Skip to content

Commit a404d96

Browse files
authored
Merge pull request #270781 from ElazarK/WI233482-rsa-ai
Gen AI rsa
2 parents 45ca673 + 75ae58f commit a404d96

22 files changed

+393
-8
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -255,6 +255,11 @@
255255
items:
256256
- name: Agentless container posture in Defender CSPM
257257
href: concept-agentless-containers.md
258+
- name: Improve your AI security posture management
259+
items:
260+
- name: AI security posture management
261+
displayName: AI, security, posture, management
262+
href: ai-security-posture.md
258263
- name: Security recommendations
259264
items:
260265
- name: Reference list of Azure recommendations
@@ -314,6 +319,14 @@
314319
- name: Integrate security solutions
315320
displayName: security, solutions, integrate, integrated, data sources
316321
href: partner-integration.md
322+
- name: AI security posture
323+
items:
324+
- name: Discover generative AI workloads
325+
displayName: AI, workloads, models, applications, apps, AI BOM
326+
href: identify-ai-workload-model.md
327+
- name: Explore risks to pre-deployment generative AI artifacts
328+
displayName: AI, risks, generative, applications, apps
329+
href: explore-ai-risk.md
317330
- name: Data-aware security posture
318331
items:
319332
- name: Enable data-aware security posture
@@ -914,6 +927,14 @@
914927
href: review-pull-request-annotations.md
915928
- name: Common questions about DevOps security
916929
href: faq-defender-for-devops.yml
930+
- name: Threat protection for AI workloads (preview)
931+
items:
932+
- name: Overview
933+
displayName: AI, Defender for AI
934+
href: ai-threat-protection.md
935+
- name: Enable threat protection for AI workloads (preview)
936+
displayName: AI, Defender for AI
937+
href: ai-onboarding.md
917938
- name: Reference
918939
items:
919940
- name: Archived release notes (older than six months)
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: Enable threat protection for AI workloads (preview)
3+
description: Learn how to enable threat protection for AI workloads on your Azure subscription for Microsoft Defender for Cloud.
4+
ms.topic: install-set-up-deploy
5+
ms.date: 05/05/2024
6+
---
7+
8+
# Enable threat protection for AI workloads (preview)
9+
10+
Threat protection for AI workloads in Microsoft Defender for Cloud protects AI workloads on an Azure subscription by providing insights to threats that might affect your generative AI applications.
11+
12+
> [!IMPORTANT]
13+
> Threat protection for AI workloads is currently in preview.
14+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15+
16+
## Prerequisites
17+
18+
- Read up on [Overview - AI threat protection](ai-threat-protection.md).
19+
20+
- You need a Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
21+
22+
- You must [enable Defender for Cloud](get-started.md#enable-defender-for-cloud-on-your-azure-subscription) on your Azure subscription.
23+
24+
- We recommend that you don't opt out of prompt based prompt-base triggered alerts for [Azure OpenAI content filtering](../ai-services/openai/concepts/content-filter.md). If you opt out of prompt-based trigger alerts and remove that capability, it can affect Defender for Cloud's ability to monitor and detect such attacks.
25+
26+
## Enroll in the limited preview
27+
28+
To get started, you must [sign up](https://aka.ms/D4AI/PublicPreviewAccess) and be accepted to the limited preview, you can start onboarding threat protection for AI workloads.
29+
30+
1. Fill out the [registration form](https://aka.ms/D4AI/PublicPreviewAccess).
31+
32+
1. Wait to receive an email that confirms your acceptance or rejection from the limited preview.
33+
34+
If you're accepted into the limited preview, you can enable threat protection for AI workloads on your Azure subscription.
35+
36+
## Enable threat protection for AI workloads
37+
38+
Enable threat protection for AI workloads.
39+
40+
1. Sign in to the [Azure portal](https://portal.azure.com).
41+
42+
1. Search for and select **Microsoft Defender for Cloud**.
43+
44+
1. In the Defender for Cloud menu, select **Environment settings**.
45+
46+
1. Select the relevant Azure subscription.
47+
48+
1. On the Defender plans page, toggle the AI workloads to **On**.
49+
50+
:::image type="content" source="media/ai-onboarding/enable-ai-workloads-plan.png" alt-text="Screenshot that shows you how to toggle threat protection for AI workloads to on." lightbox="media/ai-onboarding/enable-ai-workloads-plan.png":::
51+
52+
## Next step
53+
54+
> [!div class="nextstepaction"]
55+
> [Manage and respond to the security alerts](managing-and-responding-alerts.yml)
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
---
2+
title: AI security posture management
3+
description: Learn about AI security posture management in Microsoft Defender for Cloud and how it protects resources from AI threats.
4+
ms.date: 05/05/2024
5+
ms.topic: concept-article
6+
ms.author: elkrieger
7+
author: Elazark
8+
#customer intent: As a cloud security professional, I want to understand how to secure my generative AI resources using Defender for Cloud's AI security posture management capabilities.
9+
---
10+
11+
# AI security posture management
12+
13+
The Defender Cloud Security Posture Management (CSPM) plan in Microsoft Defender for Cloud provides AI security posture management capabilities that secure enterprise-built, multi, or hybrid cloud (currently Azure and AWS) generative AI applications, throughout the entire application lifecycle. Defender for Cloud reduces risk to cross cloud AI workloads by:
14+
15+
- Discovering generative AI Bill of Materials (AI BOM), which includes application components, data, and AI artifacts from code to cloud.
16+
- Strengthening generative AI application security posture with built-in recommendations and by exploring and remediating security risks.
17+
- Using the attack path analysis to identify and remediate risks.
18+
19+
:::image type="content" source="media/ai-security-posture/ai-lifecycle.png" alt-text="Diagram of the development lifecycle that is covered by Defender for Cloud's AI security posture management.":::
20+
21+
## Discovering generative AI apps
22+
23+
Defender for Cloud discovers AI workloads and identifies details of your organization's AI BOM. This visibility allows you to identify and address vulnerabilities and protect generative AI applications from potential threats.
24+
25+
Defenders for Cloud automatically and continuously discover deployed AI workloads across the following services:
26+
27+
- Azure OpenAI Service
28+
- Azure Machine Learning
29+
- Amazon Bedrock
30+
31+
Defender for Cloud can also discover vulnerabilities within generative AI library dependencies such as TensorFlow, PyTorch, and Langchain, by scanning source code for Infrastructure as Code (IaC) misconfigurations and container images for vulnerabilities. Regularly updating or patching the libraries can prevent exploits, protecting generative AI applications and maintaining their integrity.
32+
33+
With these features, Defender for Cloud provides full visibility of AI workloads from code to cloud.
34+
35+
## Reducing risks to generative AI apps
36+
37+
Defender CSPM provides contextual insights into an organization's AI security posture. You can reduce risks within your AI workloads using security recommendations and attack path analysis.
38+
39+
### Exploring risks using recommendations
40+
41+
Defender for Cloud assesses AI workloads and issues recommendations around identity, data security, and internet exposure to identify and prioritize critical security issues in AI workloads.
42+
43+
#### Detecting IaC misconfigurations
44+
45+
DevOps security detects IaC misconfigurations, which can expose generative AI applications to security vulnerabilities, such as over-exposed access controls or inadvertent publicly exposed services. These misconfigurations could lead to data breaches, unauthorized access, and compliance issues, especially when handling strict data privacy regulations.
46+
47+
Defender for Cloud assesses your generative AI apps configuration and provides security recommendations to improve AI security posture.
48+
49+
Detected misconfigurations should be remediated early in the development cycle to prevent more complex problems later on.
50+
51+
Current IaC AI security checks include:
52+
53+
- Use Azure AI Service Private Endpoints
54+
- Restrict Azure AI Service Endpoints
55+
- Use Managed Identity for Azure AI Service Accounts
56+
- Use identity-based authentication for Azure AI Service Accounts
57+
58+
### Exploring risks with attack path analysis
59+
60+
Attack paths analysis detects and mitigates risks to AI workloads, particularly during grounding (linking AI models to specific data) and fine-tuning (adjusting a pretrained model on a specific dataset to improve its performance on a related task) stages, where data might be exposed.
61+
62+
By monitoring AI workloads continuously, attack path analysis can identify weaknesses and potential vulnerabilities and follow up with recommendations. Additionally, it extends to cases where the data and compute resources are distributed across Azure, AWS, and GCP.
63+
64+
## Related content
65+
66+
- [Explore risks to predeployed generative AI artifacts](explore-ai-risk.md)
67+
- [Review security recommendations](review-security-recommendations.md)
68+
- [Identify and remediate attack paths](how-to-manage-attack-path.md)
69+
- [Discover generative AI workloads](identify-ai-workload-model.md)
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
title: Overview - AI threat protection
3+
description: Learn about AI threat protection in Microsoft Defender for Cloud and how it protects your resources from AI threats.
4+
ms.date: 05/05/2024
5+
ms.topic: overview
6+
ms.author: elkrieger
7+
author: Elazark
8+
#customer intent: As a cloud security professional, I want to understand how to secure my generative AI resources using Defender for Cloud's AI security posture management capabilities.
9+
---
10+
11+
# Overview - AI threat protection
12+
13+
Threat protection for AI workloads in Microsoft Defender for Cloud continually identifies threats to generative AI applications in real time and assists in the response process, for security issues that might exist in generative AI applications.
14+
15+
> [!IMPORTANT]
16+
> Threat protection for AI workloads is currently in preview.
17+
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18+
19+
Defender for Cloud's AI threat protection integrates with [Azure AI Content Safety Prompt Shields](../ai-services/content-safety/concepts/jailbreak-detection.md) and Microsoft's threat intelligence signals to deliver contextual and actionable security alerts associated with a range of threats such as sensitive data leakage, data poisoning, jailbreak, and credentials theft.
20+
21+
:::image type="content" source="media/ai-threat-protection/threat-protection-ai.png" alt-text="Diagram that shows how enabling, detection, and response works for threat protection." lightbox="media/ai-threat-protection/threat-protection-ai.png":::
22+
23+
> [!NOTE]
24+
> Threat protection for AI workloads relies on [Azure Open AI content filtering](../ai-services/openai/concepts/content-filter.md) for prompt-base triggered alert. If you opt out of prompt-based trigger alerts and removed that capability, it can affect Defender for Cloud's ability to monitor and detect such attacks.
25+
26+
## Defender XDR integration
27+
28+
Threat protection for AI workloads integrates with [Defender XDR](concept-integration-365.md), enabling security teams to centralize alerts on AI workloads within the Defender XDR portal.
29+
30+
Security teams can correlate AI workloads alerts and incidents within the Defender XDR portal, and gain an understanding of the full scope of an attack, including malicious activities associated with their generative AI applications from the XDR dashboard.
31+
32+
## Signing up for the limited public preview
33+
34+
To use threat protection for AI workloads, you must enroll in the limited public preview program by filling out the [registration form](https://aka.ms/D4AI/PublicPreviewAccess).
35+
36+
## Related content
37+
38+
- [Enable threat protection for AI workloads (preview) (Preview)](ai-onboarding.md).
39+
- [Alerts for AI workloads](alerts-reference.md#alerts-for-ai-workloads)

articles/defender-for-cloud/alerts-reference.md

Lines changed: 35 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Reference table for all security alerts
33
description: This article lists the security alerts visible in Microsoft Defender for Cloud.
44
ms.topic: reference
55
ms.custom: linux-related-content
6-
ms.date: 03/17/2024
6+
ms.date: 05/01/2024
77
ai-usage: ai-assisted
88
---
99

@@ -4367,6 +4367,40 @@ Applies to: Azure Blob (Standard general-purpose v2, Azure Data Lake Storage Gen
43674367

43684368
**Severity**: Medium
43694369

4370+
## Alerts for AI workloads
4371+
4372+
### Detected credential theft attempts on an Azure Open AI model deployment
4373+
4374+
**Description**: The credential theft alert is designed to notify the SOC when credentials are detected within GenAI model responses to a user prompt, indicating a potential breach. This alert is crucial for detecting cases of credential leak or theft, which are unique to generative AI and can have severe consequences if successful.
4375+
4376+
**[MITRE tactics](#mitre-attck-tactics)**: Credential Access, Lateral Movement, Exfiltration
4377+
4378+
**Severity**: Medium
4379+
4380+
### A Jailbreak attempt on an Azure Open AI model deployment was blocked by Prompt Shields
4381+
4382+
**Description**: The Jailbreak alert, carried out using a direct prompt injection technique, is designed to notify the SOC there was an attempt to manipulate the system prompt to bypass the generative AI’s safeguards, potentially accessing sensitive data or privileged functions. It indicated that such attempts were blocked by Azure Responsible AI Content Filtering (AKA Prompt Shields), ensuring the integrity of the AI resources and the data security.
4383+
4384+
**[MITRE tactics](#mitre-attck-tactics)**: Privilege Escalation, Defense Evasion
4385+
4386+
**Severity**: Medium
4387+
4388+
### A Jailbreak attempt on an Azure Open AI model deployment was detected by Prompt Shields
4389+
4390+
**Description**: The Jailbreak alert, carried out using a direct prompt injection technique, is designed to notify the SOC there was an attempt to manipulate the system prompt to bypass the generative AI’s safeguards, potentially accessing sensitive data or privileged functions. It indicated that such attempts were detected by Azure Responsible AI Content Filtering (AKA Prompt Shields), but were not blocked due to content filtering settings or due to low confidence.
4391+
4392+
**[MITRE tactics](#mitre-attck-tactics)**: Privilege Escalation, Defense Evasion
4393+
4394+
**Severity**: Medium
4395+
4396+
### Sensitive Data Exposure Detected in Azure Open AI Model Deployment
4397+
4398+
**Description**: The sensitive data leakage alert is designed to notify the SOC that a GenAI model responded to a user prompt with sensitive information, potentially due to a malicious user attempting to bypass the generative AI’s safeguards to access unauthorized sensitive data.
4399+
4400+
**[MITRE tactics](#mitre-attck-tactics)**: Collection
4401+
4402+
**Severity**: Medium
4403+
43704404
## Deprecated Defender for Containers alerts
43714405

43724406
The following lists include the Defender for Containers security alerts which were deprecated.

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Cloud Security Posture Management (CSPM)
3-
description: Learn more about CSPM in Microsoft Defender for Cloud.
4-
ms.topic: conceptual
5-
ms.custom: build-2023
6-
ms.date: 02/28/2024
3+
description: Learn more about Cloud Security Posture Management (CSPM) in Microsoft Defender for Cloud and how it helps improve your security posture.
4+
ms.topic: concept-article
5+
ms.date: 04/15/2024
6+
#customer intent: As a reader, I want to understand the concept of Cloud Security Posture Management (CSPM) in Microsoft Defender for Cloud.
77
---
88

99
# Cloud security posture management (CSPM)
@@ -38,6 +38,7 @@ The following table summarizes each plan and their cloud availability.
3838
| [Workflow automation](workflow-automation.yml) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
3939
| Tools for remediation | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
4040
| Microsoft Cloud Security Benchmark | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
41+
| [AI security posture management](ai-security-posture.md) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
4142
| [Security governance](governance-rules.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
4243
| [Regulatory compliance standards](concept-regulatory-compliance.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
4344
| [Cloud security explorer](how-to-manage-cloud-security-explorer.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |

0 commit comments

Comments
 (0)