주요 콘텐츠로 건너뛰기

Configure Privileged Roles to Manage AI

Implementation Effort: Medium – Requires identifying the right roles across Entra, Defender, and Purview, assigning them through Privileged Identity Management, and validating least-privilege access for each AI management responsibility.
User Impact: Low – Role assignments affect administrators and security operators, not end users.

Overview

AI workloads introduce new management responsibilities that do not map cleanly to traditional IT administration. Managing agents, governing AI models, assessing AI-specific risks, and operating the Security Dashboard for AI each require distinct privileged roles that most organizations have never assigned. Without deliberate role planning, organizations default to Global Administrator access for AI management—violating the Zero Trust principle of Use Least Privilege Access and concentrating excessive privilege in a small number of accounts.

This task is about identifying the new responsibilities AI introduces—policy definition, agent lifecycle management, risk assessment, remediation, and compliance oversight—and mapping each to the appropriate Microsoft Entra built-in role. The goal is not just dashboard access; it is ensuring the right people can perform the right AI management actions across the entire Microsoft security stack with the minimum privilege required.

Why this matters

AI workloads expand the security perimeter in ways that touch identity, data protection, threat detection, and compliance simultaneously. A single Copilot Studio agent can interact with enterprise data, invoke external APIs, and act with delegated user permissions. Governing these workloads requires coordinated administration across Microsoft Entra, Microsoft Defender, and Microsoft Purview—each with its own role model. If roles are not explicitly assigned, AI governance falls to whoever already has broad access, creating accountability gaps and audit blind spots.

New responsibilities introduced by AI

ResponsibilityDescriptionPrimary Entra role(s)
AI security posture assessment and risk triageAccess the Security Dashboard for AI to review AI risk posture, inventory, and recommendations; triage and delegate findings across Entra, Defender, and Purview. Note: AI Administrator and Compliance Administrator have partial visibility—neither can see misconfigurations and attack paths, and AI Administrator cannot view AI models, MCP servers, or cloud security riskSecurity Administrator, Global Reader (full visibility); AI Administrator, Compliance Administrator (partial)
AI service and Copilot managementManage Microsoft 365 Copilot settings, approve copilot agents, manage AI-related enterprise servicesAI Administrator
Agent identity lifecycleCreate, manage, disable, and delete agent blueprints, agent service principals, agent identities, and agentic usersAgent ID Administrator
Agent development registrationCreate agent blueprints and service principals during development (added as owner)Agent ID Developer
Agent Registry governanceManage Agent Registry metadata, collections, visibility, and assign registry-specific rolesAgent Registry Administrator
Conditional Access for AICreate and manage Conditional Access policies that target AI agents and AI applicationsConditional Access Administrator
Agent governance and access reviewsManage entitlement management access packages and access reviews for agent identitiesIdentity Governance Administrator
Data security for AIConfigure data classification, DLP, insider risk, and communication compliance policies for AI interactions in Microsoft PurviewCompliance Administrator, Compliance Data Administrator
AI cloud security posture managementAssess AI infrastructure posture in Microsoft Defender for Cloud, identify AI-specific misconfigurations and attack paths, and remediate cloud security risks for AI workloads and modelsSecurity Administrator
Threat detection and responseMonitor and respond to AI-related security incidents and alerts in Microsoft DefenderSecurity Operator
Read-only security monitoringRead security information, reports, and dashboard data without configuration authoritySecurity Reader, Global Reader
AI network traffic governanceConfigure Internet Access profiles, web AI gateway for agents, TLS inspection, and web content filtering for AI appsGlobal Secure Access Administrator
AI app registration and consentManage enterprise app registrations for AI applications, API permission consent, and app governanceApplication Administrator
Copilot Studio environment managementManage Power Platform environments, DLP policies, and Copilot Studio agent publishingPower Platform Administrator
AI content source governanceManage SharePoint sharing, access, and oversharing settings that determine what Copilot for Microsoft 365 can ground responses onSharePoint Administrator
AI app deployment to devicesDeploy and manage AI-enabled apps on endpoints, configure app protection policiesIntune Administrator
AI model governanceDiscover, inventory, and manage the security posture of AI models (Azure OpenAI, Azure AI Foundry, third-party models) through Defender for Cloud asset inventorySecurity Administrator
MCP server discovery and governanceDiscover, assess, and govern MCP servers that create direct integration and attack surface between AI agents and external systemsSecurity Administrator, Compliance Administrator
Shadow AI and third-party AI app governanceDiscover unsanctioned AI usage (ChatGPT, Gemini, etc.), assess risk, and apply sanctioning decisions through Defender for Cloud AppsSecurity Administrator, Compliance Administrator
  1. Map AI responsibilities to people: Identify who in your organization will perform each responsibility listed above. In many organizations, a single person may cover multiple AI roles through Privileged Identity Management (PIM) just-in-time activation.
  2. Assign roles through PIM: Use eligible (not permanent) role assignments for privileged AI roles. This ensures time-limited access with approval workflows and audit logging.
  3. Avoid Global Administrator for routine AI management: The AI Administrator, Agent ID Administrator, and Security Administrator roles collectively cover all AI management scenarios without requiring Global Administrator.
  4. Review role assignments regularly: As new AI capabilities are introduced, new roles will emerge. Schedule quarterly reviews to ensure AI role assignments remain aligned with actual responsibilities.

Reference