You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-foundry/how-to/develop/planning.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ AI Foundry is built on the Azure platform, allowing you to customize security co
43
43
44
44
-**Networking**: Deploy AI Foundry into a Virtual Network (VNet) to isolate traffic and control access using Network Security Groups (NSGs). [Learn more about networking security.](/security/benchmark/azure/baselines/azure-ai-foundry-security-baseline).
45
45
46
-
-**Customer-Managed Keys (CMK)**: Azure supports CMK for encrypting data at rest. AI Foundry supports CMK optionally for customers with strict compliance needs. [Learn more about CMK.](/security/benchmark/azure/baselines/azure-ai-foundry-security-baseline).
46
+
-**Customer-Managed Keys (CMK)**: Azure supports CMK for encrypting data at rest. AI Foundry supports CMK optionally for customers with strict compliance needs. [Learn more about CMK](/security/benchmark/azure/baselines/azure-ai-foundry-security-baseline).
47
47
48
48
-**Authentication & Authorization**: AI Foundry supports both **API key-based access** for simple integration and **Azure RBAC** for fine-grained control. Azure enforces a clear separation between the **control plane** (resource management) and the **data plane** (model and data access). Start with built-in roles, and define custom roles as needed. [Learn more about authentication.](/security/benchmark/azure/baselines/azure-ai-foundry-security-baseline).
49
49
@@ -59,7 +59,7 @@ Contoso secures its AI Foundry deployments using **private networking** with *
59
59
***Project Managers** oversee specific projects
60
60
***Users** interact with GenAI tools
61
61
62
-
For most use cases, Contoso does **not use CMK**, relying on Microsoft-managed encryption by default.
62
+
For most use cases, Contoso does **not use Customer-Managed Keys**, relying on Microsoft-managed encryption by default.
0 commit comments