Skip to content

Commit 903c142

Browse files
authored
Unit 8 Module 11
1 parent e9948c2 commit 903c142

1 file changed

Lines changed: 31 additions & 59 deletions

File tree

learn-pr/wwl/design-responsible-ai-security-governance-risk-management-compliance/includes/8-design-access-controls-ground-data-model-tune.md

Lines changed: 31 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -10,116 +10,88 @@ Grounding data is the authoritative information used to produce reliable model r
1010

1111
### Key Design Principles
1212

13-
**Least privilege by default** - Allow the minimum necessary access for each role, agent, model, or service.
13+
- **Least privilege by default:** Allow the minimum necessary access for each role, agent, model, or service.
1414

15-
**Rolealigned data partitions** - Separate grounding data by function (e.g., customer support, finance, engineering).
15+
- **Rolealigned data partitions:** Separate grounding data by function (e.g., customer support, finance, engineering).
1616

17-
**Clear ownership and stewardship** - Assign accountable stakeholders who govern quality and security of each data domain.
17+
- **Clear ownership and stewardship:** Assign accountable stakeholders who govern quality and security of each data domain.
1818

19-
**Auditability** - All access events and data retrieval operations must be logged and reviewable.
19+
- **Auditability:** All access events and data retrieval operations must be logged and reviewable.
2020

21-
### Recommended Architecture Visual (TextBased)
21+
### Recommended Architecture
2222

23-
[User / Agent Identity]
24-
25-
26-
27-
RBAC / Managed Identity
28-
29-
30-
31-
[Grounding Data Gateway]
32-
33-
│ │ │
34-
35-
Finance HR Product Docs
36-
37-
│ │ │
38-
39-
Enforced Access Boundaries
23+
:::image type="content" source="../media/recommended-architecture.png" alt-text="Recommended Architecture Diagram.":::
4024

4125
## 2. Securing Grounding Data Retrieval Workflows
4226

4327
AI systems retrieve grounding data during search, retrievalaugmented generation (RAG), or context assembly. Each retrieval mechanism must enforce:
4428

45-
**Connectorlevel authorization** restricting which data types the model can query
46-
47-
**Structured query filtering** preventing models from accessing disallowed fields
29+
- **Connectorlevel authorization:** restricting which data types the model can query
4830

49-
**DLP and sensitivity labeling** applied across all data stores
31+
- **Structured query filtering:** preventing models from accessing disallowed fields
5032

51-
**Regionaligned access rules** ensuring data residency adherence
33+
- **DLP and sensitivity labeling:** applied across all data stores
5234

53-
**Professional Visual: Retrieval Access Flow**
35+
- **Regionaligned access rules:** ensuring data residency adherence
5436

55-
Prompt → Policy Check → Search Index → Sanitization Layer → Model Context Injection
37+
- **Retrieval Access Flow:** Prompt → Policy Check → Search Index → Sanitization Layer → Model Context Injection
5638

5739
## 3. Access Controls for Model Tuning
5840

5941
Modeltuning operations—evaluation, supervised finetuning, or reinforcement learning—require elevated permissions. These processes must be insulated from production operations.
6042

6143
### Model Tuning Access Requirements
6244

63-
Segregated environments for **development, evaluation, and production**
64-
65-
Approval workflows for introducing new training datasets
66-
67-
Verified data lineage and documentation of tuning datasets
68-
69-
Security scanning of all tuning inputs
70-
71-
Restricted ability to promote new tuned models into production
72-
73-
### Model Tuning Role Matrix (TextBased)
45+
- Segregated environments for **development, evaluation, and production**
7446

75-
Role | Permissions
47+
- Approval workflows for introducing new training datasets
7648

77-
------------------------------------------------------
49+
- Verified data lineage and documentation of tuning datasets
7850

79-
ML Engineer | View training data, run tuning jobs
51+
- Security scanning of all tuning inputs
8052

81-
Solution Architect | Approve datasets, review tuning results
53+
- Restricted ability to promote new tuned models into production
8254

83-
Security Admin | Validate compliance, enforce policies
55+
### Model Tuning Role Matrix
8456

85-
Ops Engineer | Deploy approved tuned models
57+
:::image type="content" source="../media/model-tuning-role-matrix.png" alt-text="Model Tuning Role Matrix.":::
8658

8759
## 4. Designing Guardrails for Grounding Data and Tuning Inputs
8860

8961
Guardrails protect both users and the system by preventing unsafe or noncompliant data from influencing model behavior.
9062

9163
### Examples of Guardrails
9264

93-
Blocklists for prohibited document types
65+
- Blocklists for prohibited document types
9466

95-
Sanitization pipelines removing PII or contractual data
67+
- Sanitization pipelines removing PII or contractual data
9668

97-
Automated reviews validating safety and policy alignment
69+
- Automated reviews validating safety and policy alignment
9870

99-
Alerting and anomaly detection for unusual data access or tuning patterns
71+
- Alerting and anomaly detection for unusual data access or tuning patterns
10072

101-
### Visual: Guardrail Enforcement Model
73+
### Guardrail Enforcement Model
10274

103-
[Raw Data][Validation Rules][Sanitization][Approved Dataset]
75+
:::image type="content" source="../media/guardrail-enforcement-model.png" alt-text="Guardrail Enforcement Model.":::
10476

10577
## 5. Operational Monitoring and Compliance Enforcement
10678

10779
Continuous monitoring ensures access controls work as intended.
10880

10981
### Operational Controls
11082

111-
Logging for prompt activity, tuning actions, and retrievalbased access
83+
- Logging for prompt activity, tuning actions, and retrievalbased access
11284

113-
Periodic reviews of RBAC assignments
85+
- Periodic reviews of RBAC assignments
11486

115-
Automated anomaly alerts for abnormal retrieval patterns
87+
- Automated anomaly alerts for abnormal retrieval patterns
11688

117-
Governance dashboards tracking how grounding data is used
89+
- Governance dashboards tracking how grounding data is used
11890

11991
## References
12092

121-
[https://learn.microsoft.com/en-us/training/modules/embrace-responsible-ai-principles-practices/7-put-responsible-ai-frameworks](/training/modules/embrace-responsible-ai-principles-practices/7-put-responsible-ai-frameworks)
93+
- [https://learn.microsoft.com/en-us/training/modules/embrace-responsible-ai-principles-practices/7-put-responsible-ai-frameworks](/training/modules/embrace-responsible-ai-principles-practices/7-put-responsible-ai-frameworks)
12294

123-
[https://learn.microsoft.com/en-us/training/modules/build-copilot-ai-studio/3-search-data](/training/modules/build-copilot-ai-studio/3-search-data)
95+
- [https://learn.microsoft.com/en-us/training/modules/build-copilot-ai-studio/3-search-data](/training/modules/build-copilot-ai-studio/3-search-data)
12496

125-
[https://learn.microsoft.com/en-us/azure/well-architected/ai/grounding-data-design](/azure/well-architected/ai/grounding-data-design)
97+
- [https://learn.microsoft.com/en-us/azure/well-architected/ai/grounding-data-design](/azure/well-architected/ai/grounding-data-design)

0 commit comments

Comments
 (0)