Skip to content

Commit b65600a

Browse files
committed
fix for acrolinx
1 parent 707a312 commit b65600a

5 files changed

Lines changed: 30 additions & 30 deletions

File tree

learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/1-introduction-security-saas-paas-iaas.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,12 @@ Your organization operates a diverse Azure environment with IoT devices collecti
1010

1111
By the end of this module, you're able to:
1212

13-
- Specify security baselines for SaaS, PaaS, and IaaS services using the Microsoft Cloud Security Benchmark
14-
- Specify security requirements for IoT workloads including device authentication, network isolation, and threat detection
15-
- Specify security requirements for web workloads including WAF protection, identity controls, and secure deployment
16-
- Specify security requirements for containers and container orchestration including AKS cluster security, image security, and pod security standards
17-
- Evaluate solutions that include Azure AI services security using MCSB v2 AI-specific controls
18-
- Evaluate security for Microsoft Foundry workloads including identity controls, connection security, network isolation, and model governance
13+
- Specify security baselines for SaaS, PaaS, and IaaS services
14+
- Specify security requirements for IoT workloads
15+
- Specify security requirements for web workloads
16+
- Specify security requirements for containers and container orchestration
17+
- Specify security requirements for AI workloads
18+
- Evaluate security for Microsoft Foundry workloads
1919

2020
## Prerequisites
2121

learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/5-specify-security-requirements-containers-container-orchestration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Organizations increasingly adopt containers and container orchestration platform
44

55
Access control for container orchestration platforms must address both the management plane and the data plane. Security architects should specify requirements for identity integration and role-based access.
66

7-
For cluster authentication specifications, require integration with Microsoft Entra ID to leverage your organization's existing identity governance. This integration enables:
7+
For cluster authentication specifications, require integration with Microsoft Entra ID to use your organization's existing identity governance. This integration enables:
88

99
- Conditional access policies
1010
- Multifactor authentication
@@ -20,7 +20,7 @@ Specify requirements for service account management. Default service accounts sh
2020

2121
## Network security requirements
2222

23-
Container orchestration platforms require network security at multiple layers. Traditional network security groups filter traffic at the infrastructure level, but container platforms need additional controls.
23+
Container orchestration platforms require network security at multiple layers. Traditional network security groups filter traffic at the infrastructure level, but container platforms need extra controls.
2424

2525
Specify requirements for API server protection. Private clusters restrict API server access to private endpoints within your virtual network, eliminating public internet exposure. For scenarios requiring public access, define authorized IP ranges that can communicate with the API server.
2626

@@ -88,7 +88,7 @@ Define requirements for container runtime security contexts:
8888

8989
- Containers must not run as root unless explicitly required and approved.
9090
- Require read-only root filesystems where possible.
91-
- Restrict containers from mounting sensitive host paths or acquiring additional capabilities.
91+
- Restrict containers from mounting sensitive host paths or acquiring extra capabilities.
9292
- Use Linux security features such as **AppArmor** and **seccomp** to provide granular control over container actions and further limit the attack surface.
9393

9494
## Secrets management requirements
@@ -102,7 +102,7 @@ When specifying container and orchestration security requirements, prioritize:
102102
- Microsoft Entra ID integration with Kubernetes RBAC for identity and access control
103103
- Private clusters with network policies enforcing default-deny communication and egress traffic routed through Azure Firewall
104104
- Private container registries with vulnerability scanning at all lifecycle stages and minimal base images
105-
- Defender for Containers for runtime threat detection, binary drift detection, and security posture management integrated with Defender XDR and Sentinel
105+
- Defender for Containers for runtime threat detection, binary drift detection, and security posture management integrated with Defender XDR and Microsoft Sentinel
106106
- Azure Key Vault with Secrets Store CSI Driver for centralized secrets management
107107
- Pod Security Standards enforcing baseline or restricted configurations with AppArmor and seccomp hardening
108108

learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/6-evaluate-ai-services-security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Responsibility allocation varies by deployment model. SaaS AI solutions like Mic
2020

2121
When evaluating solutions, assess whether the architecture implements appropriate authentication and authorization mechanisms.
2222

23-
Evaluate whether the solution uses Microsoft Entra ID for authentication rather than API keys. Entra ID enables conditional access policies, multifactor authentication, and centralized identity governance. API keys should be disabled where possible, as they cannot support fine-grained access control or user-level audit trails.
23+
Evaluate whether the solution uses Microsoft Entra ID for authentication rather than API keys. Microsoft Entra ID enables conditional access policies, multifactor authentication, and centralized identity governance. API keys should be disabled where possible, as they can't support fine-grained access control or user-level audit trails.
2424

2525
Assess role-based access control configurations for least privilege. The **Cognitive Services OpenAI User** role provides inference-only access, while **Cognitive Services OpenAI Contributor** enables model deployment and management. Evaluate whether the proposed role assignments align with the principle of least privilege for each identity type.
2626

@@ -36,7 +36,7 @@ Assess whether the solution uses private endpoints to eliminate public internet
3636

3737
For AI platforms that provide managed virtual networks, evaluate whether the chosen isolation mode aligns with organizational security requirements and data classification. Platform-specific network isolation configurations, such as those for Microsoft Foundry, are covered in the next unit.
3838

39-
Review network security group rules to verify traffic is restricted to necessary communications. Assess whether Azure Firewall provides additional filtering for internet-bound traffic.
39+
Review network security group rules to verify traffic are restricted to necessary communications. Assess whether Azure Firewall provides additional filtering for internet-bound traffic.
4040

4141
## Evaluate content safety controls
4242

@@ -66,7 +66,7 @@ Beyond content filtering, AI applications require security controls specific to
6666

6767
### Model governance evaluation (MCSB AI-1)
6868

69-
Assess whether the solution implements formal model approval processes enforced through Azure Policy. The built-in policy **Cognitive Services Deployments should only use approved Registry Models** restricts which models can be deployed by matching model asset IDs. Additionally, evaluate whether local API key authentication is disabled via policy, requiring Entra ID authentication. Evaluate model provenance tracking to ensure organizations can identify the source and modification history of deployed models. Unverified models may contain backdoors, poisoned training data, or supply chain compromises.
69+
Assess whether the solution implements formal model approval processes enforced through Azure Policy. The built-in policy **Cognitive Services Deployments should only use approved Registry Models** restricts which models can be deployed by matching model asset IDs. Additionally, evaluate whether local API key authentication is disabled via policy, requiring Microsoft Entra ID authentication. Evaluate model provenance tracking to ensure organizations can identify the source and modification history of deployed models. Unverified models may contain backdoors, poisoned training data, or supply chain compromises.
7070

7171
### Agent function privileges (MCSB AI-4)
7272

@@ -135,7 +135,7 @@ Additionally evaluate traditional security controls:
135135

136136
| Area | Key evaluation points |
137137
| ---- | --------------------- |
138-
| **Identity** | Microsoft Entra ID authentication, managed identities, Entra Agent ID, least privilege RBAC |
138+
| **Identity** | Microsoft Entra ID authentication, managed identities, Microsoft Entra Agent ID, least privilege RBAC |
139139
| **Network** | Private endpoints, managed virtual network isolation, NSG configurations |
140140
| **Data protection** | Customer-managed keys, Purview Data Security Posture Management, sensitivity labels, data residency compliance, diagnostic logging |
141141
| **Availability** | Quota monitoring, API Management gateway, DDoS protection |

learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/6a-evaluate-foundry-platform-security.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Foundry divides operations into control plane (resource management) and data pla
1515

1616
### Authentication method evaluation
1717

18-
Foundry supports two authentication methods: Microsoft Entra ID and API keys. Evaluate whether the solution uses Entra ID for production workloads, which enables conditional access, managed identities, and granular RBAC. API keys remain available for rapid prototyping but lack per-user traceability and should be disabled via Azure Policy for production environments.
18+
Foundry supports two authentication methods: Microsoft Entra ID and API keys. Evaluate whether the solution uses Microsoft Entra ID for production workloads, which enables conditional access, managed identities, and granular RBAC. API keys remain available for rapid prototyping but lack per-user traceability and should be disabled via Azure Policy for production environments.
1919

2020
### RBAC assignment evaluation
2121

@@ -43,16 +43,16 @@ Foundry connections define how the resource and projects authenticate to depende
4343

4444
Evaluate whether connections use Microsoft Entra ID authentication rather than API keys. Foundry connections support the following authentication methods, with availability varying by connector type:
4545

46-
- **Managed identity** (system or user-assigned)preferred for keyless credential management
46+
- **Managed identity** (system or user-assigned)preferred for keyless credential management
4747
- **Service principal** (client ID/secret or certificate)
48-
- **API key**for services that don't support Entra ID
49-
- **SAS token**for specific storage scenarios
48+
- **API key**for services that don't support Microsoft Entra ID
49+
- **SAS token**for specific storage scenarios
5050

5151
### Key Vault integration
5252

5353
For connections that require secrets (API keys, connection strings), verify that a dedicated Azure Key Vault is configured through a Key Vault connection at the Foundry resource level. This dedicated vault should:
5454

55-
- Store only Foundry-managed secretsnot be shared with other workload components
55+
- Store only Foundry-managed secretsnot be shared with other workload components
5656
- Have access restricted to the Foundry resource managed identity
5757
- Use Azure Monitor and activity logs for auditing create, update, and delete events on secrets
5858

@@ -118,7 +118,7 @@ Foundry follows a shared responsibility model for vulnerability management. Micr
118118
Evaluate whether Azure Policy is configured to control model deployments at the Foundry resource level:
119119

120120
- **Cognitive Services Deployments should only use approved Registry Models**: Restricts which models can deploy by matching model asset IDs. Prevents unauthorized or untested models from reaching production.
121-
- **Configure Azure AI Services resources to disable local key access**: Forces Entra ID authentication by disabling API key access at the resource level.
121+
- **Configure Azure AI Services resources to disable local key access**: Forces Microsoft Entra ID authentication by disabling API key access at the resource level.
122122

123123
### Model catalog evaluation
124124

@@ -134,7 +134,7 @@ Verify that diagnostic settings are enabled for the Foundry resource, routing th
134134
- **RequestResponse**: API requests and model responses for compliance
135135
- **AllMetrics**: Usage metrics including token consumption and compute utilization
136136

137-
Azure Monitor provides segmented metrics by scoperesource-level metrics for management operations and project-level metrics for agent activity and evaluation performance.
137+
Azure Monitor provides segmented metrics by scoperesource-level metrics for management operations and project-level metrics for agent activity and evaluation performance.
138138

139139
### Security monitoring integration
140140

@@ -147,9 +147,9 @@ When evaluating Microsoft Foundry platform security, verify the solution address
147147
| Area | Key evaluation points |
148148
| ---- | --------------------- |
149149
| **Architecture** | Resource/project separation, project isolation boundaries, workload segmentation |
150-
| **Identity** | Entra ID authentication, API keys disabled, Foundry RBAC roles (Azure AI User, Project Manager, Account Owner, Owner), managed identities |
151-
| **Connections** | Entra ID preferred, dedicated Key Vault, project-scoped connections, lifecycle management |
152-
| **Network** | Public access disabled, private endpoints, managed VNet isolation mode, connected resource isolation |
150+
| **Identity** | Microsoft Entra ID authentication, API keys disabled, Foundry RBAC roles (Azure AI User, Project Manager, Account Owner, Owner), managed identities |
151+
| **Connections** | Microsoft Entra ID preferred, dedicated Key Vault, project-scoped connections, lifecycle management |
152+
| **Network** | Public access disabled, private endpoints, managed virtual network isolation mode, connected resource isolation |
153153
| **Data protection** | Customer-managed keys, project data isolation, vulnerability management |
154154
| **Model governance** | Azure Policy for approved models, disable local auth, model provenance tracking |
155155
| **Monitoring** | Diagnostic settings, Defender for Cloud, Azure Activity Log |

learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/8-summary.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@ In this module, you learned how security architects specify security requirement
22

33
You learned how to:
44

5-
- Specify security baselines for SaaS, PaaS, and IaaS services using the shared responsibility model.
6-
- Specify security requirements for IoT workloads including device identity, network segmentation, and monitoring.
7-
- Specify security requirements for web workloads covering authentication, network protection, and application security.
8-
- Specify security requirements for containers and container orchestration including cluster security, image integrity, and runtime protection.
9-
- Evaluate security controls for AI services using MCSB v2 AI-specific controls and the AI shared responsibility model.
10-
- Evaluate security for Microsoft Foundry workloads including resource/project architecture, identity controls, connection security, network isolation, and model governance.
5+
- Specify security baselines for SaaS, PaaS, and IaaS services
6+
- Specify security requirements for IoT workloads
7+
- Specify security requirements for web workloads
8+
- Specify security requirements for containers and container orchestration
9+
- Specify security requirements for AI workloads
10+
- Evaluate security for Microsoft Foundry workloads
1111

1212
## Learn more
1313

0 commit comments

Comments
 (0)