Weekly Security Roundup: Guardrails, AI Observability, Identity Attacks
This week's security story split between tightening default guardrails in developer platforms and dealing with AI-heavy systems and identity-first attacks. Building on last week's theme of trusted surfaces being tightened while also being abused, these updates land on default paths teams use every day: dependency installs, git push, org-wide security rollout, remote support tooling, and AI systems that act on data and tools. GitHub and Azure DevOps shipped changes affecting secrets, dependencies, and auth at scale, while Microsoft security guidance continued last week's move from AI security theory to operations: make behavior observable and governable, and defend against phishing and support-channel compromises.
GitHub security controls: malware-aware dependencies, stricter secret policies, and smoother rollout at scale
GitHub's code security tooling shipped changes likely to affect daily workflows, especially for orgs standardizing security across many repos. After last week's focus on shifting scanning earlier and treating dev workflows as a control surface, Dependabot now supports opt-in malware alerts for npm, comparing your dependency graph to malware advisories in GitHub Advisory Database and producing a separate alert type from CVE vulnerability alerts. The opt-in model (with backfilled results when enabled) is meant to avoid noise that led GitHub to pause similar alerting in 2022. Teams using private registries should tune malware alert rules (ecosystem, package patterns, malicious-version vs malicious-package) to reduce name-collision false positives. Secret Scanning push protection is now more governable at org scale: you can define exemptions for roles, teams, and GitHub Apps via security configurations at org or enterprise level. It supports last week's “stop secrets before remote” storyline: as enforcement becomes more universal, exceptions become centrally manageable. Exemptions apply at push time; exempt actors can push detected secrets without enforcement and without bypass requests, which can help for automation and break-glass flows. Those exemptions still need compensating controls (auditing, least privilege, periodic review) so they do not create blind spots. On rollout, GitHub introduced a guided organization-level setup flow for GitHub Advanced Security to streamline enabling GHAS, managing custom configurations, and targeting repos, reducing inconsistent coverage. Code Quality updates also intersect with secure delivery: developers can batch-apply multiple Code Quality suggestions from PR “Files changed” into one commit (one follow-up scan instead of many). GitHub also tightened RBAC so the security manager role cannot enable/disable Code Quality unless also a repo admin, which platform teams may need to reflect in runbooks and automation. Overall, the direction matches last week: shift checks earlier, then reduce rollout and permission boundary mistakes.
- Dependabot now detects malware in npm dependencies
- Push protection exemptions for roles, teams, and apps
- GitHub Advanced Security setup made simple
- ‘GitHub Code Quality: Batch apply quality suggestions on pull requests’
- Code Quality permissions removed from security manager role
Microsoft’s AI security push: observability, Zero Trust guidance, and evaluation for agent-driven detection
Microsoft's security guidance kept converging on a practical theme: if AI systems make decisions and call tools, security teams need governance controls plus end-to-end visibility into how context is assembled and actions are taken. It extends last week's day-two focus on prompt-abuse playbooks and agent governance control planes (registry, identity, policy). The missing link is telemetry that can show what an agent saw, why it acted, and which boundaries it crossed. AI observability guidance argues that classic SRE metrics can be green while an agent violates trust boundaries (for example, indirect prompt injection via retrieved content). The recommendation is to instrument AI apps like distributed systems, with AI-specific capture: correlate by conversation or run across turns, log prompt/response plus identity and tool/data-source provenance, track AI metrics (token usage, retrieval volume, agent turns), and collect traces showing ordered execution from prompt to tool calls. It points to OpenTelemetry conventions and Microsoft options like Foundry agent tracing (preview) and the Agent 365 Observability SDK (Frontier preview). That visibility thread connects to Microsoft's Zero Trust for AI guidance, extending “verify explicitly / least privilege / assume breach” across ingestion, training, deployment, and agent behavior. It is the policy side of last week's story: if agents have identities and tool/data access, control mapping must span Identity, Data, and Network, not just model settings. The Zero Trust Workshop adds an AI pillar with scenario-based control mapping, and the Zero Trust Assessment tool expands beyond Identity/Devices into Data and Network. That reflects how AI rollouts often fail on DLP/governance and network enforcement rather than model config. Microsoft also says a dedicated AI assessment pillar is planned for summer 2026. Microsoft also released CTI-REALM, an open benchmark to test whether tool-using AI agents can go from CTI reports to validated detections (iterating on KQL and producing Sigma) across Linux endpoint, AKS, and Azure telemetry, with scoring across intermediate steps. For teams exploring detection-generation agents, it is positioned as a way to measure failure modes (CTI comprehension vs telemetry exploration vs query specificity) before letting generated detections into production workflows, complementing the guardrails and monitoring emphasis of the last two weeks.
- ‘Observability for AI Systems: Strengthening visibility for proactive risk detection’
- ‘New tools and guidance: Announcing Zero Trust for AI’
- ‘CTI-REALM: A new benchmark for end-to-end detection rule generation with AI agents’
Identity-first intrusions and seasonal phishing: concrete defender guidance for real campaigns
Microsoft threat and incident-response reporting stayed focused on how compromises often start: social engineering and identity abuse, not zero-days. It continues last week's pattern of attackers blending into routine engineering and IT habits (interviews, “VPN download” searches, trusted hosting, signed binaries). This week again uses familiar channels (Teams support calls, remote assistance tools, and legitimate cloud infrastructure) to look normal. Microsoft Incident Response (DART) described a Teams vishing incident: an attacker impersonated IT support, convinced a user to start a Quick Assist session, then redirected them to a spoofed login to steal credentials. The attacker then delivered payloads including a disguised MSI that sideloaded a malicious DLL, then moved via encrypted loaders, proxy connectivity, and living-off-the-land techniques. Mitigations are operational: restrict inbound Teams comms from unmanaged accounts (prefer allowlists for trusted external domains) and inventory/minimize remote assistance tools, potentially disabling Quick Assist where not required. Microsoft Threat Intelligence also documented multiple tax-season phishing and malware campaigns (Jan-Mar 2026) using W-2/1099/IRS/CPA lures and leveraging legitimate infrastructure (OneDrive, Amazon SES click tracking) plus legitimate remote tools (ScreenConnect, SimpleHelp, Datto-related executables) for hands-on access. Chains use multi-step delivery to evade scanning (Excel → OneNote on OneDrive → phishing), QR-based payloads with personalized docs, and bot detection to block sandboxes. Guidance is tactical for Microsoft environments: enable Defender XDR automatic attack disruption, enforce MFA without risky exclusions and use phishing-resistant MFA via Entra Conditional Access where possible, enable ZAP and Safe Links click-time rechecks, turn on Defender for Endpoint network protection, and use the provided KQL/IOCs in Defender XDR and Sentinel (including ASIM and TI Mapping). The operational takeaway matches last week: treat normal workflows as contested and harden identity and execution paths users rely on daily.
- ‘Help on the line: How a Microsoft Teams support call led to compromise’
- ‘When tax season becomes cyberattack season: beware these lures’
Security for Microsoft Fabric and OneLake: centralized policy enforcement meets AI-era governance
Fabric's security and governance surface expanded with two related themes: enforce access consistently across engines, and reduce oversharing risk as AI features consume more data. It echoes last week's “identity moving closer to the data plane” theme: governance needs to be enforceable where data is queried, even outside Microsoft's engines. Fabric introduced OneLake security APIs so third-party query engines can enforce OneLake permissions (table permissions plus RLS/CLS) at query time. The authorized engine model keeps OneLake as the source of truth while external engines retrieve security definitions and apply them during execution. OneLake also pre-computes effective access so engines do not need to reproduce role evaluation. For teams running multiple engines over Delta and Iceberg, this provides a contract for consistent governance without duplicating data or re-implementing auth per tool. Microsoft Purview added deeper Fabric coverage aimed at reducing leakage risk as Copilots and agents become part of Fabric workflows. Purview DLP policy tips for sensitive data in Fabric Warehouse uploads are GA, with preview enforcement that can restrict access when sensitive data is detected (KQL/SQL databases and Fabric Warehouses). Insider Risk Management expands Fabric coverage to lakehouses (GA) with indicators tied to risky sharing behavior and adds policies/reporting for data theft/exfiltration. For AI inside Fabric, Purview adds preview controls to discover sensitive data in prompts/responses, identify overshared assets via DSPM assessments, and tie AI usage into Audit/eDiscovery/retention and non-compliant usage detection. Unified Catalog updates (publication workflows GA; data quality checks for ungoverned assets) bring trust signals closer to where engineers discover and use data. Combined with last week's agent governance theme, the direction is that as AI touches more data by default, enforcement and audit need to follow the data regardless of the query engine.
- Third-party support for OneLake security
- New Microsoft Purview innovations for Fabric to safely accelerate your AI transformation
Other Security News
Azure DevOps integrations got a breaking-change warning: tokens will be further encrypted this summer, so code that decodes token payloads and treats claims as a stable contract should be replaced with supported API lookups (with caching where needed). It fits the “trusted surfaces are being tightened” trend: reduce reliance on internals and push teams toward supported identity boundaries.
- Authentication Tokens Are Not a Data Contract A newly reported AutoMapper issue is a reminder that convenience libraries can become DoS surfaces: some mapping over cyclical or deeply self-referential graphs can recurse until StackOverflowException terminates the process, so teams should audit mappings reachable from untrusted inputs and add depth limits/ignores where needed.
- How AutoMapper Can Crash Your .NET Server Azure compliance automation got attention with built-in CIS Benchmarks framed as platform-integrated baselines you can validate continuously, especially for hybrid/regulated and Linux-heavy fleets.
- Built‑In CIS Benchmarks on Microsoft Azure Microsoft's RSAC 2026 roundup collected “secure agentic AI end-to-end” updates across Entra, Purview, Defender, Sentinel, and Security Copilot, highlighting how network-layer prompt injection policies, expanded DLP for Copilot grounding, and agent governance/inventory are shaping deployment and operations in Microsoft ecosystems. It reads as a recap-and-extension of last week (registry/identity/governance) and this week (observability + Zero Trust mapping): controls are being named, shipped, and connected across identity, data governance, and monitoring.
- ‘Microsoft at RSAC Conference March 22-26: Secure agentic AI end-to-end’