Azure Security Engineer Associate (AZ-500)
1 Manage Identity and Access
1-1 Implement and manage Azure Active Directory (Azure AD)
1-1 1 Configure Azure AD users and groups
1-1 2 Manage Azure AD roles and role-based access control (RBAC)
1-1 3 Implement and manage Azure AD identity protection
1-1 4 Configure and manage Azure AD conditional access policies
1-1 5 Implement and manage Azure AD Privileged Identity Management (PIM)
1-1 6 Configure and manage Azure AD B2B and B2C
1-1 7 Implement and manage Azure AD Connect
1-1 8 Configure and manage Azure AD Domain Services
1-2 Implement and manage hybrid identity
1-2 1 Configure and manage Azure AD Connect
1-2 2 Implement and manage password hash synchronization
1-2 3 Implement and manage pass-through authentication
1-2 4 Implement and manage federation
1-2 5 Configure and manage Azure AD Connect Health
1-3 Implement and manage multi-factor authentication (MFA)
1-3 1 Configure and manage Azure AD MFA
1-3 2 Implement and manage conditional access policies with MFA
1-3 3 Configure and manage MFA for on-premises users
1-4 Implement and manage Azure role-based access control (RBAC)
1-4 1 Configure and manage Azure RBAC roles and assignments
1-4 2 Implement and manage custom roles
1-4 3 Configure and manage resource locks
1-4 4 Implement and manage Azure Blueprints
1-5 Implement and manage Azure AD Privileged Identity Management (PIM)
1-5 1 Configure and manage PIM roles and assignments
1-5 2 Implement and manage PIM alerts and reports
1-5 3 Configure and manage PIM access reviews
2 Implement Platform Protection
2-1 Implement and manage network security
2-1 1 Configure and manage Azure Firewall
2-1 2 Implement and manage Azure DDoS protection
2-1 3 Configure and manage network security groups (NSGs)
2-1 4 Implement and manage Azure Network Watcher
2-1 5 Configure and manage Azure Bastion
2-1 6 Implement and manage Azure Private Link
2-1 7 Configure and manage Azure VPN Gateway
2-1 8 Implement and manage Azure ExpressRoute
2-2 Implement and manage storage security
2-2 1 Configure and manage Azure Storage account security
2-2 2 Implement and manage Azure Storage encryption
2-2 3 Configure and manage Azure Storage access control
2-2 4 Implement and manage Azure Storage firewalls and virtual networks
2-2 5 Configure and manage Azure Storage service encryption
2-3 Implement and manage virtual machine security
2-3 1 Configure and manage virtual machine (VM) security
2-3 2 Implement and manage VM encryption
2-3 3 Configure and manage VM access control
2-3 4 Implement and manage VM security baselines
2-3 5 Configure and manage VM extensions for security
2-4 Implement and manage container security
2-4 1 Configure and manage Azure Kubernetes Service (AKS) security
2-4 2 Implement and manage container image security
2-4 3 Configure and manage container registry security
2-4 4 Implement and manage container network security
2-5 Implement and manage application security
2-5 1 Configure and manage Azure Web Application Firewall (WAF)
2-5 2 Implement and manage Azure Application Gateway security
2-5 3 Configure and manage Azure Front Door security
2-5 4 Implement and manage Azure API Management security
3 Manage Security Operations
3-1 Implement and manage security monitoring
3-1 1 Configure and manage Azure Security Center
3-1 2 Implement and manage Azure Sentinel
3-1 3 Configure and manage Azure Monitor
3-1 4 Implement and manage Azure Log Analytics
3-1 5 Configure and manage Azure Activity Log
3-2 Implement and manage threat detection
3-2 1 Configure and manage Azure Advanced Threat Protection (ATP)
3-2 2 Implement and manage Azure Defender
3-2 3 Configure and manage Azure Security Center alerts
3-2 4 Implement and manage Azure Sentinel alerts
3-3 Implement and manage incident response
3-3 1 Configure and manage Azure Security Center incident response
3-3 2 Implement and manage Azure Sentinel incident response
3-3 3 Configure and manage Azure Automation for incident response
3-3 4 Implement and manage Azure Key Vault for incident response
3-4 Implement and manage compliance and governance
3-4 1 Configure and manage Azure Policy
3-4 2 Implement and manage Azure Blueprints
3-4 3 Configure and manage Azure Security Center compliance
3-4 4 Implement and manage Azure Information Protection (AIP)
4 Secure Data and Applications
4-1 Implement and manage encryption
4-1 1 Configure and manage Azure Key Vault
4-1 2 Implement and manage Azure Disk Encryption
4-1 3 Configure and manage Azure Storage encryption
4-1 4 Implement and manage Azure SQL Database encryption
4-1 5 Configure and manage Azure Cosmos DB encryption
4-2 Implement and manage data protection
4-2 1 Configure and manage Azure Backup
4-2 2 Implement and manage Azure Site Recovery
4-2 3 Configure and manage Azure Storage lifecycle management
4-2 4 Implement and manage Azure Information Protection (AIP)
4-3 Implement and manage application security
4-3 1 Configure and manage Azure Web Application Firewall (WAF)
4-3 2 Implement and manage Azure Application Gateway security
4-3 3 Configure and manage Azure Front Door security
4-3 4 Implement and manage Azure API Management security
4-4 Implement and manage identity and access for applications
4-4 1 Configure and manage Azure AD authentication for applications
4-4 2 Implement and manage OAuth2 and OpenID Connect
4-4 3 Configure and manage Azure AD B2B and B2C
4-4 4 Implement and manage Azure AD Conditional Access for applications
4-5 Implement and manage security for serverless computing
4-5 1 Configure and manage Azure Functions security
4-5 2 Implement and manage Azure Logic Apps security
4-5 3 Configure and manage Azure Event Grid security
4-5 4 Implement and manage Azure Service Bus security
Implement and Manage Azure Sentinel

Implement and Manage Azure Sentinel

Key Concepts

Detailed Explanation

Azure Sentinel Overview

Azure Sentinel is a cloud-native security information and event management (SIEM) and security orchestration automated response (SOAR) solution. It provides intelligent security analytics and threat intelligence across the enterprise, helping to detect, investigate, and respond to security threats. Azure Sentinel integrates with various data sources, including Azure services and third-party solutions, to provide a holistic view of your security operations.

Data Connectors

Data Connectors in Azure Sentinel allow you to collect data from various sources, including Azure services, on-premises environments, and third-party solutions. These connectors enable the ingestion of logs and events into Azure Sentinel, providing a centralized repository for security data. Common data connectors include Azure Activity Logs, Office 365, and AWS.

Analytics and Threat Detection

Analytics and Threat Detection in Azure Sentinel involve using advanced analytics to identify potential security threats. Azure Sentinel provides built-in analytics rules that can be customized to detect suspicious activities based on your specific environment. These rules can be configured to trigger alerts and generate incidents for further investigation.

Incident Management

Incident Management in Azure Sentinel involves the process of investigating and resolving security incidents. Azure Sentinel provides a centralized view of all incidents, allowing security teams to prioritize and manage them effectively. Incidents can be correlated with other data sources to provide a comprehensive understanding of the threat landscape.

Automation and Playbooks

Automation and Playbooks in Azure Sentinel enable the automation of security operations tasks. Playbooks are pre-defined workflows that can be triggered by specific events or alerts. These playbooks can automate responses such as isolating affected resources, sending notifications, or initiating further investigations. Automation helps in reducing response times and improving the efficiency of security operations.

Examples and Analogies

Example: Azure Sentinel Overview

Imagine Azure Sentinel as a sophisticated security operations center (SOC) for your entire enterprise. This SOC collects data from various sources, analyzes it for potential threats, and automates responses to common incidents. It acts as a centralized hub for all your security operations, providing visibility and control over your security posture.

Example: Data Connectors

Think of Data Connectors as pipelines that bring water (security data) from different sources into a central reservoir (Azure Sentinel). These pipelines ensure that all relevant data is collected and stored in one place, making it easier to analyze and monitor for potential threats.

Example: Analytics and Threat Detection

Consider Analytics and Threat Detection as a security analyst who continuously monitors the reservoir (Azure Sentinel) for any signs of contamination (security threats). This analyst uses advanced tools and techniques to identify and alert on suspicious activities, ensuring that any potential threats are quickly addressed.

Example: Incident Management

Imagine Incident Management as a command center that coordinates the response to security incidents. This center provides a centralized view of all incidents, allowing security teams to prioritize and manage them effectively. It acts as a hub for communication and coordination, ensuring that all relevant parties are informed and involved in the response.

Example: Automation and Playbooks

Think of Automation and Playbooks as automated robots that perform routine tasks in the command center. These robots can be programmed to respond to specific events or alerts, such as isolating affected resources or sending notifications. Automation helps in reducing response times and improving the efficiency of security operations, allowing human analysts to focus on more complex tasks.