You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/introduction-agentic-devops-microsoft-tools-azure/includes/4-set-autonomy-boundaries-human-control.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,29 +37,29 @@ Combine these dimensions and you get a quick classification model:
37
37
| Low | Low | Execute on approval |
38
38
| Low | Medium or High | Suggest only — human executes |
39
39
40
-
**Never grant autonomous execution** to actions that combine low reversibility with any meaningful blast radius. Several examples fall in this quadrant, such as production deployments, and how you handle secret or credential operations. Or think of network security group modifications or role assignment changes. Regardless of how well-tested your agent instructions are, keep human oversight as guardrail for these.
40
+
**Never grant autonomous execution** to actions that combine low reversibility with any meaningful blast radius. Several examples fall in this quadrant, such as production deployments, and how you handle secret or credential operations. Or think of network security group modifications or role assignment changes. Regardless of how well-tested your agent instructions are, keep human oversight (*human-in-the-loop*)as guardrail.
41
41
42
42
## Define human control points for production-facing operations
43
43
44
44
Human control points are the specific moments in a workflow where agent execution pauses and human authorization is required before continuing. Designing them deliberately — rather than letting them be ad-hoc — is what makes agentic DevOps governable.
45
45
46
46
For DevOps engineers on Azure, several operations require hard human control points:
47
47
48
-
-**Production environment deployments** — any agent-initiated resource change in a production subscription must transit an approval gate. This isn't a maturity question. It's a change management and compliance requirement in most regulated environments.
48
+
-**Production environment deployments** — any agent-initiated resource change in a production subscription must transit an approval gate. It's a change management and compliance requirement in most regulated environments.
49
49
-**Secret and credential operations** — agent actions that read from or write to Azure Key Vault should require explicit approval and create an audit log entry. Even read access to secrets should be scoped tightly.
50
50
-**Pipeline configuration changes** — modifications to pipeline YAML, variable groups, or service connections in production branches must follow your existing branch protection and PR review policies. Agents should not bypass these controls.
51
51
-**Security group and RBAC modifications** — role assignment changes and network security group rule additions must be human-authorized regardless of the principal making the change.
52
52
-**Policy exception creation** — agents should never autonomously create Azure Policy exemptions or exclusions, even temporarily.
53
53
54
-
These aren't arbitrary restrictions. They map to the areas where audit regulators, security teams, and incident post-mortems consistently find the highest risk. Keeping humans in the loop at these points doesn't slow down your deployment frequency but rather keeps the agentic layer from becoming a liability.
54
+
These points aren't arbitrary restrictions. They map to the areas where audit regulators, security teams, and incident post-mortems consistently find the highest risk. Keeping humans in the loop at these points doesn't slow down your deployment frequency but rather keeps the agentic layer from becoming a liability.
55
55
56
56
## Apply least-privilege principles to agent identities
57
57
58
58
When agents invoke tools — Azure CLI, ADO REST APIs, Bicep or Terraform deployments — they authenticate with an identity. That identity must follow least-privilege: the minimum permissions needed to complete the authorized scope of the agent's work.
59
59
60
-
For GitHub Copilot agent mode, tool invocations execute in the context of your local or codespace session, where scope is bounded naturally by your own access. For the cloud-based GitHub Copilot coding agent, execution happens in a GitHub Actions sandbox environment using a managed identity with federated credentials — not in your local session. Review the role assignments granted to that managed identity and treat them with the same scrutiny you apply to any service principal used in your deployment workflows. For platform-managed agents like Azure Copilot agents, review the managed identity or service principal they use and audit its RBAC role assignments regularly.
60
+
For GitHub Copilot agent mode, tool invocations execute in the context of your local or codespace session, using the user's own access. For the cloud-based GitHub Copilot coding agent, execution happens in a GitHub Actions sandbox environment using a managed identity with federated credentials — not in your local session. Review the role assignments granted to that managed identity and treat them with the same scrutiny you apply to any service principal used in your deployment workflows. For platform-managed agents like Azure Copilot agents, review the managed identity or service principal they use and audit its role assignments regularly.
61
61
62
-
For MCP-based extensions — where you explicitly give a Copilot session access to Azure CLI tools or ADO project APIs — define exactly which tools you expose and ensure the underlying service connection has read-only scope unless write access is specifically required for the task.
62
+
For MCP-based extensions — where you explicitly give a Copilot session access to Azure CLI tools or ADO project APIs — define exactly which tools you expose. Also ensure the underlying service connection has read-only scope unless explicit write access is required for the task.
63
63
64
64
## Build agent observability into your operating model from the start
65
65
@@ -69,7 +69,7 @@ Every agentic action that writes, modifies, or invokes infrastructure should pro
69
69
-**Azure DevOps audit logs** for work item creation, pipeline modifications, and access token activity.
70
70
-**GitHub audit logs** for coding agent pull requests and repository interactions.
71
71
72
-
Treat agent-initiated changes the same way you treat service principal-initiated changes: they should be visible in your existing SIEM and reviewable during incident post-mortems.
72
+
Treat agent-initiated changes the same way you treat service principal-initiated changes: they should be visible in your existing security monitoring solution and reviewable during incident post-mortems.
73
73
74
74
When you build in observability from the start, you create the feedback loop that lets you responsibly expand autonomy over time — moving from Suggest to Execute on approval to Execute autonomously as your confidence in outcome quality grows and your audit evidence accumulates.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/introduction-agentic-devops-microsoft-tools-azure/includes/7-summary.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
Mature DevOps practice is built on the discipline of knowing which layer of your stack handles which class of problem. Agentic capabilities represent a new layer — not a replacement for your pipelines, scripts, or runbooks, but a reasoning layer overtop of them that handles the context-intensive, judgment-requiring work your automation was never designed to absorb.
1
+
Mature DevOps practice is built on the discipline of knowing which layer of your stack handles which class of problem. Agentic capabilities represent a new layer. It is not a replacement for your pipelines, scripts, or runbooks. Rather, it becomes a reasoning layer overtop of them that handles the context-intensive, judgment-requiring work your automation was never designed to absorb.
2
2
3
-
You've now defined that layer precisely, mapped where it delivers value across the DevOps lifecycle, and established the autonomy boundaries that make it safe to deploy in production-grade Azure environments.
3
+
You learned how to define that layer. You mapped out where agentic AI delivers value across the DevOps lifecycle. Last, you established the autonomy boundaries that make it safe to deploy in production-grade Azure environments.
0 commit comments