{"id":4580,"date":"2024-10-02T15:18:48","date_gmt":"2024-10-02T15:18:48","guid":{"rendered":"https:\/\/exfilsecurity.com\/azure-open-ai-through-a-security-lens\/"},"modified":"2024-10-02T15:18:48","modified_gmt":"2024-10-02T15:18:48","slug":"azure-open-ai-through-a-security-lens","status":"publish","type":"post","link":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/","title":{"rendered":"Azure Open AI Through a Security Lens"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4580\" class=\"elementor elementor-4580 elementor-4232\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a6d9e5 e-flex e-con-boxed sc_layouts_column_icons_position_left e-con e-parent\" data-id=\"3a6d9e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68aa5557 elementor-drop-cap-yes elementor-drop-cap-view-default sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"68aa5557\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;drop_cap&quot;:&quot;yes&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the dynamic realm of artificial intelligence, the fusion of Microsoft\u2019s Azure cloud services with OpenAI\u2019s advanced models is essential for technology development as it combines the scalability and security of Azure\u2019s cloud infrastructure with the power and capabilities of OpenAI\u2019s models. Not Open AI itself. This blog delves into the cybersecurity aspects of the Azure and OpenAI collaboration, unveiling how the convergence of artificial intelligence and cloud computing heralds a transformative future.<\/p><p>As digital interconnectivity complicates the cybersecurity landscape, Azure stands as a bulwark, enabling enterprises to leverage cloud capabilities securely. Nevertheless, the validity of existing security measures in the context of AI warrants scrutiny. A foundational understanding of the service\u2019s functionalities is essential for a comprehensive security assessment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46622701 e-flex e-con-boxed sc_layouts_column_icons_position_left e-con e-parent\" data-id=\"46622701\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-424218e6 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"424218e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Overview<\/h3><p>The Azure OpenAI Service facilitates access to OpenAI\u2019s potent language models through REST APIs, Python SDK, or Azure OpenAI Studio. The available models, including GPT-4 and GPT-4 Turbo, GPT-3.5, Embeddings, DALL-E, and Whisper, cater to varied needs, with some premium options offering enhanced service quality. Pricing correlates with token usage and adheres to a rate limit and quota system detailed in Microsoft\u2019s documentation (https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/openai\/). The service supports multiple programming languages, including C#, Go, Java, JavaScript, and Python.<\/p><h3>Key Concepts<\/h3><p>Key to the Azure Open AI service is Provisioned Throughput Units (PTUs), which denote the model processing capacity. These are intrinsically linked to quota management; exceeding rate limits triggers a 429 error, indicative of service interruption and a potential vector for DoS attacks, as exemplified in the provided image.<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-4236 aligncenter\" src=\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/azure1-Utilization.png\" alt=\"\" width=\"733\" height=\"272\" srcset=\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/azure1-Utilization.png 733w, https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/azure1-Utilization-300x111.png 300w, https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/azure1-Utilization-370x137.png 370w, https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/azure1-Utilization-410x152.png 410w\" sizes=\"(max-width: 767px) 100vw, 733px\" \/><\/p><p>Azure OpenAI service provisioning, showing how as deployment utilization rises, capacity is gauged through utilization.<\/p><p>Another important concept is the content filtering system, aimed at detecting and preventing the output of harmful content. It detects and takes action on specific categories of potentially harmful content in both input prompts and output completions. The models filter harm categories such as hate and fairness, sexual, violence, self-harm, jailbreak risk (provoke AI to exhibit behaviors it was trained to avoid) and protected material (text and code). It is essential to thoroughly test these areas for potential vulnerabilities to prevent any possible loss of data integrity. Each of these categories has severity levels such as safe, low, medium, and high. In the official guide, each of these categories is detailed, including specific examples presented in tables for each severity level. By default, medium and high levels are filtered; however, clients can configure this, making it crucial for testers to verify and prevent potential negative impacts on the security of the AI application.<\/p><p>The guide addresses the topic of prompt engineering, referring to the importance of providing clear instructions to the AI, with explicit examples of usage. Similarly, the concept of fine-tuning is mentioned to describe the idea of adapting AI to the specific needs of each client or business. This is supervised by Azure Open AI and refers to the process of refining pre-trained models using specific datasets, to enhance model performance in particular tasks. Despite the allure, one must be cautious because there can be adverse effects on security if used improperly. If the fine-tuned model retains fragments of the sensitive data, it could pose a risk leading to data leakage. Membership inference attacks allow an adversary to determine if a particular data point was part of the model\u2019s training set. Finally, manipulation of input data may lead the model to include inaccuracies.<\/p><h3>Main differences between Open AI and Open AI on Azure<\/h3><p>The following image shows some distinctions between OpenAI and its Azure integration.<\/p><p><img decoding=\"async\" class=\"wp-image-4235 size-full aligncenter\" src=\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/AzureOpenAISecurityLayers.png\" alt=\"\" width=\"944\" height=\"657\" srcset=\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/AzureOpenAISecurityLayers.png 944w, https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/AzureOpenAISecurityLayers-300x209.png 300w, https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/AzureOpenAISecurityLayers-768x535.png 768w, https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/AzureOpenAISecurityLayers-370x258.png 370w, https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/AzureOpenAISecurityLayers-924x643.png 924w, https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/AzureOpenAISecurityLayers-410x285.png 410w\" sizes=\"(max-width: 944px) 100vw, 944px\" \/><\/p><h3><br \/>Ensuring Security in Data Integration<\/h3><p>When using the Azure OpenAI Service, the prompts, completions, embeddings, and training data are not shared with other customers, and not utilized to enhance OpenAI models or 3rd party products (unless explicitly fine-tuning models, which are exclusively available for client\u2019s use). The following image shows the three stages of how the data is processed: processing prompts to generate content, creating a fine-tuned model, then analyzes inputs for harmful content.<\/p><p><br \/>As the models are stateless, no prompts or generations are stored in the model. Additionally, prompts and generations are not used to train, retrain, or improve the base models. When a user prompt is received, the service retrieves relevant data from the connected data source and augments the prompt. The model processes this augmented prompt and the generated content is returned as described in the next image.<\/p><p><br \/>In addition to illustrating the process of integrating the Azure Cognitive Search feature, the images show how customers can apply to modify the content abuse monitoring. This is an essential feature for the security of the application. Ideally, this parameter should be turned on to avoid potential risks during interactions with end users. However, depending on the needs of the customers, it may be necessary to turn it off. This involves the processing of sensitive, highly confidential, or legally-regulated input data which opens the door to harmful outputs or misuse by malicious actors. This can be verified by executing the following command in Azure CLI:<\/p><blockquote><p>az cognitiveservices account show -n resource\\_name -g resource \\_group<\/p><\/blockquote><p>Which will show in JSON format something like this:<\/p><blockquote><p>{ <br \/>\u00abname\u00bb:\u00bbContentLogging\u00bb,<br \/>\u00abvalue\u00bb:\u00bbfalse\u00bb<br \/>}<\/p><\/blockquote><p>The Official Guide explains how additional guardrails can be set, templates established, and also how to integrate this service with Azure ML Prompt Flow. This allows for the creation of flows to specify the behavior of the chatbot and add the paths desired in the interaction with users. When integrating these features, it is crucial to always ensure the security of the application, leaving no room for vulnerabilities such as membership inference or model inversion (for the fine-tuned model).<\/p><p>Finally, here one can find a complete guide on how to use OpenAI securely and protect data. In it, one can find relevant information on Data Ingestion and Inference Architecture, including a step-by-step diagram on how to ingest data from Azure Blob Storage or local files in a secure way. It also shows how to create a virtual network and resource groups, as well as configuring or enabling properties such as managed identity, trusted services, role-based access control on Azure OpenAI and AI Search. Additionally, one can find a guide to disable public network access and configuring storage account, gateway and client VPNs.<\/p><h3>Final Remarks<\/h3><p>The alliance between Azure and OpenAI is a beacon of innovation, blending robust cloud infrastructure with groundbreaking AI technologies. As the digital horizon expands, the imperative for uncompromised security becomes apparent. The thorough understanding and testing of these systems are not optional but a necessity to maintain a resilient and secure foundation for future advancements. By unraveling the complexities, we empower ourselves to navigate the digital terrain with confidence, aware of the protective measures that safeguard our endeavors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the dynamic realm of artificial intelligence, the fusion of Microsoft\u2019s Azure cloud&hellip;<\/p>\n","protected":false},"author":18,"featured_media":4581,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[48],"tags":[],"class_list":["post-4580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergingtech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Azure Open AI Through a Security Lens - Exfil Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azure Open AI Through a Security Lens - Exfil Security\" \/>\n<meta property=\"og:description\" content=\"In the dynamic realm of artificial intelligence, the fusion of Microsoft\u2019s Azure cloud&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/\" \/>\n<meta property=\"og:site_name\" content=\"Exfil Security\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-02T15:18:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/azure1-Utilization.png\" \/>\n<meta name=\"author\" content=\"Felipe Mu\u00f1oz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Felipe Mu\u00f1oz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/\"},\"author\":{\"name\":\"Felipe Mu\u00f1oz\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/cdb8f7466522259992831061c2a6a2e7\"},\"headline\":\"Azure Open AI Through a Security Lens\",\"datePublished\":\"2024-10-02T15:18:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/\"},\"wordCount\":1134,\"publisher\":{\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/Azure-OpenAIOctober-2-2024Hugo-Cosme.png\",\"articleSection\":[\"Nuevas Tecnolog\u00edas\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/\",\"url\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/\",\"name\":\"Azure Open AI Through a Security Lens - Exfil Security\",\"isPartOf\":{\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/Azure-OpenAIOctober-2-2024Hugo-Cosme.png\",\"datePublished\":\"2024-10-02T15:18:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#primaryimage\",\"url\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/Azure-OpenAIOctober-2-2024Hugo-Cosme.png\",\"contentUrl\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/Azure-OpenAIOctober-2-2024Hugo-Cosme.png\",\"width\":880,\"height\":494},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/exfilsecurity.com\/es\/inicio\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Open AI Through a Security Lens\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#website\",\"url\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/\",\"name\":\"Exfil Security\",\"description\":\"Where expertise meets trust.\",\"publisher\":{\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization\",\"name\":\"Exfil Security\",\"url\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2025\/10\/cropped-Exfil-Nuevo-Logo-02.png\",\"contentUrl\":\"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2025\/10\/cropped-Exfil-Nuevo-Logo-02.png\",\"width\":1401,\"height\":474,\"caption\":\"Exfil Security\"},\"image\":{\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/cdb8f7466522259992831061c2a6a2e7\",\"name\":\"Felipe Mu\u00f1oz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2471dbc0af0217668270d4682774de0d92c3a6460bdf353049c3a0d5e964a4d7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2471dbc0af0217668270d4682774de0d92c3a6460bdf353049c3a0d5e964a4d7?s=96&d=mm&r=g\",\"caption\":\"Felipe Mu\u00f1oz\"},\"url\":\"https:\/\/exfilsecurity.com\/es\/author\/felipej\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Azure Open AI Through a Security Lens - Exfil Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/","og_locale":"es_ES","og_type":"article","og_title":"Azure Open AI Through a Security Lens - Exfil Security","og_description":"In the dynamic realm of artificial intelligence, the fusion of Microsoft\u2019s Azure cloud&hellip;","og_url":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/","og_site_name":"Exfil Security","article_published_time":"2024-10-02T15:18:48+00:00","og_image":[{"url":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/azure1-Utilization.png","type":"","width":"","height":""}],"author":"Felipe Mu\u00f1oz","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Felipe Mu\u00f1oz","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#article","isPartOf":{"@id":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/"},"author":{"name":"Felipe Mu\u00f1oz","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/cdb8f7466522259992831061c2a6a2e7"},"headline":"Azure Open AI Through a Security Lens","datePublished":"2024-10-02T15:18:48+00:00","mainEntityOfPage":{"@id":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/"},"wordCount":1134,"publisher":{"@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization"},"image":{"@id":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#primaryimage"},"thumbnailUrl":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/Azure-OpenAIOctober-2-2024Hugo-Cosme.png","articleSection":["Nuevas Tecnolog\u00edas"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/","url":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/","name":"Azure Open AI Through a Security Lens - Exfil Security","isPartOf":{"@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#primaryimage"},"image":{"@id":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#primaryimage"},"thumbnailUrl":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/Azure-OpenAIOctober-2-2024Hugo-Cosme.png","datePublished":"2024-10-02T15:18:48+00:00","breadcrumb":{"@id":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#primaryimage","url":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/Azure-OpenAIOctober-2-2024Hugo-Cosme.png","contentUrl":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2024\/10\/Azure-OpenAIOctober-2-2024Hugo-Cosme.png","width":880,"height":494},{"@type":"BreadcrumbList","@id":"https:\/\/exfilsecurity.com\/es\/azure-open-ai-through-a-security-lens\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exfilsecurity.com\/es\/inicio\/"},{"@type":"ListItem","position":2,"name":"Azure Open AI Through a Security Lens"}]},{"@type":"WebSite","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#website","url":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/","name":"Exfil Security","description":"Where expertise meets trust.","publisher":{"@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#organization","name":"Exfil Security","url":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/logo\/image\/","url":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2025\/10\/cropped-Exfil-Nuevo-Logo-02.png","contentUrl":"https:\/\/exfilsecurity.com\/wp-content\/uploads\/2025\/10\/cropped-Exfil-Nuevo-Logo-02.png","width":1401,"height":474,"caption":"Exfil Security"},"image":{"@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/cdb8f7466522259992831061c2a6a2e7","name":"Felipe Mu\u00f1oz","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/exfil-staging.qytgmxk6-liquidwebsites.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2471dbc0af0217668270d4682774de0d92c3a6460bdf353049c3a0d5e964a4d7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2471dbc0af0217668270d4682774de0d92c3a6460bdf353049c3a0d5e964a4d7?s=96&d=mm&r=g","caption":"Felipe Mu\u00f1oz"},"url":"https:\/\/exfilsecurity.com\/es\/author\/felipej\/"}]}},"_links":{"self":[{"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/posts\/4580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/comments?post=4580"}],"version-history":[{"count":0,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/posts\/4580\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/media\/4581"}],"wp:attachment":[{"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/media?parent=4580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/categories?post=4580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exfilsecurity.com\/es\/wp-json\/wp\/v2\/tags?post=4580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}