🚔Cloud Security Baseline for Azure OpenAI

Minimum Security Baseline for Azure OpenAI

1. Identity and Access Management (IAM)

  • Use Azure Active Directory (AAD) Integration

    • Action: Integrate Azure OpenAI with Azure Active Directory (AAD) for centralized identity management.

    • Recommendation: Ensure all users authenticate through AAD and enable single sign-on (SSO) for seamless and secure access.

  • Implement Role-Based Access Control (RBAC)

    • Action: Define and assign roles based on the principle of least privilege.

    • Recommendation: Regularly review and update role assignments. Use built-in roles to manage permissions effectively.

  • Enable Multi-Factor Authentication (MFA)

    • Action: Require MFA for all users accessing Azure OpenAI resources.

    • Recommendation: Enforce MFA through AAD policies to protect against credential theft and unauthorized access.

2. Data Security

  • Encrypt Data at Rest and in Transit

    • Action: Use Azure-managed encryption keys or customer-managed keys to encrypt data.

    • Recommendation: Ensure all data stored and transmitted is encrypted using industry-standard encryption algorithms.

  • Implement Data Masking and Anonymization

    • Action: Apply data masking techniques to protect sensitive data used in training or inference processes.

    • Recommendation: Use Azure Data Masking features to anonymize sensitive information.

  • Use Secure Data Storage Solutions

    • Action: Store data in secure, compliant storage services like Azure Blob Storage with appropriate access controls.

    • Recommendation: Implement access policies and regularly review access permissions to data storage resources.

3. API Security

  • Use API Management Solutions

    • Action: Implement Azure API Management to secure, monitor, and manage access to APIs.

    • Recommendation: Apply rate limiting, throttling, and access controls to API endpoints.

  • Enable API Key Management

    • Action: Use API keys or tokens to authenticate and authorize API requests.

    • Recommendation: Rotate API keys regularly and use secure storage for API keys.

  • Implement Rate Limiting and Throttling

    • Action: Protect APIs from abuse by enforcing rate limits and throttling.

    • Recommendation: Configure appropriate rate limits to prevent denial-of-service attacks.

4. Model Security

  • Secure Model Training and Deployment Environments

    • Action: Ensure that environments where models are trained and deployed are secure and isolated.

    • Recommendation: Use virtual networks and private endpoints to restrict access to model training and deployment environments.

  • Implement Model Versioning and Monitoring

    • Action: Track and monitor model versions and their usage to detect anomalies and unauthorized modifications.

    • Recommendation: Use Azure Machine Learning for model management and versioning.

  • Use Secure Model APIs

    • Action: Ensure that model inference APIs are secured with appropriate authentication and authorization mechanisms.

    • Recommendation: Apply API security best practices and monitor API usage for anomalies.

5. Logging and Monitoring

  • Enable Auditing

    • Action: Track user activities, changes to configurations, and access attempts.

    • Recommendation: Enable Azure OpenAI auditing to monitor and review activities for security and compliance.

  • Integrate with Monitoring Tools

    • Action: Use Azure Monitor, Log Analytics, and Security Center to collect and analyze logs from Azure OpenAI.

    • Recommendation: Set up alerts for suspicious activities and potential security incidents.

6. Compliance and Governance

  • Implement Azure Policy and Blueprints

    • Action: Enforce compliance with organizational and regulatory requirements.

    • Recommendation: Use Azure Policy and Blueprints to govern Azure resources and ensure they adhere to security standards.

  • Regular Security Assessments

    • Action: Conduct regular security assessments and audits to identify and remediate vulnerabilities.

    • Recommendation: Use tools like Microsoft Defender for Cloud to perform security assessments and receive actionable recommendations.

7. Endpoint Security

  • Secure Development Workstations

    • Action: Ensure that all workstations used for accessing Azure OpenAI are secured with antivirus and endpoint protection solutions.

    • Recommendation: Keep all development workstations up-to-date with the latest security patches and updates.

  • Use Secure Network Practices

    • Action: Ensure that network access to Azure OpenAI is secure.

    • Recommendation: Use VPNs and firewalls to protect network traffic and restrict access based on IP address ranges.

8. Backup and Recovery

  • Regular Backups

    • Action: Regularly back up Azure OpenAI configurations and critical data.

    • Recommendation: Use built-in backup options or third-party tools to ensure data can be restored in case of accidental deletion or data loss.

  • Disaster Recovery Plan

    • Action: Develop and test a disaster recovery plan for Azure OpenAI.

    • Recommendation: Ensure that the plan includes steps for restoring configurations and data from backups.

Last updated