Weight 13%ยท6 topics
Guardrails & Accountability
Classify autonomy levels, identify HITL gates, and enforce least-privilege scoping for irreversible actions.
- 1Classify Agent Actions by RiskBefore you add a single guardrail you need a risk taxonomy. This topic teaches the two axes that matter โ blast radius and reversibility โ and shows how Microsoft's Responsible AI pattern (Discover โ Protect โ Govern) maps onto an action-by-action classification you can defend in a design review.โฑ 8 minยท+40 XPยทeasy
- 2Assign Autonomy Levels: Speed vs Responsible AIAutonomy is a dial, not a switch. This topic walks through the standard Suggest โ Review โ Auto-apply โ Autonomous ladder, explains which guardrails are non-negotiable at each rung, and shows how to trade speed for Responsible AI controls without collapsing into either extreme.โฑ 9 minยท+50 XPยทmedium
- 3Identify Actions That Require Human JudgmentHuman-in-the-loop (HITL) is not free โ every gate adds latency and review burden. This topic teaches the four signals that an action genuinely needs human judgment (rather than just more evals or better prompts) so you can place gates where they earn their keep.โฑ 9 minยท+50 XPยทmedium
- 4Block Policy Violations at the BoundaryPolicies are useless if they live only in the prompt. This topic shows where to enforce them โ at the agent's tool, network, and runtime boundary โ so a violation is *blocked* rather than *reported after the fact*. You will learn to recognise the anti-patterns that make policies cosmetic.โฑ 8 minยท+45 XPยทmedium
- 5Least-Privilege Scoping for Agent PermissionsAn agent should hold the smallest set of permissions that lets it finish its job. This topic walks through how to scope identity, tool access, and data reach โ using Foundry's per-agent Entra identity, GitHub Copilot's MCP and trusted-directory policies, and the classic read/write/admin ladder.โฑ 9 minยท+50 XPยทmedium
- 6Explicit Authorization for Irreversible ChangesIrreversible actions โ deletions, prod deploys, payments, public posts โ need *explicit per-action* authorization, not standing approval. This topic teaches what 'explicit' actually means (intent stated, scope visible, decision logged) and how to design the authorization moment so it cannot be bypassed by a chatty agent.โฑ 9 minยท+55 XPยทhard