doesn't slow down your deployment frequency but rather keeps the agentic layer from becoming a liability.
5555

5656
## Apply least-privilege principles to agent identities
5757

5858
When agents invoke tools — Azure CLI, ADO REST APIs, Bicep or Terraform deployments — they authenticate with an identity. That identity must follow least-privilege: the minimum permissions needed to complete the authorized scope of the agent's work.
5959

60-
For GitHub Copilot agent mode, tool invocations execute in the context of your local or codespace session, where scope is bounded naturally by your own access. For the cloud-based GitHub Copilot coding agent, execution happens in a GitHub Actions sandbox environment using a managed identity with federated credentials — not in your local session. Review the role assignments granted to that managed identity and treat them with the same scrutiny you apply to any service principal used in your deployment workflows. For platform-managed agents like Azure Copilot agents, review the managed identity or service principal they use and audit its RBAC role assignments regularly.
60+
For GitHub Copilot agent mode, tool invocations execute in the context of your local or codespace session, using the user's own access. For the cloud-based GitHub Copilot coding agent, execution happens in a GitHub Actions sandbox environment using a managed identity with federated credentials — not in your local session. Review the role assignments granted to that managed identity and treat them with the same scrutiny you apply to any service principal used in your deployment workflows. For platform-managed agents like Azure Copilot agents, review the managed identity or service principal they use and audit its role assignments regularly.
6161

62-
For MCP-based extensions — where you explicitly give a Copilot session access to Azure CLI tools or ADO project APIs — define exactly which tools you expose and ensure the underlying service connection has read-only scope unless write access is specifically required for the task.
62+
For MCP-based extensions — where you explicitly give a Copilot session access to Azure CLI tools or ADO project APIs — define exactly which tools you expose. Also ensure the underlying service connection has read-only scope unless explicit write access is required for the task.
6363

6464
## Build agent observability into your operating model from the start
6565

@@ -69,7 +69,7 @@ Every agentic action that writes, modifies, or invokes infrastructure should pro
6969
- **Azure DevOps audit logs** for work item creation, pipeline modifications, and access token activity.
7070
- **GitHub audit logs** for coding agent pull requests and repository interactions.
7171

72-
Treat agent-initiated changes the same way you treat service principal-initiated changes: they should be visible in your existing SIEM and reviewable during incident post-mortems.
72+
Treat agent-initiated changes the same way you treat service principal-initiated changes: they should be visible in your existing security monitoring solution and reviewable during incident post-mortems.
7373

7474
When you build in observability from the start, you create the feedback loop that lets you responsibly expand autonomy over time — moving from Suggest to Execute on approval to Execute autonomously as your confidence in outcome quality grows and your audit evidence accumulates.
7575

learn-pr/wwl-azure/introduction-agentic-devops-microsoft-tools-azure/includes/7-summary.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
Mature DevOps practice is built on the discipline of knowing which layer of your stack handles which class of problem. Agentic capabilities represent a new layernot a replacement for your pipelines, scripts, or runbooks, but a reasoning layer overtop of them that handles the context-intensive, judgment-requiring work your automation was never designed to absorb.
1+
Mature DevOps practice is built on the discipline of knowing which layer of your stack handles which class of problem. Agentic capabilities represent a new layer. It is not a replacement for your pipelines, scripts, or runbooks. Rather, it becomes a reasoning layer overtop of them that handles the context-intensive, judgment-requiring work your automation was never designed to absorb.
22

3-
You've now defined that layer precisely, mapped where it delivers value across the DevOps lifecycle, and established the autonomy boundaries that make it safe to deploy in production-grade Azure environments.
3+
You learned how to define that layer. You mapped out where agentic AI delivers value across the DevOps lifecycle. Last, you established the autonomy boundaries that make it safe to deploy in production-grade Azure environments.
44

55
## Key concepts from this module
66

0 commit comments

Comments
 (0)