Securing Microsoft Azure OpenAI
Home > Computing and Information Technology > Computer security > Securing Microsoft Azure OpenAI: (Tech Today)
Securing Microsoft Azure OpenAI: (Tech Today)

Securing Microsoft Azure OpenAI: (Tech Today)


     0     
5
4
3
2
1



Available


X
About the Book

Securely harness the full potential of OpenAI’s artificial intelligence tools in Azure Securing Microsoft Azure OpenAI is an accessible guide to leveraging the comprehensive AI capabilities of Microsoft Azure while ensuring the utmost data security. This book introduces you to the collaborative powerhouse of Microsoft Azure and OpenAI, providing easy access to cutting-edge language models like GPT-4o, GPT-3.5-Turbo, and DALL-E. Designed for seamless integration, the Azure OpenAI Service revolutionizes applications from dynamic content generation to sophisticated natural language translation, all hosted securely within Microsoft Azure’s environment. Securing Microsoft Azure OpenAI demonstrates responsible AI deployment, with a focus on identifying potential harm and implementing effective mitigation strategies. The book provides guidance on navigating risks and establishing best practices for securely and responsibly building applications using Azure OpenAI. By the end of this book, you’ll be equipped with the best practices for securely and responsibly harnessing the power of Azure OpenAI, making intelligent decisions that respect user privacy and maintain data integrity.

Table of Contents:
Introduction xxiii Chapter 1 Overview of Generative Artificial Intelligence Security 1 Common Use Cases for Generative AI in the Enterprise 1 Generative Artificial Intelligence 1 Generative AI Use Cases 2 LLM Terminology 3 Sample Three-Tier Application 4 Presentation Tier 5 Application Tier 5 Data Tier 5 Generative AI Application Risks 5 Hallucinations 6 Malicious Usage 6 Shadow AI 7 Unfavorable Business Decisions 8 Established Risks 8 Shared AI Responsibility Model 8 Shared Responsibility Model for the Cloud 9 Shared Responsibility Model for AI 10 AI Usage 10 AI Application 10 AI Platform 11 Applying the Shared Responsibility Model 11 Regulation and Control Frameworks 12 Regulation in the United States 12 Regulation in the European Union 12 NIST AI Risk Management Framework 14 Govern 15 Map 15 Measure 16 Manage 16 Key Takeaways 16 References 17 Chapter 2 Security Controls for Azure OpenAI Service 19 On the Importance of Selecting Appropriate Security Controls 19 Risk Appetite 20 Comparing OpenAI Hosting Models 21 OpenAI ChatGPT 21 Privacy and Compliance 21 Identity and Access Management 21 Data Protection and Encryption 22 Audit Logging 22 Network Isolation 22 Data Residency 22 Azure OpenAI 22 Privacy and Compliance 23 Identity and Access Management 23 Data Protection and Encryption 23 Audit Logging 23 Network Isolation 23 Data Residency 23 Recommendation for Enterprise Usage 24 Evaluating Security Controls with MCSB 24 Control Domains 26 Network Security 27 Identity Management 28 Privileged Access 28 Data Protection 29 Asset Management 29 Logging and Threat Detection 29 Incident Response 30 Posture and Vulnerability Management 30 Endpoint Security 31 Backup and Recovery 31 DevOps Security 32 Governance and Strategy 32 Security Baselines 33 Applying Microsoft Cloud Security Baseline to Azure OpenAI 33 Security Profile 34 How to Approach the Security Baseline 34 Data Protection 35 Identity Management 36 Logging and Threat Detection 37 Network Security 38 Asset Management 38 Backup and Recovery 39 Endpoint Security 40 Posture and Vulnerability Management 40 Privileged Access 41 Selected Controls 42 Mapping the Selected Controls to CIS and NIST 44 Using Azure Policy to Secure Azure OpenAI at Scale 46 Azure Policy 46 Continuous Compliance Monitoring 47 Azure Policies for Azure OpenAI 48 Key Takeaways 49 References 49 Chapter 3 Implementing Azure OpenAI Security Controls 51 OWASP Top 10 for LLM Applications 51 Prompt Injection 52 Insecure Output Handling 52 Training Data Poisoning 53 Model Denial of Service 53 Supply Chain Vulnerabilities 53 Sensitive Information Disclosure 54 Insecure Plugin Design 54 Excessive Agency 54 Overreliance 55 Model Theft 55 Access Control 56 Implementing Access Control for Azure OpenAI 56 Cognitive Services OpenAI User 57 Cognitive Services OpenAI Contributor 58 Azure AI Administrator 59 Azure AI Developer 61 Azure AI Enterprise Network Connection Approver 62 Azure AI Inference Deployment Operator 64 Preventing Local Authentication 65 Disable Local Authentication Using Bicep 66 Disable Local Authentication Using Terraform 66 Disable Local Authentication Using ARM Templates 67 Prevent Local Authentication Using PowerShell 67 Enforcing with Azure Policy 67 Audit Logging 68 Control Plane Audit Logging 68 Data Plane Audit Logging 71 Enable Data Plane Audit Logging Using Azure Portal 72 Enable Data Plane Audit Logging Using Bicep 73 Enable Data Plane Audit Logging Using Terraform 73 Enable Data Plane Audit Logging Using ARM Templates 74 Enable Data Plane Audit Logging Using PowerShell 76 Enable Data Plane Audit Logging Using Azure cli 76 Enforcing with Azure Policy 77 Enable Logging by Category Group for Cognitive Services 77 Network Isolation 82 Default Network Controls 83 Control Inbound Network Traffic 83 Control Inbound Network Traffic Using the Azure Portal 84 Control Inbound Network Traffic Using Bicep 84 Control Inbound Network Traffic with Private Endpoints Using Infrastructure as Code 85 Control Inbound Network Traffic Using Terraform 87 Control Inbound Network Traffic with Private Endpoints Using Terraform 87 Control Inbound Network Traffic Using ARM Templates 89 Control Inbound Network Traffic with Private Endpoints Using ARM Templates 90 Control Inbound Network Traffic Using PowerShell 93 Control Inbound Network Traffic with Private Endpoints Using PowerShell 94 Control Inbound Network Traffic Using Azure cli 95 Control Inbound Network Traffic with Private Endpoints Using Azure cli 95 Control Outbound Network Traffic 97 Enable Data Loss Prevention Using REST 97 Enable Data Loss Prevention Using Bicep 98 Enable Data Loss Prevention Using Terraform 98 Enable Data Loss Prevention Using ARM Templates 99 Enforcing with Azure Policy 101 Azure AI Services Resources Should Restrict Network Access 101 Azure AI Services Resources Should Use Azure Private Link 103 Encryption at Rest 105 Implementing Azure OpenAI with CMK 106 Implement CMK Using Azure Portal 106 Implement CMK Using Bicep 107 Implement CMK Using Terraform 109 Implement CMK Using ARM Templates 111 Implement CMK Using PowerShell 114 Implement CMK Using the Azure cli 115 Enforcing with Azure Policy 116 Azure AI Services Resources Should Encrypt Data at Rest with a CMK 117 Content Filtering Controls 119 System Safety Prompts 119 Azure AI Content Safety 120 Content Filtering 120 Prompt Shields 121 Protected Material Detection 121 Groundedness Detection 121 Creating a Content Filter 121 Implementing Content Filtering Programmatically 122 Content Safety Input Restrictions 123 Key Takeaways 123 References 124 Chapter 4 Securing the Entire Application 125 The Three-Tier LLM Application in Azure 125 Presentation Tier 126 Application Tier 126 Data Tier 126 On Threat Modeling 126 Threat Model of the Three-Tier Application 127 Revised Application Architecture 129 Retrieval-Augmented Generation 129 RAG in Azure 130 Azure AI Search 130 Azure Cosmos DB 131 Application Architecture with RAG 131 Azure Front Door 132 Security Profile 132 Security Baseline 132 Implementing Security Controls 133 Access Control 133 Audit Logging 133 Network Isolation 141 Encryption at Rest 152 Enforcing Controls with Policies 152 Azure App Service 153 Security Profile 153 Security Baseline 153 Implementing Security Controls 155 Access Control 156 Audit Logging 163 Network Isolation 169 Encryption at Rest 176 Enforcing Controls with Policies 176 API Management 177 Security Profile 177 Security Baseline 178 Implementing Security Controls 178 Access Control 179 Audit Logging 180 Network Isolation 186 Encryption at Rest 201 Enforcing Controls with Policies 202 Storage Account 202 Security Profile 202 Security Baseline 203 Implementing Security Controls 204 Access Control 204 Audit Logging 209 Network Isolation 216 Encryption at Rest 225 Backup and Recovery 232 Discover, Classify, and Protect Sensitive Data 238 Enforcing Controls with Policies 238 Cosmos DB 238 Security Profile 239 Security Baseline 239 Implementing Security Controls 241 Access Control 241 Audit Logging 244 Network Isolation 249 Encryption at Rest 256 Backup and Recovery 262 Enforcing Controls with Policies 266 Azure AI Search 266 Security Profile 266 Security Baseline 267 Implementing Security Controls 268 Access Control 268 Audit Logging 272 Network Isolation 278 Encryption at Rest 287 Enforcing Controls with Policies 294 Key Takeaways 294 References 294 Chapter 5 Moving to Production 297 LLM Application Security Lifecycle 297 Model Supply Chain 298 Security Testing 299 Model Safety Evaluation 299 How to Use Model Safety Evaluation 300 Adversarial Testing 300 How to Use the Adversarial Simulator Service 301 Red Teaming 304 Crescendo Multiturn Attack 304 Red Teaming with PyRIT 304 Content Credentials 305 AI Security Posture Management 307 Discover and Manage Shadow AI 307 Discover SaaS Applications 307 Discover Generative AI Applications 309 Manage Generative AI Applications 312 Alert on Anomalous Activity and Applications 313 Defender for Cloud AI Workloads 314 Discovery 314 Posture Management 314 Security Alerting 314 Security Posture Management 315 Investigating Security Alerts 316 Alert Details 317 Supporting Evidence 318 Take Action 319 Managing Incidents 323 Instrumenting Security Alert Ingestion 324 Azure OpenAI Alerts 326 Detected Credential Theft Attempts on an Azure OpenAI Model Deployment 327 A Jailbreak Attempt on an Azure OpenAI Model Deployment Was Blocked by Azure AI Content Safety Prompt Shields 327 A Jailbreak Attempt on an Azure OpenAI Model Deployment Was Detected by Azure AI Content Safety Prompt Shields 327 Sensitive Data Exposure Detected in Azure OpenAI Model Deployment 327 Corrupted AI Application, Model, or Data Directed a Phishing Attempt at a User 328 Phishing URL Shared in an AI Application 328 Phishing Attempt Detected in an AI Application 328 Defender for Cloud Alerts for Other Services 328 App Service Alerts 329 API Management Alerts 330 Storage Account Alerts 331 Cosmos DB Alerts 332 LLM Application in Your Cloud Security Architecture 332 Cloud Security Control Domains 333 Asset Management 333 Incident Response 334 Privileged Access 336 Posture and Vulnerability Management 337 Landing Zones 339 About Landing Zones 339 Microsoft Enterprise-Scale Landing Zones 339 Microsoft Landing Zone Accelerator for OpenAI 342 LLM Application in the Landing Zone 342 The Sample Application in the Landing Zone 342 Access Control 343 Security Monitoring 343 Incident Response 344 Network 344 Key Takeaways 345 References 345 Index 347

About the Author :
KARL OTS is Global Head of Cloud Security at EPAM Systems, an engineering and consulting firm. He leads a team of experts in delivering security and compliance solutions for cloud and AI deployments for Fortune 500 enterprises in a variety of industries. He has over 15 years’ experience in tech and is a trusted advisor and thought leader. Karl is also a Microsoft Regional Director and Security MVP.


Best Sellers


Product Details
  • ISBN-13: 9781394291090
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 234 mm
  • No of Pages: 384
  • Returnable: Y
  • Series Title: Tech Today
  • Weight: 658 gr
  • ISBN-10: 1394291094
  • Publisher Date: 25 Mar 2025
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Returnable: Y
  • Spine Width: 28 mm
  • Width: 188 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Securing Microsoft Azure OpenAI: (Tech Today)
John Wiley & Sons Inc -
Securing Microsoft Azure OpenAI: (Tech Today)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Securing Microsoft Azure OpenAI: (Tech Today)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!