You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/ai-security-posture.md
+9-15Lines changed: 9 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,12 +34,6 @@ Regularly updating or patching these can prevent exploits, protecting generative
34
34
35
35
With these features, Defender for Cloud provides full visibility of AI workloads from code to cloud.
36
36
37
-
### How discovery works
38
-
39
-
When the Defender Cloud Security Posture Management (CSPM) plan is enabled, Defender for Cloud discovers generative AI components by scanning code repositories for IaC misconfigurations and container images for vulnerabilities.
40
-
41
-
These vulnerabilities are presented as recommendations which you can use to analyze and remediate security issues.
42
-
43
37
## Reducing risks to generative AI apps
44
38
45
39
Defender CSPM provides contextual insights into an organization's AI security posture. You can reduce risks within your AI workloads using security recommendations and attack path analysis.
@@ -48,13 +42,7 @@ Defender CSPM provides contextual insights into an organization's AI security po
48
42
49
43
Defender for Cloud assesses AI workloads and issues recommendations around identity, data security, and internet exposure to identify and prioritize critical security issues in AI workloads.
50
44
51
-
### Analyzing attack paths
52
-
53
-
Attack paths analysis detects and mitigates risks to AI workloads, particularly during grounding (linking AI models to specific data) and fine-tuning (adjusting a pre-trained model on a specific dataset to improve its performance on a related task) stages, where data might be exposed.
54
-
55
-
By continuously monitoring AI workloads, attack path analysis can identify weaknesses and potential vulnerabilities and follow up with recommendations. Additionally, it extends to cases where the data and compute resources are distributed across Azure, AWS and GCP.
56
-
57
-
### Detecting IaC misconfigurations
45
+
#### Detecting IaC misconfigurations
58
46
59
47
DevOps security, detects IaC misconfigurations, which can expose generative AI applications to security vulnerabilities, such as over-exposed access controls or inadvertent publicly exposed services. These misconfigurations could lead to data breaches or unauthorized access. Misconfigurations could lead to compliance issues, especially when handling strict data privacy regulations.
60
48
@@ -67,9 +55,15 @@ Current IaC AI security checks include:
67
55
- Use Managed Identity for Azure AI Service Accounts
68
56
- Use identity-based authentication for Azure AI Service Accounts
69
57
58
+
### Explore risks with attack path analysis
59
+
60
+
Attack paths analysis detects and mitigates risks to AI workloads, particularly during grounding (linking AI models to specific data) and fine-tuning (adjusting a pre-trained model on a specific dataset to improve its performance on a related task) stages, where data might be exposed.
61
+
62
+
By continuously monitoring AI workloads, attack path analysis can identify weaknesses and potential vulnerabilities and follow up with recommendations. Additionally, it extends to cases where the data and compute resources are distributed across Azure, AWS and GCP.
63
+
70
64
## Related content
71
65
72
-
-[Explore risks to generative AI applications](explore-ai-risk.md)
66
+
-[Explore risks to pre-deployed generative AI artifacts](explore-ai-risk.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/explore-ai-risk.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
-
title: Explore risks to generative AI applications
2
+
title: Explore risks to pre-deployed generative AI artifacts
3
3
description: Learn how to discover potential security risks for your generative AI applications in Microsoft Defender for Cloud.
4
4
ms.topic: how-to
5
5
ms.date: 04/18/2024
6
6
# customer intent: As a user, I want to learn how to identify potential security risks for my generative AI applications in Microsoft Defender for Cloud so that I can enhance their security.
7
7
---
8
8
9
-
# Explore risks to generative AI applications
9
+
# Explore risks to pre-deployed generative AI artifacts
10
10
11
11
The Defender CSPM plan in Microsoft Defender for Cloud helps you to improve the security posture of generative AI apps, by identifying vulnerable dependencies in libraries. This article explains how to explore, identify, and remediate security risks for those apps.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/identify-ai-workload-model.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
-
title: Discover generative AI applications
2
+
title: Discover generative AI workloads
3
3
description: Learn how to use the cloud security explorer to determine which AI workloads and models are running in your environment.
4
4
ms.topic: how-to
5
-
ms.date: 04/18/2024
5
+
ms.date: 05/01/2024
6
6
# customer intent: As a user, I want to learn how to identify AI workloads and models in my environment so that I can assess their security posture.
7
7
---
8
8
9
-
# Discover generative AI applications
9
+
# Discover generative AI workloads
10
10
11
11
Defender for Cloud provides a comprehensive view of your organization's AI bill of materials (AI BOM). By using the cloud security explorer, you can identify the AI workloads and models that are running in your environment and assess their security posture.
12
12
@@ -49,4 +49,4 @@ The cloud security explorer can be used to identify generative AI workloads and
49
49
## Next step
50
50
51
51
> [!div class="nextstepaction"]
52
-
> [Explore risks to generative AI applications](explore-ai-risk.md)
52
+
> [Explore risks to pre-deployed generative AI artifacts](explore-ai-risk.md)
| May 6 |[AI security posture management](#ai-security-posture-management)|
28
-
| May 6 |[Limited public preview of Defender for AI Workloads](#limited-public-preview-of-defender-for-ai-workloads)|
27
+
| May 6 |[AI multicloud security posture management is publicly available for Azure and AWS](#ai-multicloud-security-posture-management-is-publicly-available-for-azure-and-aws)|
28
+
| May 6 |[Limited public preview of Defender for AI Workloads in Azure](#limited-public-preview-of-defender-for-ai-workloads-in-azure)|
29
29
30
-
### AI security posture management
30
+
### AI multicloud security posture management is publicly available for Azure and AWS
31
31
32
32
May 6, 2024
33
33
34
34
We are announcing the inclusion of AI security posture management in Defender for Cloud. This feature provides AI security posture management capabilities for Azure and AWS that enhance the security of your AI pipelines and services.
35
35
36
36
Learn more about [AI security posture management](ai-security-posture.md).
37
37
38
-
### Limited public preview of Defender for AI Workloads
38
+
### Limited public preview of Defender for AI Workloads in Azure
0 commit comments