Azure Administrator Associate (AZ-104)
1 Manage Azure identities and governance
1-1 Manage Azure AD objects
1-2 Manage role-based access control (RBAC)
1-3 Manage subscriptions and governance
2 Implement and manage storage
2-1 Manage storage accounts
2-2 Manage blob storage
2-3 Manage disk storage
2-4 Manage file shares
2-5 Implement Azure Backup
3 Deploy and manage Azure compute resources
3-1 Manage virtual machines (VMs)
3-2 Manage VM extensions
3-3 Manage virtual machine scale sets (VMSS)
3-4 Manage Azure App Services
3-5 Manage Azure Container Instances (ACI)
3-6 Manage Azure Kubernetes Service (AKS)
4 Configure and manage virtual networking
4-1 Manage Azure virtual networks
4-2 Manage network security groups (NSGs)
4-3 Manage Azure DNS
4-4 Manage Azure load balancers
4-5 Manage Azure Application Gateway
4-6 Manage Azure VPN Gateway
4-7 Manage Azure ExpressRoute
4-8 Manage Azure Traffic Manager
4-9 Manage Azure Content Delivery Network (CDN)
5 Monitor and back up Azure resources
5-1 Monitor resources using Azure Monitor
5-2 Implement and manage Azure Backup
5-3 Implement and manage Azure Site Recovery
5-4 Implement and manage Azure Security Center
5-5 Implement and manage Azure Update Management
Implement and Manage Azure Security Center

Implement and Manage Azure Security Center

Key Concepts

Azure Security Center

Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud and on-premises.

Example: Think of Azure Security Center as a comprehensive security guard for your entire IT infrastructure, both in the cloud and on-premises, ensuring that all your assets are protected from potential threats.

Security Policies

Security Policies in Azure Security Center define the set of controls that are recommended for resources within a specific subscription or resource group. These policies can be customized to align with your organization's security requirements and regulatory compliance needs.

Analogy: Consider security policies as the rules and regulations that govern a secure building. These rules dictate how people (resources) should behave to ensure the building (infrastructure) remains safe and secure.

Security Alerts

Security Alerts are notifications generated by Azure Security Center when it detects potential security threats or suspicious activities. These alerts provide detailed information about the threat, including the affected resources and recommended actions to mitigate the threat.

Example: Imagine security alerts as alarms in a high-security facility. When an unauthorized activity is detected, the alarm (alert) goes off, notifying security personnel (administrators) to take immediate action.

Secure Score

Secure Score is a measurement of an organization's security posture based on security controls. It provides a score that reflects the overall security status of your Azure resources and helps you prioritize actions to improve security.

Analogy: Think of Secure Score as a health score for your IT infrastructure. Just as a health score indicates how well you are taking care of your body, Secure Score indicates how well you are protecting your IT assets.

Just-In-Time (JIT) VM Access

Just-In-Time (JIT) VM Access is a feature in Azure Security Center that allows you to control access to your virtual machines by granting temporary access only when needed. This reduces the attack surface by limiting the time window during which a VM is exposed to potential threats.

Example: Consider JIT VM Access as a temporary access pass for a secure area. Just as you would only grant access to a secure area when someone needs to enter, JIT VM Access grants access to VMs only when necessary, reducing the risk of unauthorized access.

Conclusion

Implementing and managing Azure Security Center involves understanding and effectively using key concepts such as security policies, security alerts, secure score, and JIT VM access. By leveraging these features, you can ensure that your Azure resources are protected against potential threats, and your security posture is continuously improved.