You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/1-introduction-security-saas-paas-iaas.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,12 +10,12 @@ Your organization operates a diverse Azure environment with IoT devices collecti
10
10
11
11
By the end of this module, you're able to:
12
12
13
-
- Specify security baselines for SaaS, PaaS, and IaaS services using the Microsoft Cloud Security Benchmark
14
-
- Specify security requirements for IoT workloads including device authentication, network isolation, and threat detection
15
-
- Specify security requirements for web workloads including WAF protection, identity controls, and secure deployment
16
-
- Specify security requirements for containers and container orchestration including AKS cluster security, image security, and pod security standards
17
-
-Evaluate solutions that include Azure AI services security using MCSB v2 AI-specific controls
18
-
- Evaluate security for Microsoft Foundry workloads including identity controls, connection security, network isolation, and model governance
13
+
- Specify security baselines for SaaS, PaaS, and IaaS services
14
+
- Specify security requirements for IoT workloads
15
+
- Specify security requirements for web workloads
16
+
- Specify security requirements for containers and container orchestration
17
+
-Specify security requirements for AI workloads
18
+
- Evaluate security for Microsoft Foundry workloads
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/5-specify-security-requirements-containers-container-orchestration.md
Access control for container orchestration platforms must address both the management plane and the data plane. Security architects should specify requirements for identity integration and role-based access.
6
6
7
-
For cluster authentication specifications, require integration with Microsoft Entra ID to leverage your organization's existing identity governance. This integration enables:
7
+
For cluster authentication specifications, require integration with Microsoft Entra ID to use your organization's existing identity governance. This integration enables:
8
8
9
9
- Conditional access policies
10
10
- Multifactor authentication
@@ -20,7 +20,7 @@ Specify requirements for service account management. Default service accounts sh
20
20
21
21
## Network security requirements
22
22
23
-
Container orchestration platforms require network security at multiple layers. Traditional network security groups filter traffic at the infrastructure level, but container platforms need additional controls.
23
+
Container orchestration platforms require network security at multiple layers. Traditional network security groups filter traffic at the infrastructure level, but container platforms need extra controls.
24
24
25
25
Specify requirements for API server protection. Private clusters restrict API server access to private endpoints within your virtual network, eliminating public internet exposure. For scenarios requiring public access, define authorized IP ranges that can communicate with the API server.
- Containers must not run as root unless explicitly required and approved.
90
90
- Require read-only root filesystems where possible.
91
-
- Restrict containers from mounting sensitive host paths or acquiring additional capabilities.
91
+
- Restrict containers from mounting sensitive host paths or acquiring extra capabilities.
92
92
- Use Linux security features such as **AppArmor** and **seccomp** to provide granular control over container actions and further limit the attack surface.
93
93
94
94
## Secrets management requirements
@@ -102,7 +102,7 @@ When specifying container and orchestration security requirements, prioritize:
102
102
- Microsoft Entra ID integration with Kubernetes RBAC for identity and access control
103
103
- Private clusters with network policies enforcing default-deny communication and egress traffic routed through Azure Firewall
104
104
- Private container registries with vulnerability scanning at all lifecycle stages and minimal base images
105
-
- Defender for Containers for runtime threat detection, binary drift detection, and security posture management integrated with Defender XDR and Sentinel
105
+
- Defender for Containers for runtime threat detection, binary drift detection, and security posture management integrated with Defender XDR and Microsoft Sentinel
106
106
- Azure Key Vault with Secrets Store CSI Driver for centralized secrets management
107
107
- Pod Security Standards enforcing baseline or restricted configurations with AppArmor and seccomp hardening
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/6-evaluate-ai-services-security.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ Responsibility allocation varies by deployment model. SaaS AI solutions like Mic
20
20
21
21
When evaluating solutions, assess whether the architecture implements appropriate authentication and authorization mechanisms.
22
22
23
-
Evaluate whether the solution uses Microsoft Entra ID for authentication rather than API keys. Entra ID enables conditional access policies, multifactor authentication, and centralized identity governance. API keys should be disabled where possible, as they cannot support fine-grained access control or user-level audit trails.
23
+
Evaluate whether the solution uses Microsoft Entra ID for authentication rather than API keys. Microsoft Entra ID enables conditional access policies, multifactor authentication, and centralized identity governance. API keys should be disabled where possible, as they can't support fine-grained access control or user-level audit trails.
24
24
25
25
Assess role-based access control configurations for least privilege. The **Cognitive Services OpenAI User** role provides inference-only access, while **Cognitive Services OpenAI Contributor** enables model deployment and management. Evaluate whether the proposed role assignments align with the principle of least privilege for each identity type.
26
26
@@ -36,7 +36,7 @@ Assess whether the solution uses private endpoints to eliminate public internet
36
36
37
37
For AI platforms that provide managed virtual networks, evaluate whether the chosen isolation mode aligns with organizational security requirements and data classification. Platform-specific network isolation configurations, such as those for Microsoft Foundry, are covered in the next unit.
38
38
39
-
Review network security group rules to verify traffic is restricted to necessary communications. Assess whether Azure Firewall provides additional filtering for internet-bound traffic.
39
+
Review network security group rules to verify traffic are restricted to necessary communications. Assess whether Azure Firewall provides additional filtering for internet-bound traffic.
40
40
41
41
## Evaluate content safety controls
42
42
@@ -66,7 +66,7 @@ Beyond content filtering, AI applications require security controls specific to
66
66
67
67
### Model governance evaluation (MCSB AI-1)
68
68
69
-
Assess whether the solution implements formal model approval processes enforced through Azure Policy. The built-in policy **Cognitive Services Deployments should only use approved Registry Models** restricts which models can be deployed by matching model asset IDs. Additionally, evaluate whether local API key authentication is disabled via policy, requiring Entra ID authentication. Evaluate model provenance tracking to ensure organizations can identify the source and modification history of deployed models. Unverified models may contain backdoors, poisoned training data, or supply chain compromises.
69
+
Assess whether the solution implements formal model approval processes enforced through Azure Policy. The built-in policy **Cognitive Services Deployments should only use approved Registry Models** restricts which models can be deployed by matching model asset IDs. Additionally, evaluate whether local API key authentication is disabled via policy, requiring Microsoft Entra ID authentication. Evaluate model provenance tracking to ensure organizations can identify the source and modification history of deployed models. Unverified models may contain backdoors, poisoned training data, or supply chain compromises.
70
70
71
71
### Agent function privileges (MCSB AI-4)
72
72
@@ -135,7 +135,7 @@ Additionally evaluate traditional security controls:
135
135
136
136
| Area | Key evaluation points |
137
137
| ---- | --------------------- |
138
-
|**Identity**| Microsoft Entra ID authentication, managed identities, Entra Agent ID, least privilege RBAC |
138
+
|**Identity**| Microsoft Entra ID authentication, managed identities, Microsoft Entra Agent ID, least privilege RBAC |
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/6a-evaluate-foundry-platform-security.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ Foundry divides operations into control plane (resource management) and data pla
15
15
16
16
### Authentication method evaluation
17
17
18
-
Foundry supports two authentication methods: Microsoft Entra ID and API keys. Evaluate whether the solution uses Entra ID for production workloads, which enables conditional access, managed identities, and granular RBAC. API keys remain available for rapid prototyping but lack per-user traceability and should be disabled via Azure Policy for production environments.
18
+
Foundry supports two authentication methods: Microsoft Entra ID and API keys. Evaluate whether the solution uses Microsoft Entra ID for production workloads, which enables conditional access, managed identities, and granular RBAC. API keys remain available for rapid prototyping but lack per-user traceability and should be disabled via Azure Policy for production environments.
19
19
20
20
### RBAC assignment evaluation
21
21
@@ -43,16 +43,16 @@ Foundry connections define how the resource and projects authenticate to depende
43
43
44
44
Evaluate whether connections use Microsoft Entra ID authentication rather than API keys. Foundry connections support the following authentication methods, with availability varying by connector type:
45
45
46
-
-**Managed identity** (system or user-assigned) — preferred for keyless credential management
46
+
-**Managed identity** (system or user-assigned)—preferred for keyless credential management
47
47
-**Service principal** (client ID/secret or certificate)
48
-
-**API key** — for services that don't support Entra ID
49
-
-**SAS token** — for specific storage scenarios
48
+
-**API key**—for services that don't support Microsoft Entra ID
49
+
-**SAS token**—for specific storage scenarios
50
50
51
51
### Key Vault integration
52
52
53
53
For connections that require secrets (API keys, connection strings), verify that a dedicated Azure Key Vault is configured through a Key Vault connection at the Foundry resource level. This dedicated vault should:
54
54
55
-
- Store only Foundry-managed secrets — not be shared with other workload components
55
+
- Store only Foundry-managed secrets—not be shared with other workload components
56
56
- Have access restricted to the Foundry resource managed identity
57
57
- Use Azure Monitor and activity logs for auditing create, update, and delete events on secrets
58
58
@@ -118,7 +118,7 @@ Foundry follows a shared responsibility model for vulnerability management. Micr
118
118
Evaluate whether Azure Policy is configured to control model deployments at the Foundry resource level:
119
119
120
120
-**Cognitive Services Deployments should only use approved Registry Models**: Restricts which models can deploy by matching model asset IDs. Prevents unauthorized or untested models from reaching production.
121
-
-**Configure Azure AI Services resources to disable local key access**: Forces Entra ID authentication by disabling API key access at the resource level.
121
+
-**Configure Azure AI Services resources to disable local key access**: Forces Microsoft Entra ID authentication by disabling API key access at the resource level.
122
122
123
123
### Model catalog evaluation
124
124
@@ -134,7 +134,7 @@ Verify that diagnostic settings are enabled for the Foundry resource, routing th
134
134
-**RequestResponse**: API requests and model responses for compliance
135
135
-**AllMetrics**: Usage metrics including token consumption and compute utilization
136
136
137
-
Azure Monitor provides segmented metrics by scope — resource-level metrics for management operations and project-level metrics for agent activity and evaluation performance.
137
+
Azure Monitor provides segmented metrics by scope—resource-level metrics for management operations and project-level metrics for agent activity and evaluation performance.
138
138
139
139
### Security monitoring integration
140
140
@@ -147,9 +147,9 @@ When evaluating Microsoft Foundry platform security, verify the solution address
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/8-summary.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@ In this module, you learned how security architects specify security requirement
2
2
3
3
You learned how to:
4
4
5
-
- Specify security baselines for SaaS, PaaS, and IaaS services using the shared responsibility model.
6
-
- Specify security requirements for IoT workloads including device identity, network segmentation, and monitoring.
7
-
- Specify security requirements for web workloads covering authentication, network protection, and application security.
8
-
- Specify security requirements for containers and container orchestration including cluster security, image integrity, and runtime protection.
9
-
-Evaluate security controls for AI services using MCSB v2 AI-specific controls and the AI shared responsibility model.
10
-
- Evaluate security for Microsoft Foundry workloads including resource/project architecture, identity controls, connection security, network isolation, and model governance.
5
+
- Specify security baselines for SaaS, PaaS, and IaaS services
6
+
- Specify security requirements for IoT workloads
7
+
- Specify security requirements for web workloads
8
+
- Specify security requirements for containers and container orchestration
9
+
-Specify security requirements for AI workloads
10
+
- Evaluate security for Microsoft Foundry workloads
0 commit comments