Azure AI Implementation Patterns¶
Purpose: Platform-specific guidance for implementing the infrastructure controls on Azure using Azure OpenAI Service and Azure AI Studio as the model hosting platforms.
Status: Reference patterns — adapt to your specific architecture and Azure subscription structure.
Architecture Mapping¶
| Framework Zone | Azure Implementation |
|---|---|
| Zone 1 — Ingress | Azure API Management (APIM) + Azure Front Door + Azure WAF |
| Zone 2 — Runtime | Azure OpenAI Service (inference), Azure AI Content Safety, Azure AI Search (vector read) |
| Zone 3 — Evaluation | Separate Azure OpenAI deployment (Judge) in isolated resource group/subscription |
| Zone 4 — Ingestion | Azure Functions / Azure Data Factory + Azure AI Search (vector write), Azure AI Document Intelligence |
| Zone 5 — Control Plane | Azure Key Vault, Azure Policy, Azure RBAC, Entra ID Privileged Identity Management |
| Zone 6 — Logging | Azure Monitor / Log Analytics, Azure Storage (log archive), Microsoft Sentinel |
Identity & Access (IAM Controls)¶
IAM-01/02: Authentication and Least Privilege¶
- Use Entra ID (Azure AD) for all identities — human and service.
- Azure OpenAI access via Managed Identity — no API key in application code.
- Azure RBAC custom roles:
Cognitive Services OpenAI User(invoke only),Cognitive Services OpenAI Contributor(manage deployments). - Use Entra ID Conditional Access for human access to control plane — MFA, compliant device, trusted location.
IAM-03: Control/Data Plane Separation¶
- Separate Azure subscriptions for control plane and runtime.
- Azure Policy assignments prevent runtime subscriptions from modifying AI service configurations.
- Use Entra ID Privileged Identity Management (PIM) for just-in-time access to control plane roles.
- Azure OpenAI model deployment changes require PIM elevation — not available via runtime identity.
IAM-04/05: Agent Tool Constraints¶
- Azure AI Agent Service supports function definitions — each function is a declared tool.
- Use Azure Functions with per-function Managed Identity scoped to specific backend APIs.
- Implement approval routing via Azure Logic Apps with human approval connector or Power Automate approval flow.
- APIM policies validate tool invocation requests at gateway layer.
IAM-06: Session-Scoped Credentials¶
- Use Entra ID workload identity federation for session-bound token issuance.
- Token lifetime configured via token lifetime policies in Entra ID.
- Managed Identity credential rotation handled automatically by Azure.
Logging & Observability (LOG Controls)¶
LOG-01: Model I/O Logging¶
- Enable Azure OpenAI diagnostic logging to Log Analytics workspace.
- Capture:
RequestResponselog category for full prompt/completion logging. - Important: Azure OpenAI can log prompts and completions — enable only with PII handling in place.
- Use Azure Monitor data collection rules to route logs to appropriate destinations.
LOG-02/03: Guardrail and Judge Logging¶
- Azure AI Content Safety API returns category scores and severity — log these with the request.
- Custom guardrail logic via APIM policies — log policy evaluation results.
- Judge invocations logged as separate Azure OpenAI calls to a distinct deployment.
LOG-04: Agent Decision Chains¶
- Azure AI Agent Service supports trace capture for agent reasoning chains.
- Log agent steps (thought, action, observation) to Log Analytics with correlation IDs.
- Use Application Insights distributed tracing for end-to-end agent chain visibility.
LOG-05/06: Drift and Injection Detection¶
- Azure Monitor alerts with dynamic thresholds for baseline deviation.
- Log Analytics KQL queries for prompt injection pattern detection.
- Microsoft Sentinel analytics rules for AI-specific detection logic.
- Custom workbooks in Azure Monitor for AI security dashboards.
LOG-10: SIEM Integration¶
- Microsoft Sentinel as native SIEM — direct ingestion from Log Analytics.
- For third-party SIEM: use Azure Event Hubs export from Log Analytics.
- Sentinel custom analytics rules for AI incident detection (IR-02 triggers).
Network & Segmentation (NET Controls)¶
NET-01: Network Zones¶
- Use Azure Virtual Networks (VNets) with Network Security Groups (NSGs) for zone segmentation.
- Azure OpenAI access via Private Endpoints — no public internet exposure.
- VNet service endpoints or Private Link for Azure AI Search access.
- Separate VNets for runtime and ingestion with VNet peering only where required (vector store replication).
NET-02: Guardrail Bypass Prevention¶
- Azure OpenAI content filtering is enabled by default on all deployments.
- For custom guardrails: implement in APIM policies — all requests route through APIM.
- NSG rules ensure Azure OpenAI private endpoint is only reachable from the APIM subnet.
- Azure Policy to deny Azure OpenAI deployments without content filtering.
NET-03: Judge Isolation¶
- Judge Azure OpenAI deployment in a separate resource group with separate VNet.
- Communication via Private Endpoint from runtime VNet to Judge VNet (one-way).
- Alternatively, async evaluation via Azure Service Bus queue — runtime pushes evaluation data, Judge pulls.
NET-04: Agent Egress Controls¶
- Agent compute runs in VNet-integrated Azure Functions (Premium plan).
- No default internet access — outbound via Azure Firewall with FQDN-based rules.
- Azure Firewall application rules implement the egress destination allowlist.
- NSG flow logs captured for cross-zone traffic monitoring (NET-08).
Data Protection (DAT Controls)¶
DAT-03: PII Detection¶
- Azure AI Content Safety for text moderation and category detection.
- Azure AI Language PII detection endpoint for NER-based PII identification.
- APIM policies can invoke PII detection as a pre/post-processing step on every request.
- Custom regex in APIM policy fragments for domain-specific PII.
DAT-04: Access-Controlled RAG¶
- Azure AI Search supports security filters on search queries.
- Implement document-level access by adding security metadata fields at index time.
- Use OData
$filteron search queries to restrict results to user's access level. - Entra ID group membership maps to document classification metadata.
DAT-05: Encryption¶
- Azure OpenAI data encrypted at rest with Microsoft-managed keys (default) or customer-managed keys (CMK) for Tier 3+.
- Azure AI Search supports CMK encryption for indexes.
- All Azure service communication over TLS 1.2.
- Azure Storage encryption with CMK for log archives.
Secrets & Credentials (SEC Controls)¶
SEC-01/03: Vault and Context Isolation¶
- Azure Key Vault for all AI system secrets.
- Access via Managed Identity — no credentials in application code or configuration.
- Key Vault access policies or RBAC restrict which identities can read which secrets.
- Key Vault diagnostics log all secret access for auditing.
SEC-04: Credential Scanning¶
- Microsoft Defender for Cloud detects exposed secrets in code and configuration.
- Azure DevOps credential scanner in CI/CD pipelines.
- Custom APIM policies detect credential patterns in model I/O.
Incident Response (IR Controls)¶
IR-04: Rollback¶
- Azure OpenAI deployments are versioned — rollback by repointing to previous model version.
- APIM policy revisions — rollback guardrail policies to previous revision.
- Azure AI Search index aliases — point to previous known-good index.
- Azure DevOps pipelines with approval gates for all AI component deployments.
Azure-Specific Considerations¶
| Consideration | Guidance |
|---|---|
| Content filtering | Azure OpenAI has mandatory content filtering that can be modified via Azure AI Content Safety. Understand the default filters and supplement with custom rules. |
| Responsible AI | Azure requires Responsible AI use case approval for certain model capabilities. Factor this into SUP-02 model risk assessment. |
| Data residency | Azure OpenAI processes data in the region of deployment. Azure AI Content Safety may process in different regions — verify data residency requirements. |
| Provisioned throughput | For consistent performance, use provisioned throughput units (PTUs) — avoids token-based throttling that could affect guardrail latency. |
| Entra ID integration | Leverage Entra ID deeply — Conditional Access, PIM, and workload identity provide strong IAM-01 through IAM-06 implementation. |
AI Runtime Behaviour Security, 2026 (Jonathan Gill).