Manage compliance and security in Microsoft Foundry
Learn how Microsoft Foundry Control Plane helps you manage compliance, enforce guardrail controls, and integrate security tooling such as Microsoft Defender for Cloud across subscriptions.Items marked (preview) in this article are currently in public preview. This preview is provided without a service-level agreement, and we don’t recommend it for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see Supplemental Terms of Use for Microsoft Azure Previews.
| Tab | Navigation | Outcome |
|---|---|---|
| Policies | Operate > Compliance > Policies | Review guardrail policies, check compliance, and create or edit enforcement rules. |
| Assets | Operate > Compliance > Assets | Inspect individual model deployments, view policy violations, and jump to remediation. |
| Guardrails | Operate > Compliance > Guardrails | Compare guardrail configurations across deployments and spot coverage gaps. |
| Security | Operate > Compliance > Security | Review Defender for Cloud recommendations and manage Microsoft Purview enablement. |
Prerequisites
- An Azure account with an active subscription. If you don’t have one, create a free Azure account, which includes a free trial subscription.
- A Foundry project. If you don’t have one, create a project.
- Any agents that you want to use. Be sure to use the latest agent versions for full support of compliance features.
-
Appropriate permissions based on the tasks that you want to perform:
- To view compliance status and guardrail policies: No special permissions are required beyond project access.
- To create or edit guardrail policies: You must be an Owner or Resource Policy Contributor at the Azure subscription or resource group level. See the overview of Azure Policy.
- To enable Defender for Cloud: You need the Security Admin role or the Owner role for a subscription so that you can turn on Defender plans and agentless protections.
- To configure Microsoft Purview integration: You need the Azure AI Account Owner role.
This capability is available only in the Foundry (new) portal. Look for
in the portal banner to confirm you’re using Foundry (new).
Create, review, and manage guardrail policies
You can use guardrail policies to mandate minimum guardrail controls for your model deployments across a subscription or within a resource group. Guardrail controls include content filtering, abuse monitoring, and other safety measures that help protect your model deployments from generating harmful content or being misused. To learn more about guardrail policies, see Guardrails and controls overview in Microsoft Foundry. Most users don’t have permission to create guardrail policies because they need the appropriate Azure role-based access control (RBAC) roles for Azure Policy. See the overview of Azure Policy. Most users in Foundry can still view the compliance status of individual guardrail policies and model deployments.View and fix compliance violations
Determine whether any model deployments don’t comply with organizational guardrail policies. To assess compliance status and address issues, follow these steps:- Select the Policies tab. Review all applicable guardrail policies within your subscription and project. To expand the scope beyond a single project, adjust the project filter to All projects for an overview of the entire subscription. You can also switch subscriptions.
- Identify any noncompliant guardrail policy by locating policies that have a Violations detected value in the Policy Compliance column.
- Select a guardrail policy. On the information pane that appears, select an asset to compare its guardrail settings with the requirements that the guardrail policy specifies.
- To update the guardrail configuration of a noncompliant asset, select Fix now. This selection opens the model deployment’s guardrail configuration pane, where you can adjust settings to meet the guardrail policy requirements. After you save your changes, the compliance status is updated within a few minutes.
- Select the Assets tab by using the Policy/Assets toggle.
- Review model deployments within the chosen subscription and project.
- Examine any assets marked as Violation detected in the Policy Compliance column. Select these rows to access further details. Assets might appear multiple times if they’re subject to several guardrail policies.
- On the information pane, review the governing guardrail policies and the specifics of any noncompliant guardrail policy.
- Select View in Build to modify the guardrail configuration and bring the model deployment into compliance. Review all relevant guardrail policies for each asset to ensure that you make all necessary adjustments to achieve full compliance.
Create a guardrail policy
- In the compliance workspace, select Create new policy.
- Choose and configure controls, such as content filters, prompt shields, or abuse detection. Select Add control after you configure each control.
- Select Next to set the policy scope. The scope determines which resources the policy applies to. Choose a subscription to apply the policy broadly, or choose a specific resource group for targeted governance.
- Select Next to add exceptions for model deployments or, if the policy is scoped to a subscription, resource groups. You can exclude specific model deployments or resource groups from the policy requirements. Use exceptions for testing environments or legacy deployments that can’t meet new requirements.
- Select Next when you finish adding exceptions.
- Enter a descriptive policy name. This name appears in the compliance dashboard.
- Select Create to finalize your guardrail policy.
- Allow up to 30 minutes for the guardrail policy to appear in the Foundry portal. Compliance results appear after Azure Policy completes its scan. The duration of the scan varies by scope size and resources.
Edit a guardrail policy
- In the compliance workspace, select the Policies tab. Locate and select the guardrail policy that you want to edit.
- On the pane that shows guardrail policy details, select Edit policy.
- Modify the controls, scope, or exceptions as needed.
- Select Save to apply your changes.
- Wait up to 30 minutes for the updated guardrail policy to take effect. Compliance results are updated after Azure Policy reevaluates your resources.
Review guardrails across your subscription
When you monitor your model deployments for compliance, review and compare the guardrail controls for your assets throughout a project or subscription. Even if the controls aren’t directly linked to guardrail policy compliance, this process helps you spot gaps in guardrail policy assignments, like missing controls. You can also uncover potential risks that might go unnoticed, such as subscriptions that lack content filtering entirely. Here’s how you can do this task:- In the compliance workspace, select the Guardrails tab.
- Check that your scope is correct by reviewing and adjusting the subscription and project dropdown lists as needed.
- Examine the configurations across your projects by using column sorting to quickly find problems. For example, you can see which filters are disabled.
-
If you find a problem, choose one of these options:
-
Update individual deployments:
- On the toolbar, select Build.
- In the relevant project, select Guardrails.
- Update existing guardrail settings or add new ones for your model deployments.
-
Create a guardrail policy for enforcement:
- In the compliance workspace, select the Policies tab.
- Create a new guardrail policy to enforce guardrail requirements across all deployments.
-
Update individual deployments:
Set up security recommendations and alerts
Defender for Cloud provides security posture gaps and recommendations for remediation. Your security posture represents the overall security status of your Azure resources, including potential vulnerabilities, misconfigurations, and recommended improvements. Defender assesses your resources and workloads against built-in and custom security standards. To get security posture recommendations from Defender for Cloud, enable it on your Azure subscription. To get threat protection alerts for jailbreak attacks based on risk detection in Foundry for user input attacks, enable threat protection for Foundry Tools. Jailbreak attacks attempt to bypass AI safety measures by using carefully crafted prompts. Foundry detects these attack patterns in user input. To review Defender security recommendations, follow these steps:- In the compliance workspace, select the Security tab.
- Enable Defender for Cloud for your subscription if you need to do so.
- View recommendations in the Microsoft Defender for Cloud section, including the affected resource and the associated risk level. Recommendations might include enabling more security features, fixing misconfigurations, or addressing potential vulnerabilities in your AI deployments.
- Select a recommendation to view details, and select links to take remediation action in the Azure portal.
Enable enterprise-grade data security and compliance for Foundry with Microsoft Purview (preview)
By enabling Microsoft Purview on your Azure subscription, you can access, process, and store prompt and response data from Microsoft Foundry apps and agents. The data includes associated metadata. This integration supports key data security and compliance scenarios, such as:- Microsoft Purview Audit
- Sensitive information type (SIT) classification
- Analytics and reporting through Microsoft Purview Data Security Posture Management (DSPM) for AI
- Microsoft Purview Insider Risk Management
- Microsoft Purview Communication Compliance
- Microsoft Purview Data Lifecycle Management
- Microsoft Purview eDiscovery
- Microsoft Purview Data Security Policies for Foundry Services interactions are supported for API calls that use Microsoft Entra ID authentication with a user-context token, or for API calls that explicitly include user context. To learn more, see AzureUserSecurityContext. For all other authentication scenarios, user interactions captured in Microsoft Purview appear only in Microsoft Purview Audit and AI interactions with classifications within DSPM for the AI activity explorer.
- Microsoft Purview Audit is included as part of the Microsoft Purview license for Foundry services. For setup of data security policies in Microsoft Purview by your enterprise security admins, billing is based on pay-as-you-go meters.
- Integration with Microsoft Purview for the preceding features in Foundry doesn’t yet support network isolation.
- Integration with Microsoft Purview is currently available for calls made through the Microsoft Foundry inference endpoint (aka OpenAI-compatible chat completions API or /chat/completions endpoint). Every model deployed through Foundry’s managed inference stack is covered by Purview.
Enable Microsoft Purview in Foundry
You must have the Azure AI Account Owner role to enable Microsoft Purview integration. To enable Microsoft Purview in Foundry:- On the toolbar, select Operate.
- On the left pane, select Compliance.
- Select the Security posture tab.
- Select the Azure subscription.
- Turn on the Microsoft Purview toggle.
