Azure Security Engineer Associate (AZ-500)
1 Manage Identity and Access
1-1 Implement and manage Azure Active Directory (Azure AD)
1-1 1 Configure Azure AD users and groups
1-1 2 Manage Azure AD roles and role-based access control (RBAC)
1-1 3 Implement and manage Azure AD identity protection
1-1 4 Configure and manage Azure AD conditional access policies
1-1 5 Implement and manage Azure AD Privileged Identity Management (PIM)
1-1 6 Configure and manage Azure AD B2B and B2C
1-1 7 Implement and manage Azure AD Connect
1-1 8 Configure and manage Azure AD Domain Services
1-2 Implement and manage hybrid identity
1-2 1 Configure and manage Azure AD Connect
1-2 2 Implement and manage password hash synchronization
1-2 3 Implement and manage pass-through authentication
1-2 4 Implement and manage federation
1-2 5 Configure and manage Azure AD Connect Health
1-3 Implement and manage multi-factor authentication (MFA)
1-3 1 Configure and manage Azure AD MFA
1-3 2 Implement and manage conditional access policies with MFA
1-3 3 Configure and manage MFA for on-premises users
1-4 Implement and manage Azure role-based access control (RBAC)
1-4 1 Configure and manage Azure RBAC roles and assignments
1-4 2 Implement and manage custom roles
1-4 3 Configure and manage resource locks
1-4 4 Implement and manage Azure Blueprints
1-5 Implement and manage Azure AD Privileged Identity Management (PIM)
1-5 1 Configure and manage PIM roles and assignments
1-5 2 Implement and manage PIM alerts and reports
1-5 3 Configure and manage PIM access reviews
2 Implement Platform Protection
2-1 Implement and manage network security
2-1 1 Configure and manage Azure Firewall
2-1 2 Implement and manage Azure DDoS protection
2-1 3 Configure and manage network security groups (NSGs)
2-1 4 Implement and manage Azure Network Watcher
2-1 5 Configure and manage Azure Bastion
2-1 6 Implement and manage Azure Private Link
2-1 7 Configure and manage Azure VPN Gateway
2-1 8 Implement and manage Azure ExpressRoute
2-2 Implement and manage storage security
2-2 1 Configure and manage Azure Storage account security
2-2 2 Implement and manage Azure Storage encryption
2-2 3 Configure and manage Azure Storage access control
2-2 4 Implement and manage Azure Storage firewalls and virtual networks
2-2 5 Configure and manage Azure Storage service encryption
2-3 Implement and manage virtual machine security
2-3 1 Configure and manage virtual machine (VM) security
2-3 2 Implement and manage VM encryption
2-3 3 Configure and manage VM access control
2-3 4 Implement and manage VM security baselines
2-3 5 Configure and manage VM extensions for security
2-4 Implement and manage container security
2-4 1 Configure and manage Azure Kubernetes Service (AKS) security
2-4 2 Implement and manage container image security
2-4 3 Configure and manage container registry security
2-4 4 Implement and manage container network security
2-5 Implement and manage application security
2-5 1 Configure and manage Azure Web Application Firewall (WAF)
2-5 2 Implement and manage Azure Application Gateway security
2-5 3 Configure and manage Azure Front Door security
2-5 4 Implement and manage Azure API Management security
3 Manage Security Operations
3-1 Implement and manage security monitoring
3-1 1 Configure and manage Azure Security Center
3-1 2 Implement and manage Azure Sentinel
3-1 3 Configure and manage Azure Monitor
3-1 4 Implement and manage Azure Log Analytics
3-1 5 Configure and manage Azure Activity Log
3-2 Implement and manage threat detection
3-2 1 Configure and manage Azure Advanced Threat Protection (ATP)
3-2 2 Implement and manage Azure Defender
3-2 3 Configure and manage Azure Security Center alerts
3-2 4 Implement and manage Azure Sentinel alerts
3-3 Implement and manage incident response
3-3 1 Configure and manage Azure Security Center incident response
3-3 2 Implement and manage Azure Sentinel incident response
3-3 3 Configure and manage Azure Automation for incident response
3-3 4 Implement and manage Azure Key Vault for incident response
3-4 Implement and manage compliance and governance
3-4 1 Configure and manage Azure Policy
3-4 2 Implement and manage Azure Blueprints
3-4 3 Configure and manage Azure Security Center compliance
3-4 4 Implement and manage Azure Information Protection (AIP)
4 Secure Data and Applications
4-1 Implement and manage encryption
4-1 1 Configure and manage Azure Key Vault
4-1 2 Implement and manage Azure Disk Encryption
4-1 3 Configure and manage Azure Storage encryption
4-1 4 Implement and manage Azure SQL Database encryption
4-1 5 Configure and manage Azure Cosmos DB encryption
4-2 Implement and manage data protection
4-2 1 Configure and manage Azure Backup
4-2 2 Implement and manage Azure Site Recovery
4-2 3 Configure and manage Azure Storage lifecycle management
4-2 4 Implement and manage Azure Information Protection (AIP)
4-3 Implement and manage application security
4-3 1 Configure and manage Azure Web Application Firewall (WAF)
4-3 2 Implement and manage Azure Application Gateway security
4-3 3 Configure and manage Azure Front Door security
4-3 4 Implement and manage Azure API Management security
4-4 Implement and manage identity and access for applications
4-4 1 Configure and manage Azure AD authentication for applications
4-4 2 Implement and manage OAuth2 and OpenID Connect
4-4 3 Configure and manage Azure AD B2B and B2C
4-4 4 Implement and manage Azure AD Conditional Access for applications
4-5 Implement and manage security for serverless computing
4-5 1 Configure and manage Azure Functions security
4-5 2 Implement and manage Azure Logic Apps security
4-5 3 Configure and manage Azure Event Grid security
4-5 4 Implement and manage Azure Service Bus security
Implement and Manage Incident Response

Implement and Manage Incident Response

Key Concepts

Detailed Explanation

Incident Response Plan

An Incident Response Plan is a documented, written plan with instructions on responding to security incidents. It outlines the roles and responsibilities of the incident response team, the procedures for handling different types of incidents, and the communication strategies. A well-defined plan ensures a structured and efficient response to security breaches.

Detection and Analysis

Detection and Analysis involve identifying and understanding the nature of a security incident. This phase includes monitoring systems for suspicious activities, collecting and analyzing logs, and determining the scope and impact of the incident. Effective detection and analysis help in prioritizing incidents and planning the response strategy.

Containment, Eradication, and Recovery

Containment, Eradication, and Recovery are the steps taken to stop the incident from spreading, remove the threat, and restore normal operations. Containment involves isolating affected systems to prevent further damage. Eradication focuses on removing the root cause of the incident. Recovery involves restoring affected systems and services to their normal state.

Post-Incident Activity

Post-Incident Activity includes the actions taken after the incident has been resolved. This phase involves documenting the incident, analyzing the response process, and identifying lessons learned. Post-incident activities help in improving the incident response plan and preparing for future incidents.

Automation in Incident Response

Automation in Incident Response involves using automated tools and scripts to handle routine tasks during an incident. Automation can speed up the response process, reduce human error, and ensure consistent handling of incidents. Tools like Azure Automation and Azure Logic Apps can be used to automate various aspects of incident response.

Examples and Analogies

Example: Incident Response Plan

Imagine the Incident Response Plan as a fire drill manual for a building. This manual outlines the roles of firefighters, evacuation routes, and communication strategies. Just like a fire drill manual prepares the building occupants for a fire, an Incident Response Plan prepares the organization for security incidents.

Example: Detection and Analysis

Think of Detection and Analysis as a security guard monitoring a building for suspicious activities. The guard uses cameras and sensors to detect any unusual behavior, collects evidence, and analyzes the situation to determine the extent of the threat. Effective monitoring and analysis help in identifying and understanding security incidents.

Example: Containment, Eradication, and Recovery

Consider Containment, Eradication, and Recovery as the steps taken by a medical team to treat a patient with a contagious disease. The team isolates the patient to prevent the spread of the disease (containment), administers treatment to eliminate the disease (eradication), and ensures the patient recovers fully (recovery).

Example: Post-Incident Activity

Imagine Post-Incident Activity as the follow-up actions taken after a fire in a building. The building management documents the fire, analyzes the response process, and identifies improvements for future fires. These activities help in enhancing the fire safety measures and preparing for any future incidents.

Example: Automation in Incident Response

Think of Automation in Incident Response as automated sprinklers in a building. These sprinklers detect a fire and automatically activate to contain the fire, reducing the need for manual intervention. Similarly, automation in incident response speeds up the response process and ensures consistent handling of incidents.