{"id":5463,"date":"2025-04-23T08:00:00","date_gmt":"2025-04-23T15:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/?p=5463"},"modified":"2026-02-26T16:00:29","modified_gmt":"2026-02-27T00:00:29","slug":"securing-ai-navigating-risks-and-compliance-for-the-future","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/","title":{"rendered":"Securing AI: Navigating risks and compliance for the future"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">AI is reshaping industries, revolutionizing workflows, and driving real-time decision-making. Organizations are embracing it at an astonishing pace. In fact, 47% of AI users already trust it to make critical security decisions.<sup>1<\/sup> That\u2019s a clear sign that AI is becoming an essential force in business. But here\u2019s the challenge\u2014if not secured properly, AI\u2019s immense potential can become a setback to deploying AI across your organization.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As AI becomes more deeply embedded in workflows, having a secure foundation from the start is essential for adapting to new innovations with confidence and ease. New regulations like the European Union AI Act demand greater transparency and accountability, while threats like shadow AI and adversarial attacks highlight the urgent need for robust governance.&nbsp;<\/p>\n\n\n\n<div class=\"alignwide is-style-inline wp-block-bloginabox-theme-promotional\">\n\t\n<div class=\"promotional promotional--has-media promotional--media-right\">\n\t<div class=\"promotional__wrapper\">\n\t\t<div class=\"promotional__content-wrapper\">\n\t\t\t<div class=\"promotional__content\">\n\t\t\t\t\n\n<h2 class=\"wp-block-heading\" id=\"getting-started-with-ai-applications\">Getting Started with AI Applications<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Guide for Securing the AI-Powered Enterprise<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a data-bi-an=\"Global CTA\" data-bi-ct=\"cta link\" data-bi-id=\"cta-block\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-brand\/documents\/Securing-the-AI-Powered-Enterprise-Getting-Started-with-AI-Applications.pdf\">Read today<\/a><\/div>\n<\/div>\n\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"promotional__media-wrapper\">\n\t\t\t\t<div class=\"promotional__media\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"667\" height=\"403\" src=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/03\/Screenshot-2025-03-24-102029.webp\" class=\"attachment-full size-full\" alt=\"A close up of a colorful swirl\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">To help organizations navigate these challenges, Microsoft has released the <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-brand\/documents\/Securing-the-AI-Powered-Enterprise-Getting-Started-with-AI-Applications.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Guide for Securing the AI-Powered Enterprise Issue 1: Getting Started with AI Applications<\/a>\u2014the first in a series of deep dives into AI security, compliance, and governance. This guide lays the groundwork for securing the AI tools teams are already exploring and provides guidance on how to manage the risks associated with AI. It also dives into some unique risks with AI agents and how to manage these. Here\u2019s a look at the key themes and takeaways.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"securing-ai-applications-understanding-the-risks-and-how-to-address-them\"><span class=\"text-gradient\">Securing AI applications: Understanding the risks and how to address them&nbsp;<\/span><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">AI adoption is accelerating, bringing remarkable opportunities but also a growing set of security risks. As AI becomes more embedded in business decision-making, challenges such as data leakage, emerging cyber threats, and evolving and new regulations demand immediate attention. Let\u2019s explore the top risks and how organizations can address them.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"data-leakage-and-oversharing-keeping-ai-from-becoming-a-liability\">Data leakage and oversharing: Keeping AI from becoming a liability&nbsp;<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">AI thrives on data. But without guardrails, that dependence can introduce security challenges. One major concern is shadow AI\u2014when employees use unapproved AI tools without oversight. It\u2019s easy to see why this happens: teams eager to boost efficiency turn to freely available AI-powered chatbots or automation tools, often unaware of the security risks. In fact, 80% of business leaders worry that sensitive data could slip through the cracks due to unchecked AI use.<sup>2<\/sup>&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Take a marketing team using an AI-powered content generator. If they connect it to unsecured sources, they might inadvertently expose proprietary strategies or customer data. Similarly, AI models often inherit the same permissions as their users, meaning an over-permissioned employee could unknowingly expose critical company data to an AI system. Without proper data lifecycle management, outdated or unnecessary data can linger in AI models, creating long-term security exposure.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"addressing-the-risk\">Addressing the risk<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Implement clear AI usage policies so employees stick to vetted, secure tools.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Allow AI&#8217;s to access data only based on the user&#8217;s credentials and use role-based access controls (RBAC) to manage that data access.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">If an AI does need to use its own credentials to access resources, only grant AI access to people who should have access to those resources.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Automate data retention policies to prevent sensitive information from persisting beyond its intended use.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"emerging-threats-the-expanding-landscape-of-ai-vulnerabilities\">Emerging threats: The expanding landscape of AI vulnerabilities&nbsp;<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">As AI evolves, so do the threats against it. According to Gartner\u00ae Peer Community, among 332 participants, a staggering 88% of organizations are concerned about the rising risk of indirect prompt injection attacks,<sup>3<\/sup> with attackers developing new ways to exploit vulnerabilities. One of the most pressing concerns is prompt injection attacks\u2014where malicious actors embed hidden instructions in input data to manipulate AI behavior. A cleverly worded query, for example, could trick an AI-powered chatbot into revealing confidential information.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Beyond direct attacks, AI systems themselves can introduce security risks. AI models are prone to hallucinations (generating false or misleading information), unexpected preferences (amplifying unfair decision-making patterns), omissions (leaving out critical details), misinterpretation of data, and poor-quality or malicious input leading to flawed results. A hiring tool, for example, might favor certain candidates based on biased historical data rather than making fair, informed decisions.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"addressing-the-risk-1\">Addressing the risk<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Validate and sanitize input data before AI processes it to prevent manipulation.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Limit AI\u2019s access to sensitive information and implement identity verification.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Design (and secure) the end-to-end (E2E) business process, not the AI component.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Secure the AI component by imagining replacing it with a new hire fresh out of school. What would you do to make your process robust against it making mistakes?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Use robust monitoring, validation, and oversight to ensure AI operates securely and responsibly.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Leverage commercial AI tools with built-in safeguards like bias detection, input sanitization, and access controls to reduce risks while supporting business goals.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"compliance-challenges-navigating-the-complex-ai-regulatory-landscape\">Compliance challenges: Navigating the complex AI regulatory landscape<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Beyond security, compliance is another major hurdle in AI adoption. Over half of business leaders (52%) admit they\u2019re unsure how to navigate today\u2019s rapidly evolving AI regulations.<sup>2<\/sup> Frameworks like the European Union AI Act, General Data Protection Regulation (GDPR), and Digital Operational Resilience Act (DORA) are rapidly evolving, making compliance a moving target. Organizations must establish clear governance and documentation to track AI usage, decision-making, and data handling, reducing the risk of non-compliance. Digital resilience laws like DORA require ongoing risk assessments to ensure operational continuity, while GDPR mandates transparency in AI-powered decisions like credit scoring and job screening. Misclassifying AI risk levels\u2014such as underestimating the impact of a diagnostic AI tool\u2014can lead to regulatory violations. Staying ahead requires structured risk assessments, automated compliance monitoring, and continuous policy adaptation to align with changing regulations.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"addressing-the-risk-2\">Addressing the risk<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Align AI governance with evolving regulations like DORA through risk assessment, testing, and monitoring.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Keep detailed AI records to ensure compliance and responsible use.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Use AI-powered tools to monitor compliance with GDPR and HIPAA, reducing risks like data drift and unauthorized access.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Audit AI decisions to ensure fairness, transparency, and regulatory compliance.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Classify AI risks clearly and stay updated on evolving regulations to maintain compliance.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-next-frontier-unique-challenges-in-securing-agentic-ai\"><span class=\"text-gradient\">The next frontier: Unique challenges in securing agentic AI&nbsp;<\/span><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The pace of AI growth is staggering, with <a href=\"https:\/\/www.linkedin.com\/pulse\/delivering-3-trusted-platforms-ai-age-satya-nadella-uijzc\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI capabilities doubling every six months<\/a>. Organizations are rapidly adopting more autonomous, adaptable, and deeply integrated systems to tackle complex challenges.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">One of the most significant developments in this shift is agentic AI\u2014a new class of AI systems designed to act independently, make real-time decisions, and collaborate with other AI agents to achieve complex objectives. These advancements have the potential to revolutionize industries, from optimizing energy grids to managing fleets of autonomous vehicles.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">But with greater autonomy comes greater risk. Overreliance on AI outputs, cyber vulnerabilities, and reliability concerns all need to be addressed. As these systems integrate deeper into operations, strong security, oversight, and accountability will be essential.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"building-a-secure-ai-future-a-responsible-ai-adoption-playbook\"><span class=\"text-gradient\">Building a secure AI future: A responsible AI adoption playbook&nbsp;<\/span><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">AI\u2019s transformative power comes with inherent risks, requiring a proactive, strategic approach to security. A Zero Trust framework ensures that every AI interaction is authenticated, authorized, and continuously monitored. But security isn\u2019t something that happens overnight\u2014it requires a phased approach.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft\u2019s <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/scenarios\/ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI adoption guidance<\/a>, part of the <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Adoption Framework for Azure<\/a>, provides a structured path for organizations to follow and is clearly outlined in the Microsoft Guide for Securing the AI Powered Enterprise Issue 1: Getting Started with AI Applications. This guide offers a starting point for embracing the cultural shift needed to secure AI with clarity and confidence.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Cross-team collaboration, employee training, and transparent governance are just as essential as firewalls and encryption. By embedding security at every stage, breaking down silos, and fostering trust, organizations can confidently navigate the AI landscape, ensuring both innovation and resilience in a rapidly evolving world.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\"><span class=\"text-gradient\">Learn more&nbsp;<\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/aka.ms\/SecureAI-Apps\" target=\"_blank\" rel=\"noreferrer noopener\">Guide for Securing the AI Powered Enterprise Issue 1: Getting Started with AI Applications<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Get the playbook: <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/cloud-adoption-framework\/scenarios\/ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI Adoption Guidance<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Read the e-book: <a href=\"https:\/\/info.microsoft.com\/ww-landing-grow-your-business-with-ai-you-can-trust.html?lcid=EN-US\" target=\"_blank\" rel=\"noreferrer noopener\">Grow Your Business with AI You Can Trust<\/a>.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity divider my-3\" \/>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>1<\/sup>Microsoft internal research, February 2025&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>2<\/sup> <a href=\"https:\/\/msftstories.thesourcemediaassets.com\/sites\/711\/2024\/11\/Gen-AI-Survey-FINAL-20231228.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ISMG, First Annual Generative AI Study: Business Rewards vs. Security Risks<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>3 <\/sup><a href=\"https:\/\/www.gartner.com\/peer-community\/poll\/if-orgs-using-virtual-assistants-ai-capabilities-concerned-about-indirect-prompt-injection-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner Peer Community Poll: If your org\u2019s using any virtual assistants with AI capabilities, are you concerned about indirect prompt injection attacks?<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">GARTNER is a registered trademark and service mark of Gartner, Inc. and\/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As AI becomes more deeply embedded in workflows, having a secure foundation from the start is essential for adapting to new innovations with confidence and ease.<\/p>\n","protected":false},"author":22,"featured_media":5465,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":["aiblog-content-sync"],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[336,302],"content-type":[6],"industry":[],"job-function":[],"job-role":[],"property":[],"topic":[7],"coauthors":[390],"class_list":["post-5463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-ai-transformation","tag-generative-ai","content-type-thought-leadership","topic-ai","review-flag-1695745983-296","review-flag-1-1695745984-811","review-flag-2-1695745984-459","review-flag-3-1695745984-226","review-flag-and-o-1695745983-238","review-flag-gartn-1695745987-996","review-flag-integ-1695745982-876","review-flag-lever-1695745982-620","review-flag-new-1695745982-637"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing AI: Navigating risks and compliance for the future | The Microsoft Cloud Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing AI: Navigating risks and compliance for the future | The Microsoft Cloud Blog\" \/>\n<meta property=\"og:description\" content=\"As AI becomes more deeply embedded in workflows, having a secure foundation from the start is essential for adapting to new innovations with confidence and ease.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/\" \/>\n<meta property=\"og:site_name\" content=\"The Microsoft Cloud Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-23T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-27T00:00:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1260\" \/>\n\t<meta property=\"og:image:height\" content=\"708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Yonatan Zunger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yonatan Zunger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/author\/yonatan-zunger\/\",\"@type\":\"Person\",\"@name\":\"Yonatan Zunger\"}],\"headline\":\"Securing AI: Navigating risks and compliance for the future\",\"datePublished\":\"2025-04-23T15:00:00+00:00\",\"dateModified\":\"2026-02-27T00:00:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/\"},\"wordCount\":1402,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.webp\",\"keywords\":[\"AI transformation\",\"Generative AI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/\",\"name\":\"Securing AI: Navigating risks and compliance for the future | The Microsoft Cloud Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.webp\",\"datePublished\":\"2025-04-23T15:00:00+00:00\",\"dateModified\":\"2026-02-27T00:00:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.webp\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.webp\",\"width\":1260,\"height\":708,\"caption\":\"Electric car engineers collaborating in factory office.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/topic\/ai\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing AI: Navigating risks and compliance for the future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/\",\"name\":\"The Microsoft Cloud Blog\",\"description\":\"Build the future of your business with AI\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#organization\",\"name\":\"Microsoft Cloud Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp\",\"width\":400,\"height\":400,\"caption\":\"Microsoft Cloud Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#\/schema\/person\/9d524ecca2df2ec0f08cee92a55e0ccc\",\"name\":\"kristingallagher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/2222274c8d03b762dcfdb44bb33bb782692c687883af3fcc47a99dfe609c8370?s=96&d=microsoft&r=gf02c647f1435633a1cc611ce18d0ca72\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2222274c8d03b762dcfdb44bb33bb782692c687883af3fcc47a99dfe609c8370?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2222274c8d03b762dcfdb44bb33bb782692c687883af3fcc47a99dfe609c8370?s=96&d=microsoft&r=g\",\"caption\":\"kristingallagher\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/author\/kristingallagher\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing AI: Navigating risks and compliance for the future | The Microsoft Cloud Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/","og_locale":"en_US","og_type":"article","og_title":"Securing AI: Navigating risks and compliance for the future | The Microsoft Cloud Blog","og_description":"As AI becomes more deeply embedded in workflows, having a secure foundation from the start is essential for adapting to new innovations with confidence and ease.","og_url":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/","og_site_name":"The Microsoft Cloud Blog","article_published_time":"2025-04-23T15:00:00+00:00","article_modified_time":"2026-02-27T00:00:29+00:00","og_image":[{"width":1260,"height":708,"url":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.png","type":"image\/png"}],"author":"Yonatan Zunger","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.png","twitter_misc":{"Written by":"Yonatan Zunger","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/author\/yonatan-zunger\/","@type":"Person","@name":"Yonatan Zunger"}],"headline":"Securing AI: Navigating risks and compliance for the future","datePublished":"2025-04-23T15:00:00+00:00","dateModified":"2026-02-27T00:00:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/"},"wordCount":1402,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.webp","keywords":["AI transformation","Generative AI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/","url":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/","name":"Securing AI: Navigating risks and compliance for the future | The Microsoft Cloud Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.webp","datePublished":"2025-04-23T15:00:00+00:00","dateModified":"2026-02-27T00:00:29+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.webp","contentUrl":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2025\/04\/Cloud_1052175_Blog_250415.webp","width":1260,"height":708,"caption":"Electric car engineers collaborating in factory office."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2025\/04\/23\/securing-ai-navigating-risks-and-compliance-for-the-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/"},{"@type":"ListItem","position":2,"name":"AI","item":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/topic\/ai\/"},{"@type":"ListItem","position":3,"name":"Securing AI: Navigating risks and compliance for the future"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/","name":"The Microsoft Cloud Blog","description":"Build the future of your business with AI","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#organization","name":"Microsoft Cloud Blog","url":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp","contentUrl":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp","width":400,"height":400,"caption":"Microsoft Cloud Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/#\/schema\/person\/9d524ecca2df2ec0f08cee92a55e0ccc","name":"kristingallagher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2222274c8d03b762dcfdb44bb33bb782692c687883af3fcc47a99dfe609c8370?s=96&d=microsoft&r=gf02c647f1435633a1cc611ce18d0ca72","url":"https:\/\/secure.gravatar.com\/avatar\/2222274c8d03b762dcfdb44bb33bb782692c687883af3fcc47a99dfe609c8370?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2222274c8d03b762dcfdb44bb33bb782692c687883af3fcc47a99dfe609c8370?s=96&d=microsoft&r=g","caption":"kristingallagher"},"url":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/author\/kristingallagher\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"The Microsoft Cloud Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/posts\/5463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/comments?post=5463"}],"version-history":[{"count":25,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/posts\/5463\/revisions"}],"predecessor-version":[{"id":7874,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/posts\/5463\/revisions\/7874"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/media\/5465"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/media?parent=5463"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/post_tag?post=5463"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/content-type?post=5463"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/industry?post=5463"},{"taxonomy":"job-function","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/job-function?post=5463"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/job-role?post=5463"},{"taxonomy":"property","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/property?post=5463"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/topic?post=5463"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/coauthors?post=5463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}