Skip to content

Commit d683e28

Browse files
committed
fix for acrolinx
1 parent a15f005 commit d683e28

2 files changed

Lines changed: 5 additions & 5 deletions

File tree

learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/7-knowledge-check.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.wwl.specify-requirements-secure-saas-paas-iaas-services.knowledge-che
33
title: Module assessment
44
metadata:
55
title: Module assessment
6-
description: "Knowledge check for module on the topic: specify requirements for securing SaaS, PaaS and IaaS services."
6+
description: "Knowledge check for module on the topic: specify requirements for securing SaaS, PaaS, and IaaS services."
77
ms.date: 02/06/2026
88
author: ceperezb
99
ms.author: ceperezb

learn-pr/wwl-sci/specify-requirements-securing-saas-paas-iaas-services/includes/6-evaluate-ai-services-security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Review content filter configurations for harmful content categories (hate speech
5050

5151
### Output validation evaluation
5252

53-
Evaluate groundedness detection configurations for RAG-based applications. Groundedness detection identifies when model outputs contain information not supported by provided source materials, reducing hallucination risks. Verify whether groundedness correction is enabled to automatically align responses with source documents.
53+
Evaluate groundedness detection configurations for RAG-based applications. Groundedness detection identifies when model outputs contain information not supported by provided source materials, reducing risks of incorrect information. Verify whether groundedness correction is enabled to automatically align responses with source documents.
5454

5555
For applications using AI agents, assess Task Adherence API implementation. This capability detects when tool use by AI agents is misaligned, unintended, or premature, preventing agents from taking unauthorized actions.
5656

@@ -76,7 +76,7 @@ Evaluate whether the solution implements human review for critical AI actions, e
7676

7777
## Evaluate threat protection capabilities
7878

79-
Microsoft Defender for Cloud provides AI-specific security posture management and threat protection. Evaluate whether solutions leverage these capabilities for comprehensive security monitoring. MCSB v2 controls AI-6 and AI-7 address monitoring and continuous red teaming requirements.
79+
Microsoft Defender for Cloud provides AI-specific security posture management and threat protection. Evaluate whether solutions use these capabilities for comprehensive security monitoring. MCSB v2 controls AI-6 and AI-7 address monitoring and continuous red teaming requirements.
8080

8181
### AI security posture management
8282

@@ -97,13 +97,13 @@ Evaluate alert integration with security operations. Verify that AI security ale
9797

9898
### Continuous AI red teaming (MCSB AI-7)
9999

100-
Assess whether the organization performs continuous adversarial testing of AI systems. AI red teaming uses tools like PyRIT (Python Risk Identification Tool) and the Azure AI Red Teaming Agent to simulate attacks including prompt injection, jailbreaking, and data poisoning. Evaluate whether red teaming is integrated into CI/CD pipelines for pre-deployment validation and whether test scenarios align with MITRE ATLAS tactics for AI-specific threats.
100+
Assess whether the organization performs continuous adversarial testing of AI systems. AI red teaming uses tools like PyRIT (Python Risk Identification Tool) and the Azure AI Red Teaming Agent to simulate attacks including prompt injection, jailbreaking, and data poisoning. Evaluate whether red teaming is integrated into CI/CD pipelines for predeployment validation and whether test scenarios align with MITRE ATLAS tactics for AI-specific threats.
101101

102102
## Evaluate data protection and availability
103103

104104
Assess encryption configurations for data at rest, verifying customer-managed keys where compliance requires key management control. Evaluate data residency configurations to ensure AI services and connected resources (search indexes, storage accounts) meet data sovereignty requirements.
105105

106-
For fine-tuned models, verify data lifecycle policies ensure training data deletion after fine-tuning completes unless retention is specifically required.
106+
For fine-tuned models, verify data lifecycle policies ensure training data deletion after fine-tuning completes unless retention is required.
107107

108108
Evaluate availability controls including quota monitoring and alerting, rate limiting at API Management, and Azure DDoS Protection for internet-facing deployments.
109109

0 commit comments

Comments
 (0)