Azure Security Engineer Associate (AZ-500)
1 Manage Identity and Access
1-1 Implement and manage Azure Active Directory (Azure AD)
1-1 1 Configure Azure AD users and groups
1-1 2 Manage Azure AD roles and role-based access control (RBAC)
1-1 3 Implement and manage Azure AD identity protection
1-1 4 Configure and manage Azure AD conditional access policies
1-1 5 Implement and manage Azure AD Privileged Identity Management (PIM)
1-1 6 Configure and manage Azure AD B2B and B2C
1-1 7 Implement and manage Azure AD Connect
1-1 8 Configure and manage Azure AD Domain Services
1-2 Implement and manage hybrid identity
1-2 1 Configure and manage Azure AD Connect
1-2 2 Implement and manage password hash synchronization
1-2 3 Implement and manage pass-through authentication
1-2 4 Implement and manage federation
1-2 5 Configure and manage Azure AD Connect Health
1-3 Implement and manage multi-factor authentication (MFA)
1-3 1 Configure and manage Azure AD MFA
1-3 2 Implement and manage conditional access policies with MFA
1-3 3 Configure and manage MFA for on-premises users
1-4 Implement and manage Azure role-based access control (RBAC)
1-4 1 Configure and manage Azure RBAC roles and assignments
1-4 2 Implement and manage custom roles
1-4 3 Configure and manage resource locks
1-4 4 Implement and manage Azure Blueprints
1-5 Implement and manage Azure AD Privileged Identity Management (PIM)
1-5 1 Configure and manage PIM roles and assignments
1-5 2 Implement and manage PIM alerts and reports
1-5 3 Configure and manage PIM access reviews
2 Implement Platform Protection
2-1 Implement and manage network security
2-1 1 Configure and manage Azure Firewall
2-1 2 Implement and manage Azure DDoS protection
2-1 3 Configure and manage network security groups (NSGs)
2-1 4 Implement and manage Azure Network Watcher
2-1 5 Configure and manage Azure Bastion
2-1 6 Implement and manage Azure Private Link
2-1 7 Configure and manage Azure VPN Gateway
2-1 8 Implement and manage Azure ExpressRoute
2-2 Implement and manage storage security
2-2 1 Configure and manage Azure Storage account security
2-2 2 Implement and manage Azure Storage encryption
2-2 3 Configure and manage Azure Storage access control
2-2 4 Implement and manage Azure Storage firewalls and virtual networks
2-2 5 Configure and manage Azure Storage service encryption
2-3 Implement and manage virtual machine security
2-3 1 Configure and manage virtual machine (VM) security
2-3 2 Implement and manage VM encryption
2-3 3 Configure and manage VM access control
2-3 4 Implement and manage VM security baselines
2-3 5 Configure and manage VM extensions for security
2-4 Implement and manage container security
2-4 1 Configure and manage Azure Kubernetes Service (AKS) security
2-4 2 Implement and manage container image security
2-4 3 Configure and manage container registry security
2-4 4 Implement and manage container network security
2-5 Implement and manage application security
2-5 1 Configure and manage Azure Web Application Firewall (WAF)
2-5 2 Implement and manage Azure Application Gateway security
2-5 3 Configure and manage Azure Front Door security
2-5 4 Implement and manage Azure API Management security
3 Manage Security Operations
3-1 Implement and manage security monitoring
3-1 1 Configure and manage Azure Security Center
3-1 2 Implement and manage Azure Sentinel
3-1 3 Configure and manage Azure Monitor
3-1 4 Implement and manage Azure Log Analytics
3-1 5 Configure and manage Azure Activity Log
3-2 Implement and manage threat detection
3-2 1 Configure and manage Azure Advanced Threat Protection (ATP)
3-2 2 Implement and manage Azure Defender
3-2 3 Configure and manage Azure Security Center alerts
3-2 4 Implement and manage Azure Sentinel alerts
3-3 Implement and manage incident response
3-3 1 Configure and manage Azure Security Center incident response
3-3 2 Implement and manage Azure Sentinel incident response
3-3 3 Configure and manage Azure Automation for incident response
3-3 4 Implement and manage Azure Key Vault for incident response
3-4 Implement and manage compliance and governance
3-4 1 Configure and manage Azure Policy
3-4 2 Implement and manage Azure Blueprints
3-4 3 Configure and manage Azure Security Center compliance
3-4 4 Implement and manage Azure Information Protection (AIP)
4 Secure Data and Applications
4-1 Implement and manage encryption
4-1 1 Configure and manage Azure Key Vault
4-1 2 Implement and manage Azure Disk Encryption
4-1 3 Configure and manage Azure Storage encryption
4-1 4 Implement and manage Azure SQL Database encryption
4-1 5 Configure and manage Azure Cosmos DB encryption
4-2 Implement and manage data protection
4-2 1 Configure and manage Azure Backup
4-2 2 Implement and manage Azure Site Recovery
4-2 3 Configure and manage Azure Storage lifecycle management
4-2 4 Implement and manage Azure Information Protection (AIP)
4-3 Implement and manage application security
4-3 1 Configure and manage Azure Web Application Firewall (WAF)
4-3 2 Implement and manage Azure Application Gateway security
4-3 3 Configure and manage Azure Front Door security
4-3 4 Implement and manage Azure API Management security
4-4 Implement and manage identity and access for applications
4-4 1 Configure and manage Azure AD authentication for applications
4-4 2 Implement and manage OAuth2 and OpenID Connect
4-4 3 Configure and manage Azure AD B2B and B2C
4-4 4 Implement and manage Azure AD Conditional Access for applications
4-5 Implement and manage security for serverless computing
4-5 1 Configure and manage Azure Functions security
4-5 2 Implement and manage Azure Logic Apps security
4-5 3 Configure and manage Azure Event Grid security
4-5 4 Implement and manage Azure Service Bus security
Manage Identity and Access

Manage Identity and Access

In the context of Azure Security Engineer Associate (AZ-500), managing identity and access is a critical aspect of securing your cloud environment. This involves controlling who can access your resources and what actions they can perform. Below are key concepts and detailed explanations to help you understand this topic better.

1. Azure Active Directory (Azure AD)

Azure AD is Microsoft's cloud-based identity and access management service. It provides the foundation for managing identities and controlling access to resources in Azure. Azure AD supports both user and group-based access control, enabling you to manage permissions centrally.

Example: Imagine Azure AD as a secure gatekeeper for your cloud resources. Just as a gatekeeper controls who enters a building, Azure AD controls who can access your Azure resources.

2. Role-Based Access Control (RBAC)

RBAC is a method of regulating access to resources based on the roles of individual users within an organization. In Azure, RBAC allows you to assign roles to users, groups, or applications at different scopes, such as subscription, resource group, or individual resource level.

Example: Think of RBAC as a set of predefined job titles in a company. Each title comes with specific responsibilities and access levels. Similarly, Azure roles define what actions a user can perform on specific resources.

3. Conditional Access

Conditional Access is a tool that Azure AD uses to allow or deny access to resources based on identity signals. These signals include user or group membership, location, device, and application. Conditional Access policies can enforce multi-factor authentication (MFA) and other security measures.

Example: Consider Conditional Access as a smart security system that checks multiple factors before granting access. For instance, it might require MFA if the user is accessing the system from an unknown location.

4. Multi-Factor Authentication (MFA)

MFA adds an extra layer of security by requiring two or more verification methods to confirm a user's identity. This typically includes something the user knows (like a password), something the user has (like a mobile device), and something the user is (like a fingerprint).

Example: MFA is like a layered security system for your home. You need a key (password), a security code sent to your phone (second factor), and possibly a fingerprint scan (biometric factor) to unlock the door.

5. Privileged Identity Management (PIM)

PIM is a service in Azure AD that provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access rights. It allows you to manage, control, and monitor access to important resources in your organization.

Example: PIM is akin to a temporary access pass for sensitive areas. Just as you might need a special pass to enter a restricted area for a limited time, PIM grants temporary elevated access to users when needed.

6. Identity Protection

Identity Protection is a tool that detects potential vulnerabilities affecting your organization's identities. It provides automated responses to detected suspicious actions related to user identities and can generate detailed reports and alerts for investigation.

Example: Think of Identity Protection as a security guard that monitors unusual activities. If someone tries to log in from an unusual location or uses incorrect credentials repeatedly, the guard flags it for further investigation.

By mastering these concepts, you can effectively manage identity and access in Azure, ensuring that your cloud environment is secure and compliant with organizational policies.