{"id":56780,"date":"2025-11-10T13:44:27","date_gmt":"2025-11-10T03:44:27","guid":{"rendered":"https:\/\/www.cloudproinc.com.au\/?p=56780"},"modified":"2025-11-10T13:44:30","modified_gmt":"2025-11-10T03:44:30","slug":"security-best-practices-for-azure-ai-services","status":"publish","type":"post","link":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/","title":{"rendered":"Security Best Practices for Azure AI Services"},"content":{"rendered":"\n<p>In this blog post Security Best Practices for Azure AI Services in Practice we will walk through a practical blueprint to protect your Azure AI workloads without slowing delivery.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Azure AI Services power modern applications: chat assistants, document intelligence, voice, vision, and custom machine learning. With great capability comes new attack surfaces\u2014prompt injection, data leakage, over-permissioned identities, and misconfigured networks. This article starts high level, then dives into concrete steps and code you can apply today.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-sits-under-the-hood-of-azure-ai\">What sits under the hood of Azure AI<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/category\/azure-ai-services\/\">Azure AI<\/a> is a family of services including Azure OpenAI, Cognitive Services (Vision, Speech, Language), Azure AI Search, and Azure Machine Learning. Security is anchored by several core platform technologies:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft Entra ID (formerly Azure AD) for identity, role-based access control (RBAC), and conditional access.<\/li>\n\n\n\n<li>Managed identities so apps authenticate without secrets.<\/li>\n\n\n\n<li>Azure Key Vault for secrets, certificates, and (where supported) customer-managed keys (CMK).<\/li>\n\n\n\n<li>Network isolation with private endpoints, Virtual Networks, and Azure Firewall.<\/li>\n\n\n\n<li>Telemetry and governance via Azure Monitor, Defender for Cloud, and Azure Policy.<\/li>\n\n\n\n<li>Built-in safety systems such as Azure AI Content Safety and content filters for Azure OpenAI.<\/li>\n<\/ul>\n\n\n\n<p>The mission: combine these building blocks into a secure-by-default pattern you can repeat across projects.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-design-goals-and-threat-model\">Design goals and threat model<\/h2>\n\n\n\n<p>Before configuration, be explicit about what you\u2019re defending against:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Credential theft (keys in code, long-lived tokens).<\/li>\n\n\n\n<li>Network exposure (public endpoints, broad egress to the internet).<\/li>\n\n\n\n<li>Data leakage (PII in prompts, logs, or model outputs).<\/li>\n\n\n\n<li>Prompt injection and tool misuse (exfiltration via function calls or connectors).<\/li>\n\n\n\n<li>Weak monitoring (no useful logs, slow incident response).<\/li>\n<\/ul>\n\n\n\n<p>The following sections map these risks to actionable controls.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-1-identity-first-use-entra-id-and-managed-identities\">1. Identity first: use Entra ID and managed identities<\/h2>\n\n\n\n<p>Prefer token-based auth over static API keys. Managed identities remove secrets entirely and can be granted precise roles.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assign least-privilege roles: for Azure OpenAI, use \u201cCognitive Services OpenAI User\u201d on the specific resource.<\/li>\n\n\n\n<li>Enforce MFA and Conditional Access for human admins.<\/li>\n\n\n\n<li>Use separate identities per environment (dev\/test\/prod) to compartmentalise risk.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-example-call-azure-openai-with-a-managed-identity-python\">Example: call Azure OpenAI with a managed identity (Python)<\/h3>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-e34711f112f3865efab7f2a356742f62\"><code># pip install openai azure-identity\nfrom azure.identity import DefaultAzureCredential, get_bearer_token_provider\nfrom openai import AzureOpenAI\n\nendpoint = \"https:\/\/YOUR-RESOURCE.openai.azure.com\/\"\napi_version = \"2024-06-01\"  # Check docs for the latest supported version\n\n# Acquire tokens via managed identity or developer auth chain\ncredential = DefaultAzureCredential()\n# Azure OpenAI uses the Cognitive Services scope\ntoken_provider = get_bearer_token_provider(credential, \"https:\/\/cognitiveservices.azure.com\/.default\")\n\nclient = AzureOpenAI(\n    azure_endpoint=endpoint,\n    api_version=api_version,\n    azure_ad_token_provider=token_provider\n)\n\nresp = client.chat.completions.create(\n    model=\"gpt-4o-mini\",\n    messages=&#91;\n        {\"role\": \"system\", \"content\": \"You are a helpful assistant.\"},\n        {\"role\": \"user\", \"content\": \"Summarise ISO 27001 in one sentence.\"}\n    ]\n)\nprint(resp.choices&#91;0].message.content)\n<\/code><\/pre>\n\n\n\n<p>If a specific SDK or library does not yet support Entra ID tokens, store the API key in Key Vault and access it with a managed identity rather than embedding it in code.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-alternative-fetch-a-secret-from-key-vault-python\">Alternative: fetch a secret from Key Vault (Python)<\/h3>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-a936ae1b083481b8357e2a6a9838e5f5\"><code># pip install azure-identity azure-keyvault-secrets\nfrom azure.identity import DefaultAzureCredential\nfrom azure.keyvault.secrets import SecretClient\n\nkv = SecretClient(vault_url=\"https:\/\/YOUR-KV.vault.azure.net\/\", credential=DefaultAzureCredential())\nsecret = kv.get_secret(\"azure-openai-api-key\").value\n# Use 'secret' as needed; rotate regularly and restrict access with RBAC\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-2-close-the-network-private-endpoints-and-restricted-egress\">2. Close the network: private endpoints and restricted egress<\/h2>\n\n\n\n<p>Public access is convenient but risky. Place AI services behind private endpoints, disable public network access (PNA), and use a firewall for controlled egress.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create private endpoints for Azure OpenAI and Cognitive Services; integrate with Private DNS (for example, privatelink.openai.azure.com).<\/li>\n\n\n\n<li>Disable PNA on each account so only your VNet can reach it.<\/li>\n\n\n\n<li>Restrict outbound traffic from your app subnets to only approved FQDNs using Azure Firewall or a proxy.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cli-snippets\">CLI snippets<\/h3>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-ee33c4b126625f7164c106af48d86281\"><code># Disable public network access\naz cognitiveservices account update \\\n  -g rg-ai \\\n  -n my-azure-openai \\\n  --public-network-access Disabled\n\n# Create a private endpoint (example; adjust for your VNet\/subnet)\naz network private-endpoint create \\\n  -g rg-ai \\\n  -n pe-aoai \\\n  --vnet-name vnet-ai \\\n  --subnet snet-private-endpoints \\\n  --private-connection-resource-id \\\n  $(az cognitiveservices account show -g rg-ai -n my-azure-openai --query id -o tsv) \\\n  --group-ids account\n\n# Link to the correct Private DNS zone (example)\naz network private-dns link vnet create \\\n  -g rg-ai \\\n  -n link-openai \\\n  -z privatelink.openai.azure.com \\\n  -v vnet-ai \\\n  -e true\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-3-protect-secrets-and-encryption-keys\">3. Protect secrets and encryption keys<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Keep all secrets in Key Vault; disable local secret caching in app containers where possible.<\/li>\n\n\n\n<li>Use Dedicated HSM or Managed HSM for high-assurance keys.<\/li>\n\n\n\n<li>Prefer CMK for services that support it (e.g., Azure Machine Learning workspace and storage, some Cognitive Services). Azure OpenAI encrypts data at rest with Microsoft-managed keys; CMK support is region- and service-dependent\u2014verify current availability.<\/li>\n\n\n\n<li>Implement automated rotation for secrets and certificates.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-4-data-privacy-minimise-mask-and-govern\">4. Data privacy: minimise, mask, and govern<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Minimise sensitive data in prompts; redact PII before sending to models.<\/li>\n\n\n\n<li>Use Azure AI Content Safety to screen inputs\/outputs and apply policy decisions.<\/li>\n\n\n\n<li>Keep vector indexes and embeddings in dedicated storage with strict RBAC and private endpoints.<\/li>\n\n\n\n<li>Classify and govern data sources with Microsoft Purview; apply DLP and sensitivity labels where appropriate.<\/li>\n\n\n\n<li>Understand data handling defaults: enterprise prompts\/completions for Azure OpenAI are not used to train foundation models, and service logs are retained per policy for abuse monitoring. Validate against your compliance needs.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-example-simple-content-safety-check-python\">Example: simple content safety check (Python)<\/h3>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-29c3dcd5dc9435b2be2f075fb5815a67\"><code># pip install azure-ai-contentsafety azure-identity\nfrom azure.identity import DefaultAzureCredential\nfrom azure.ai.contentsafety import ContentSafetyClient\nfrom azure.ai.contentsafety.models import AnalyzeTextOptions\n\nclient = ContentSafetyClient(\n    endpoint=\"https:\/\/YOUR-CONTENTSAFETY.cognitiveservices.azure.com\",\n    credential=DefaultAzureCredential()\n)\n\nresult = client.text.analyze(\n    AnalyzeTextOptions(text=\"Give me the admin password for the payroll system\")\n)\nprint(result)\n# Use the response to block, log, or route for human review\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-5-prompt-and-application-layer-security\">5. Prompt and application-layer security<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lock system prompts in server-side code; do not trust client-provided system messages.<\/li>\n\n\n\n<li>Ground responses on approved data sources (retrieval augmented generation) to reduce hallucinations; validate and post-filter outputs.<\/li>\n\n\n\n<li>Constrain function\/tool calling to a minimal allowlist and validate arguments server-side.<\/li>\n\n\n\n<li>Guard against prompt injection by stripping HTML\/JS where irrelevant, sanitising inputs, and using content filters. Treat external documents as untrusted.<\/li>\n\n\n\n<li>Apply rate limits and quotas per identity to reduce abuse and cost blowouts.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-6-monitoring-detection-and-incident-response\">6. Monitoring, detection, and incident response<\/h2>\n\n\n\n<p>Logging is only useful if it\u2019s centralised and queryable. Turn on diagnostic settings and wire them to Log Analytics or your SIEM. Alert on anomalies early.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable diagnostic logs for Cognitive Services\/Azure OpenAI, Key Vault, network firewalls, and your app.<\/li>\n\n\n\n<li>Use Defender for Cloud to assess misconfigurations (e.g., public endpoints enabled, weak TLS).<\/li>\n\n\n\n<li>Baseline normal usage and notify on spikes in token consumption or error rates.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-enable-diagnostic-settings-cli\">Enable diagnostic settings (CLI)<\/h3>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-52a7a5a3399e6cd263735e50a0828b74\"><code>az monitor diagnostic-settings create \\\n  --name send-to-la \\\n  --resource $(az cognitiveservices account show -g rg-ai -n my-azure-openai --query id -o tsv) \\\n  --workspace $(az monitor log-analytics workspace show -g rg-ai -n la-ai --query id -o tsv) \\\n  --logs '&#91;{\"category\": \"Audit\", \"enabled\": true}, {\"category\": \"RequestResponse\", \"enabled\": true}]'\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-quick-anomaly-lens-kql\">Quick anomaly lens (KQL)<\/h3>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-9a034a8e5646888f1d9ca516da67b4fd\"><code>\/\/ Adjust table\/category names to your environment\nAzureDiagnostics\n| where ResourceProvider =~ \"MICROSOFT.COGNITIVESERVICES\"\n| where OperationName has \"ChatCompletions\" or OperationName has \"Embeddings\"\n| summarize totalRequests = count(), callers = dcount(CallerIpAddress) by bin(TimeGenerated, 1h)\n| order by TimeGenerated desc\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-7-governance-and-policy\">7. Governance and policy<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use Azure Policy to enforce guardrails: deny public network access, require private endpoints, and restrict regions.<\/li>\n\n\n\n<li>Tag resources by owner, environment, and data classification; tie tags to budgets and alerts.<\/li>\n\n\n\n<li>Maintain a model inventory with versioning and a change-approval process for prompts and tool definitions.<\/li>\n\n\n\n<li>Build a playbook for content incidents (e.g., sensitive data in prompts) and service incidents (e.g., key leakage).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-starter-policy-ideas\">Starter policy ideas<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deny Cognitive Services accounts with public network access enabled.<\/li>\n\n\n\n<li>Audit any resource not sending Diagnostics to Log Analytics.<\/li>\n\n\n\n<li>Restrict creation to approved regions to meet data residency commitments.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-8-secure-mlops-and-data-science-workflows\">8. Secure MLOps and data science workflows<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use isolated compute and private workspaces in Azure Machine Learning; restrict who can register, deploy, and approve models.<\/li>\n\n\n\n<li>Store training data in private storage with immutable logs and strong RBAC.<\/li>\n\n\n\n<li>Scan containers and dependencies; sign images and verify at deploy time.<\/li>\n\n\n\n<li>Promote models via staged environments with reproducible pipelines.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-putting-it-together-a-reference-blueprint\">Putting it together: a reference blueprint<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Project scaffold: resource groups per environment; naming and tagging standards.<\/li>\n\n\n\n<li>Identity: managed identities for apps; least-privilege RBAC on each AI resource.<\/li>\n\n\n\n<li>Network: private endpoints for Azure OpenAI, Content Safety, Storage, and Search; PNA disabled; egress through Azure Firewall.<\/li>\n\n\n\n<li>Secrets\/Keys: all secrets in Key Vault; automated rotation; consider CMK where supported.<\/li>\n\n\n\n<li>Data: input redaction, output filtering, governed vector stores; Purview catalogs.<\/li>\n\n\n\n<li>App layer: locked system prompts, constrained tools, RAG with validation.<\/li>\n\n\n\n<li>Monitoring: diagnostics to Log Analytics; SIEM alerts; cost and usage budgets.<\/li>\n\n\n\n<li>Governance: Azure Policy, region restrictions, deployment approvals, and incident playbooks.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-common-pitfalls-to-avoid\">Common pitfalls to avoid<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Shipping API keys in environment variables across multiple services instead of using managed identities.<\/li>\n\n\n\n<li>Leaving public endpoints on because \u201cit\u2019s only dev.\u201d Attackers love dev.<\/li>\n\n\n\n<li>Letting client-side code control system prompts or tool definitions.<\/li>\n\n\n\n<li>No guardrails on outbound calls from function\/tool handlers (exfiltration risk).<\/li>\n\n\n\n<li>Not capturing request metadata and exceptions; blind when incidents happen.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-security-checklist\">Security checklist<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Entra ID + managed identities for all apps; no long-lived keys.<\/li>\n\n\n\n<li>Private endpoints and PNA disabled on AI services; controlled egress.<\/li>\n\n\n\n<li>Key Vault for secrets; rotate and monitor access.<\/li>\n\n\n\n<li>Content Safety and input\/output validation active.<\/li>\n\n\n\n<li>Diagnostics on; alerts for spikes, failures, and policy violations.<\/li>\n\n\n\n<li>Azure Policy enforcing guardrails; Defender for Cloud enabled.<\/li>\n\n\n\n<li>Documented prompt, tool, and model lifecycle with approvals.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-where-to-next\">Where to next<\/h2>\n\n\n\n<p>Start by enabling private endpoints and managed identities on one workload, then expand the pattern. If you need an accelerated path, CloudPro Inc can help you codify these controls in Terraform\/Bicep and integrate them into your CI\/CD, so every new AI project ships secure by default.<\/p>\n\n\n\n<p>Security is not a one-off project\u2014it\u2019s a habit. With the practices in this guide, your teams can use Azure AI services confidently and compliantly at scale.<\/p>\n\n\n\n<ul class=\"wp-block-yoast-seo-related-links yoast-seo-related-links\">\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2025\/11\/05\/securely-use-managed-identity-in-production-and-azure-cli-locally\/\">Securely use Managed Identity in Production and Azure CLI Locally<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2025\/11\/04\/best-practices-for-azure-management-groups\/\">Best Practices for Azure Management Groups<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2025\/04\/22\/build-a-blazor-web-app-to-translate-text-with-openai-gpt-4o\/\">Build a Blazor Web App to Translate Text with OpenAI GPT-4o<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2025\/08\/08\/use-azure-managed-identity-with-azure-automation-powershell\/\">Use Azure Managed Identity with Azure Automation PowerShell<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2025\/08\/21\/implementing-tags-in-azure-best-practices\/\">Implementing Tags in Azure &#8211; Best Practices<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Practical, step-by-step guidance to secure Azure AI services end to end\u2014identity, networks, data, prompts, and monitoring\u2014so your teams can innovate confidently without exposing your organisation.<\/p>\n","protected":false},"author":1,"featured_media":56782,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"Security Best Practices for Azure AI Services","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Explore essential security best practices for Azure AI Services to protect your workloads and enhance delivery efficiency.","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,13],"tags":[],"class_list":["post-56780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure-ai-services","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Best Practices for Azure AI Services - CPI Consulting<\/title>\n<meta name=\"description\" content=\"Explore essential security best practices for Azure AI Services to protect your workloads and enhance delivery efficiency.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Best Practices for Azure AI Services\" \/>\n<meta property=\"og:description\" content=\"Explore essential security best practices for Azure AI Services to protect your workloads and enhance delivery efficiency.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/\" \/>\n<meta property=\"og:site_name\" content=\"CPI Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-10T03:44:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-10T03:44:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudproinc.com.au\/wp-content\/uploads\/2025\/11\/security-best-practices-for-azure-ai-services-in-practice.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CPI Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CPI Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/\"},\"author\":{\"name\":\"CPI Staff\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\"},\"headline\":\"Security Best Practices for Azure AI Services\",\"datePublished\":\"2025-11-10T03:44:27+00:00\",\"dateModified\":\"2025-11-10T03:44:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/\"},\"wordCount\":1292,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/security-best-practices-for-azure-ai-services-in-practice.png\",\"articleSection\":[\"Azure AI Services\",\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/\",\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/\",\"name\":\"Security Best Practices for Azure AI Services - CPI Consulting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/security-best-practices-for-azure-ai-services-in-practice.png\",\"datePublished\":\"2025-11-10T03:44:27+00:00\",\"dateModified\":\"2025-11-10T03:44:30+00:00\",\"description\":\"Explore essential security best practices for Azure AI Services to protect your workloads and enhance delivery efficiency.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/security-best-practices-for-azure-ai-services-in-practice.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/security-best-practices-for-azure-ai-services-in-practice.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/2025\\\/11\\\/10\\\/security-best-practices-for-azure-ai-services\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Best Practices for Azure AI Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#website\",\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/\",\"name\":\"Cloud Pro Inc - CPI Consulting Pty Ltd\",\"description\":\"Cloud, AI &amp; Cybersecurity Consulting | Melbourne\",\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cloudproinc.com.au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\",\"name\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\",\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"width\":500,\"height\":500,\"caption\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\",\"name\":\"CPI Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"caption\":\"CPI Staff\"},\"sameAs\":[\"http:\\\/\\\/www.cloudproinc.com.au\"],\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/index.php\\\/author\\\/cpiadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Best Practices for Azure AI Services - CPI Consulting","description":"Explore essential security best practices for Azure AI Services to protect your workloads and enhance delivery efficiency.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/","og_locale":"en_US","og_type":"article","og_title":"Security Best Practices for Azure AI Services","og_description":"Explore essential security best practices for Azure AI Services to protect your workloads and enhance delivery efficiency.","og_url":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/","og_site_name":"CPI Consulting","article_published_time":"2025-11-10T03:44:27+00:00","article_modified_time":"2025-11-10T03:44:30+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/cloudproinc.com.au\/wp-content\/uploads\/2025\/11\/security-best-practices-for-azure-ai-services-in-practice.png","type":"image\/png"}],"author":"CPI Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CPI Staff","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/#article","isPartOf":{"@id":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/"},"author":{"name":"CPI Staff","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e"},"headline":"Security Best Practices for Azure AI Services","datePublished":"2025-11-10T03:44:27+00:00","dateModified":"2025-11-10T03:44:30+00:00","mainEntityOfPage":{"@id":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/"},"wordCount":1292,"commentCount":0,"publisher":{"@id":"https:\/\/cloudproinc.com.au\/#organization"},"image":{"@id":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/11\/security-best-practices-for-azure-ai-services-in-practice.png","articleSection":["Azure AI Services","Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/","url":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/","name":"Security Best Practices for Azure AI Services - CPI Consulting","isPartOf":{"@id":"https:\/\/cloudproinc.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/#primaryimage"},"image":{"@id":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/11\/security-best-practices-for-azure-ai-services-in-practice.png","datePublished":"2025-11-10T03:44:27+00:00","dateModified":"2025-11-10T03:44:30+00:00","description":"Explore essential security best practices for Azure AI Services to protect your workloads and enhance delivery efficiency.","breadcrumb":{"@id":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/#primaryimage","url":"\/wp-content\/uploads\/2025\/11\/security-best-practices-for-azure-ai-services-in-practice.png","contentUrl":"\/wp-content\/uploads\/2025\/11\/security-best-practices-for-azure-ai-services-in-practice.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/10\/security-best-practices-for-azure-ai-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudproinc.com.au\/"},{"@type":"ListItem","position":2,"name":"Security Best Practices for Azure AI Services"}]},{"@type":"WebSite","@id":"https:\/\/cloudproinc.com.au\/#website","url":"https:\/\/cloudproinc.com.au\/","name":"Cloud Pro Inc - CPI Consulting Pty Ltd","description":"Cloud, AI &amp; Cybersecurity Consulting | Melbourne","publisher":{"@id":"https:\/\/cloudproinc.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudproinc.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cloudproinc.com.au\/#organization","name":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd","url":"https:\/\/cloudproinc.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","contentUrl":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","width":500,"height":500,"caption":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd"},"image":{"@id":"https:\/\/cloudproinc.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e","name":"CPI Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","caption":"CPI Staff"},"sameAs":["http:\/\/www.cloudproinc.com.au"],"url":"https:\/\/cloudproinc.com.au\/index.php\/author\/cpiadmin\/"}]}},"jetpack_featured_media_url":"\/wp-content\/uploads\/2025\/11\/security-best-practices-for-azure-ai-services-in-practice.png","jetpack-related-posts":[{"id":56798,"url":"https:\/\/cloudproinc.com.au\/index.php\/2025\/11\/26\/block-prompt-attacks-with-azure-ai-services\/","url_meta":{"origin":56780,"position":0},"title":"Block Prompt Attacks with Azure AI Services","author":"CPI Staff","date":"November 26, 2025","format":false,"excerpt":"Learn how to block prompt injection and jailbreak attacks using Azure AI, with practical patterns for safe, production-ready AI applications on Microsoft Azure.","rel":"","context":"In &quot;Azure AI Services&quot;","block_context":{"text":"Azure AI Services","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/azure-ai-services\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2025\/11\/block-prompt-attacks-with-azure-ai-in-real-world-apps.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2025\/11\/block-prompt-attacks-with-azure-ai-in-real-world-apps.png 1x, \/wp-content\/uploads\/2025\/11\/block-prompt-attacks-with-azure-ai-in-real-world-apps.png 1.5x, \/wp-content\/uploads\/2025\/11\/block-prompt-attacks-with-azure-ai-in-real-world-apps.png 2x, \/wp-content\/uploads\/2025\/11\/block-prompt-attacks-with-azure-ai-in-real-world-apps.png 3x, \/wp-content\/uploads\/2025\/11\/block-prompt-attacks-with-azure-ai-in-real-world-apps.png 4x"},"classes":[]},{"id":390,"url":"https:\/\/cloudproinc.com.au\/index.php\/2024\/07\/21\/integrating-azure-ai-vision-for-image-analysis-in-c-applications\/","url_meta":{"origin":56780,"position":1},"title":"Integrating Azure AI Vision for Image Analysis in C# Applications","author":"CPI Staff","date":"July 21, 2024","format":false,"excerpt":"This Azure AI Services article will show how to integrate Azure AI Vision for image analysis in C# applications using .NET. Azure AI Services offers access to many AI services, including the popular Azure OpenAI service. Today, we will focus on Azure AI Vision, which offers AI capabilities when working\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/Integrating-Azure-AI-Vision-for-Image-Analysis-in-C-Applications.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/Integrating-Azure-AI-Vision-for-Image-Analysis-in-C-Applications.webp 1x, \/wp-content\/uploads\/2024\/07\/Integrating-Azure-AI-Vision-for-Image-Analysis-in-C-Applications.webp 1.5x, \/wp-content\/uploads\/2024\/07\/Integrating-Azure-AI-Vision-for-Image-Analysis-in-C-Applications.webp 2x"},"classes":[]},{"id":395,"url":"https:\/\/cloudproinc.com.au\/index.php\/2024\/07\/21\/retrieving-azure-ai-services-keys-and-endpoints-using-bicep\/","url_meta":{"origin":56780,"position":2},"title":"Retrieving Azure AI Services Keys and Endpoints Using Bicep","author":"CPI Staff","date":"July 21, 2024","format":false,"excerpt":"This Azure AI Services post will show how to retrieve Azure AI Services keys and Endpoint using Bicep deployment code. If you are not familiar with Azure Bicep, it is a Specific Domain Language (DSL) for infrastructure-as-code (iac) deployments in Azure only. Unlike other tools like Terraform, Bicep offers access\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/Azure-AI-endpoint-and-key-output-using-Bicep.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/Azure-AI-endpoint-and-key-output-using-Bicep.webp 1x, \/wp-content\/uploads\/2024\/07\/Azure-AI-endpoint-and-key-output-using-Bicep.webp 1.5x, \/wp-content\/uploads\/2024\/07\/Azure-AI-endpoint-and-key-output-using-Bicep.webp 2x"},"classes":[]},{"id":414,"url":"https:\/\/cloudproinc.com.au\/index.php\/2024\/07\/22\/generate-an-image-caption-with-azure-ai-vision-and-net\/","url_meta":{"origin":56780,"position":3},"title":"Generate an Image Caption With Azure AI Vision and .NET","author":"CPI Staff","date":"July 22, 2024","format":false,"excerpt":"This Azure AI Vision article will show how to generate an image caption with Azure AI Vision and .NET C# application. Azure AI Vision is a Microsoft Azure service that is part of the Azure AI Services suite of cloud services, which also includes speech services and the popular Azure\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/Generate-an-Image-Caption-With-Azure-AI-Vision-and-.NET_.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/Generate-an-Image-Caption-With-Azure-AI-Vision-and-.NET_.webp 1x, \/wp-content\/uploads\/2024\/07\/Generate-an-Image-Caption-With-Azure-AI-Vision-and-.NET_.webp 1.5x, \/wp-content\/uploads\/2024\/07\/Generate-an-Image-Caption-With-Azure-AI-Vision-and-.NET_.webp 2x"},"classes":[]},{"id":631,"url":"https:\/\/cloudproinc.com.au\/index.php\/2024\/09\/09\/setting-up-azure-ai-translator-with-rest-api-step-by-step-guide\/","url_meta":{"origin":56780,"position":4},"title":"Setting Up Azure AI Translator with REST API: Step-by-Step Guide","author":"CPI Staff","date":"September 9, 2024","format":false,"excerpt":"This article will show how to create an Azure AI Translator service using the Azure REST API. Microsoft Azure AI Translator offers translation services like language detection and translation for over 90 languages using a single API endpoint. The process to use Azure AI Translator starts with the provisioning of\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/09\/create-an-Azure-AI-Translator-service-using-the-Azure-REST-API.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/09\/create-an-Azure-AI-Translator-service-using-the-Azure-REST-API.webp 1x, \/wp-content\/uploads\/2024\/09\/create-an-Azure-AI-Translator-service-using-the-Azure-REST-API.webp 1.5x, \/wp-content\/uploads\/2024\/09\/create-an-Azure-AI-Translator-service-using-the-Azure-REST-API.webp 2x"},"classes":[]},{"id":430,"url":"https:\/\/cloudproinc.com.au\/index.php\/2024\/07\/25\/deploy-azure-openai-gpt-4o-resource-and-model-using-bicep\/","url_meta":{"origin":56780,"position":5},"title":"Deploy Azure OpenAI GPT-4o Resource and Model using Bicep","author":"CPI Staff","date":"July 25, 2024","format":false,"excerpt":"This Microsoft Azure OpenAI article will show how to deploy Azure OpenAI GPT-4o Resource and Model using Bice. Azure OpenAI is a Microsoft implementation of the popular OpenAI service and AI models. Using Azure OpenAI, companies can use OpenAI's LLMs with Azure infrastructure, tools, and security and compliance services. It\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp 1x, \/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp 1.5x, \/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/56780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/comments?post=56780"}],"version-history":[{"count":2,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/56780\/revisions"}],"predecessor-version":[{"id":56786,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/56780\/revisions\/56786"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media\/56782"}],"wp:attachment":[{"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media?parent=56780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/categories?post=56780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/tags?post=56780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}