Azure Security Engineer Associate (AZ-500)
1 Manage Identity and Access
1-1 Implement and manage Azure Active Directory (Azure AD)
1-1 1 Configure Azure AD users and groups
1-1 2 Manage Azure AD roles and role-based access control (RBAC)
1-1 3 Implement and manage Azure AD identity protection
1-1 4 Configure and manage Azure AD conditional access policies
1-1 5 Implement and manage Azure AD Privileged Identity Management (PIM)
1-1 6 Configure and manage Azure AD B2B and B2C
1-1 7 Implement and manage Azure AD Connect
1-1 8 Configure and manage Azure AD Domain Services
1-2 Implement and manage hybrid identity
1-2 1 Configure and manage Azure AD Connect
1-2 2 Implement and manage password hash synchronization
1-2 3 Implement and manage pass-through authentication
1-2 4 Implement and manage federation
1-2 5 Configure and manage Azure AD Connect Health
1-3 Implement and manage multi-factor authentication (MFA)
1-3 1 Configure and manage Azure AD MFA
1-3 2 Implement and manage conditional access policies with MFA
1-3 3 Configure and manage MFA for on-premises users
1-4 Implement and manage Azure role-based access control (RBAC)
1-4 1 Configure and manage Azure RBAC roles and assignments
1-4 2 Implement and manage custom roles
1-4 3 Configure and manage resource locks
1-4 4 Implement and manage Azure Blueprints
1-5 Implement and manage Azure AD Privileged Identity Management (PIM)
1-5 1 Configure and manage PIM roles and assignments
1-5 2 Implement and manage PIM alerts and reports
1-5 3 Configure and manage PIM access reviews
2 Implement Platform Protection
2-1 Implement and manage network security
2-1 1 Configure and manage Azure Firewall
2-1 2 Implement and manage Azure DDoS protection
2-1 3 Configure and manage network security groups (NSGs)
2-1 4 Implement and manage Azure Network Watcher
2-1 5 Configure and manage Azure Bastion
2-1 6 Implement and manage Azure Private Link
2-1 7 Configure and manage Azure VPN Gateway
2-1 8 Implement and manage Azure ExpressRoute
2-2 Implement and manage storage security
2-2 1 Configure and manage Azure Storage account security
2-2 2 Implement and manage Azure Storage encryption
2-2 3 Configure and manage Azure Storage access control
2-2 4 Implement and manage Azure Storage firewalls and virtual networks
2-2 5 Configure and manage Azure Storage service encryption
2-3 Implement and manage virtual machine security
2-3 1 Configure and manage virtual machine (VM) security
2-3 2 Implement and manage VM encryption
2-3 3 Configure and manage VM access control
2-3 4 Implement and manage VM security baselines
2-3 5 Configure and manage VM extensions for security
2-4 Implement and manage container security
2-4 1 Configure and manage Azure Kubernetes Service (AKS) security
2-4 2 Implement and manage container image security
2-4 3 Configure and manage container registry security
2-4 4 Implement and manage container network security
2-5 Implement and manage application security
2-5 1 Configure and manage Azure Web Application Firewall (WAF)
2-5 2 Implement and manage Azure Application Gateway security
2-5 3 Configure and manage Azure Front Door security
2-5 4 Implement and manage Azure API Management security
3 Manage Security Operations
3-1 Implement and manage security monitoring
3-1 1 Configure and manage Azure Security Center
3-1 2 Implement and manage Azure Sentinel
3-1 3 Configure and manage Azure Monitor
3-1 4 Implement and manage Azure Log Analytics
3-1 5 Configure and manage Azure Activity Log
3-2 Implement and manage threat detection
3-2 1 Configure and manage Azure Advanced Threat Protection (ATP)
3-2 2 Implement and manage Azure Defender
3-2 3 Configure and manage Azure Security Center alerts
3-2 4 Implement and manage Azure Sentinel alerts
3-3 Implement and manage incident response
3-3 1 Configure and manage Azure Security Center incident response
3-3 2 Implement and manage Azure Sentinel incident response
3-3 3 Configure and manage Azure Automation for incident response
3-3 4 Implement and manage Azure Key Vault for incident response
3-4 Implement and manage compliance and governance
3-4 1 Configure and manage Azure Policy
3-4 2 Implement and manage Azure Blueprints
3-4 3 Configure and manage Azure Security Center compliance
3-4 4 Implement and manage Azure Information Protection (AIP)
4 Secure Data and Applications
4-1 Implement and manage encryption
4-1 1 Configure and manage Azure Key Vault
4-1 2 Implement and manage Azure Disk Encryption
4-1 3 Configure and manage Azure Storage encryption
4-1 4 Implement and manage Azure SQL Database encryption
4-1 5 Configure and manage Azure Cosmos DB encryption
4-2 Implement and manage data protection
4-2 1 Configure and manage Azure Backup
4-2 2 Implement and manage Azure Site Recovery
4-2 3 Configure and manage Azure Storage lifecycle management
4-2 4 Implement and manage Azure Information Protection (AIP)
4-3 Implement and manage application security
4-3 1 Configure and manage Azure Web Application Firewall (WAF)
4-3 2 Implement and manage Azure Application Gateway security
4-3 3 Configure and manage Azure Front Door security
4-3 4 Implement and manage Azure API Management security
4-4 Implement and manage identity and access for applications
4-4 1 Configure and manage Azure AD authentication for applications
4-4 2 Implement and manage OAuth2 and OpenID Connect
4-4 3 Configure and manage Azure AD B2B and B2C
4-4 4 Implement and manage Azure AD Conditional Access for applications
4-5 Implement and manage security for serverless computing
4-5 1 Configure and manage Azure Functions security
4-5 2 Implement and manage Azure Logic Apps security
4-5 3 Configure and manage Azure Event Grid security
4-5 4 Implement and manage Azure Service Bus security
Implement and Manage Azure Blueprints

Implement and Manage Azure Blueprints

Key Concepts

Detailed Explanation

Azure Blueprints Overview

Azure Blueprints is a service that allows organizations to define a repeatable set of Azure resources and policies. It enables consistent and compliant environments to be quickly deployed, ensuring that all resources adhere to organizational standards and regulatory requirements.

Blueprint Definitions

Blueprint Definitions are the core components of Azure Blueprints. They are composed of artifacts such as resource templates, role assignments, and policy assignments. A blueprint definition serves as a template that can be reused across different subscriptions or management groups.

Artifacts

Artifacts are the individual components that make up a blueprint definition. These can include Resource Manager templates, role assignments, policy assignments, and resource groups. Each artifact is configured to meet specific requirements and can be customized as needed.

Blueprint Assignments

Blueprint Assignments are the process of applying a blueprint definition to a specific scope, such as a subscription or management group. Once assigned, the blueprint will deploy the defined resources and apply the configured policies and roles, ensuring compliance and consistency.

Versioning and Updates

Versioning and Updates allow organizations to manage changes to blueprint definitions over time. Each version of a blueprint can be tracked and managed, ensuring that updates can be applied in a controlled manner. This feature helps in maintaining compliance and consistency as organizational requirements evolve.

Examples and Analogies

Example: Azure Blueprints Overview

Imagine Azure Blueprints as a construction blueprint for building a house. Just as a construction blueprint outlines the layout, materials, and specifications for a house, Azure Blueprints outline the resources, policies, and configurations for an Azure environment.

Example: Blueprint Definitions

Think of Blueprint Definitions as the detailed plans for a house. These plans include the architectural drawings, electrical layouts, and plumbing specifications. Similarly, a blueprint definition in Azure Blueprints includes the resource templates, role assignments, and policy assignments needed to build an Azure environment.

Example: Artifacts

Consider Artifacts as the individual components of a house, such as the foundation, walls, and roof. Each component is essential for the overall structure and can be customized to meet specific needs. In Azure Blueprints, artifacts like Resource Manager templates and policy assignments are the building blocks that make up the blueprint definition.

Example: Blueprint Assignments

Imagine Blueprint Assignments as the process of constructing the house based on the blueprint. Once the plans are finalized, the construction team follows the blueprint to build the house, ensuring that all components are installed according to the specifications. Similarly, in Azure Blueprints, an assignment applies the blueprint definition to a specific scope, deploying the resources and applying the policies as defined.

Example: Versioning and Updates

Think of Versioning and Updates as the process of making changes to the house plans over time. As the family grows or needs change, the architect may update the plans to add a new room or modify the layout. These changes are tracked and managed to ensure that the house remains functional and meets the family's needs. In Azure Blueprints, versioning and updates allow organizations to manage changes to their blueprint definitions, ensuring that their Azure environments remain compliant and consistent.