
What better than to have started blogging about my exam preparation notes that with this perfectly representative AZ-500: Microsoft Azure Security Technologies exam from Microsoft! I had taken this when it was in Beta format and narrowly failed the exam, arguably because I hadn’t prepared one bit for the concepts being evaluated. Sure, you *could* rely on roughly 10 years of Azure experience, but as this technology changes daily, I highly recommend preparing fully for this expansive exam!
I also understand that there might be live labs with tasks you need to complete, but your mileage may vary – I wouldn’t be surprised, but if you have fully prepared for this exam, you should have NOTHING to worry about!
Let’s start with a link to the exam details itself, as these skills definitions sometimes change without notice: https://www.microsoft.com/en-us/learning/exam-az-500.aspx.
If you’re looking to take some of the pressure off of your exam tries, consider purchasing the MCP + exam retake package: https://us.mindhub.com/microsoft-exam-replay-mcp-exam-plus-retake/p/Microsoft-Exam-Replay
If you’re looking for courses to learn the materials, here are a few recommendations:
Skylines Academy ($99 USD): https://courses.skylinesacademy.com/p/az-500
EDx course (free): https://openedx.microsoft.com/courses/course-v1:Microsoft+AZ-500.0+2019_T2/course/
Below, I have broken out each of the exam sections into links for both docs.microsoft.com and MSLearn resources to jump start learning for each of the exam pillars/domains:
Manage identity and access (20-25%)
Configure Microsoft Azure Active Directory for workloads
- create App registration: https://docs.microsoft.com/en-us/azure/active-directory/develop/azure-ad-endpoint-comparison
- configure App registration permission scopes
- manage App registration permission consent
- configure multi-factor authentication settings
- manage Microsoft Azure AD directory groups
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-groups-view-azure-portal
- https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/groups-self-service-management
- https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/groups-settings-v2-cmdlets
- manage Microsoft Azure AD users
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/add-users-azure-active-directory
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/license-users-groups
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-users-restore
- install and configure Microsoft Azure AD Connect
- https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-install-express
- https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-install-custom
- https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta-quick-start
- Upgrading AD Connect: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-upgrade-previous-version
- AD Connect Health: https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-health-agent-install
- configure authentication methods
- implement conditional access policies
- https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access
- https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/best-practices
- https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-adoption-kit
- MS Learn course: https://docs.microsoft.com/en-us/learn/modules/secure-azure-resources-with-conditional-access/
- configure Microsoft Azure AD identity protection
Configure Microsoft Azure AD Privileged Identity Management
- monitor privileged access
- configure access reviews
- https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-start-security-review
- https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-perform-security-review
- https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-how-to-complete-review
- activate Privileged Identity Management
Configure Microsoft Azure tenant security
- transfer Microsoft Azure subscriptions between Microsoft Azure AD tenants
- manage API access to Microsoft Azure subscriptions and resources
- https://docs.microsoft.com/en-us/azure/api-management/
- https://docs.microsoft.com/en-us/azure/api-management/get-started-create-service-instance
- https://docs.microsoft.com/en-us/azure/api-management/powershell-create-service-instance
- https://docs.microsoft.com/en-us/azure/api-management/transform-api
Implement platform protection (35-40%)
Implement network security
- configure virtual network connectivity
- configure Network Security Groups (NSGs)
- create and configure Microsoft Azure firewall
- create and configure application security groups
- configure remote access management
- configure baseline
- configure resource firewall
Implement host security
- configure endpoint security within the VM
- configure VM security
- harden VMs in Microsoft Azure
- configure system updates for VMs in Microsoft Azure
- configure baseline
Configure container security (MSLearn course on Administering containers in Azure: https://docs.microsoft.com/en-us/learn/paths/administer-containers-in-azure/ )
- configure network
- configure authentication
- https://docs.microsoft.com/en-us/azure/container-registry/container-registry-authentication
- https://docs.microsoft.com/en-us/azure/container-registry/container-registry-auth-service-principal
- https://docs.microsoft.com/en-us/azure/container-registry/container-registry-authentication-managed-identity
- https://docs.microsoft.com/en-us/azure/container-registry/container-registry-auth-aks
- configure container isolation
- configure AKS security
- configure container registry
- configure container instance security
- implement vulnerability management
Implement Microsoft Azure Resource management security (MSLearn course on Managing Azure Resources: https://docs.microsoft.com/en-us/learn/paths/manage-resources-in-azure/)
- create Microsoft Azure resource locks
- manage resource group security
- configure Microsoft Azure policies
- https://docs.microsoft.com/en-us/azure/governance/policy/overview
- https://docs.microsoft.com/en-us/azure/governance/policy/tutorials/create-and-manage
- https://docs.microsoft.com/en-us/azure/governance/policy/tutorials/create-custom-policy-definition
- https://handsonlabs.microsoft.com/handsonlabs/SelfPacedLabs?storyId=story://content-private/content/sp-azuregovernance/1-azpolicy/a-policy
- configure custom RBAC roles
- https://docs.microsoft.com/en-us/learn/modules/secure-azure-resources-with-rbac/index
- https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles
- https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles-powershell
- https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles-cli
- configure subscription and resource permissions
- https://docs.microsoft.com/en-us/azure/billing/billing-add-change-azure-subscription-administrator
- https://docs.microsoft.com/en-us/azure/governance/management-groups/create?toc=%2Fazure%2Fbilling%2FTOC.json
- https://docs.microsoft.com/en-us/azure/governance/management-groups/create
- https://docs.microsoft.com/en-us/azure/governance/management-groups/manage
Manage security operations (15-20%)
Configure security services
- configure Microsoft Azure monitor
- configure Microsoft Azure log analytics
- https://docs.microsoft.com/en-us/azure/azure-monitor/terminology
- https://docs.microsoft.com/en-us/learn/modules/analyze-infrastructure-with-azure-monitor-logs/
- https://docs.microsoft.com/en-us/azure/azure-monitor/insights/solutions
- https://docs.microsoft.com/en-us/azure/azure-monitor/log-query/log-query-overview
- configure diagnostic logging and log retention
- configure vulnerability scanning
Configure security policies
- configure centralized policy management by using Microsoft Azure Security Center
- https://docs.microsoft.com/en-us/azure/security-center/security-center-policy-definitions
- https://docs.microsoft.com/en-us/azure/security-center/security-center-onboarding
- https://docs.microsoft.com/en-us/azure/security-center/tutorial-security-policy
- https://docs.microsoft.com/en-us/azure/security-center/security-center-recommendations
- configure Just in Time VM access by using Microsoft Azure Security Center
Manage security alerts
- create and customize alerts
- review and respond to alerts and recommendations
- configure a playbook for a security event by using Microsoft Azure Security Center
- investigate escalated security incidents
Secure data and applications (30-35%)
Configure security policies to manage data
- configure data classification
- configure data retention
- configure data sovereignty
- https://azure.microsoft.com/en-us/global-infrastructure/geographies/
- https://docs.microsoft.com/en-us/azure/china/overview-sovereignty-and-regulations
- https://docs.microsoft.com/en-us/azure/security/fundamentals/physical-security
- https://docs.microsoft.com/en-us/azure/security/fundamentals/protection-customer-data
Configure security for data infrastructure
- enable database authentication
- enable database auditing
- configure Microsoft Azure SQL Database threat detection
- configure access control for storage accounts
- configure key management for storage accounts
- create and manage Shared Access Signatures (SAS)
- configure security for HDInsights
- configure security for Cosmos DB
- configure security for Microsoft Azure Data Lake
Configure encryption for data at rest
- implement Microsoft Azure SQL Database Always Encrypted
- implement database encryption
- implement Storage Service Encryption
- implement disk encryption
- https://docs.microsoft.com/en-us/azure/security/azure-security-disk-encryption-prerequisites
- https://docs.microsoft.com/en-us/azure/security/azure-security-disk-encryption-windows
- https://docs.microsoft.com/en-us/azure/virtual-machines/linux/disk-encryption-overview
- https://docs.microsoft.com/en-us/azure/security/azure-security-disk-encryption-extension-sequencing
- implement backup encryption
Implement security for application delivery
- implement security validations for application development
- configure synthetic security transactions
Configure application security
- configure SSL/TLS certs
- configure Microsoft Azure services to protect web apps
- https://docs.microsoft.com/en-us/azure/app-service/app-service-authentication-how-to
- https://docs.microsoft.com/en-us/azure/app-service/app-service-ip-restrictions
- https://docs.microsoft.com/en-us/azure/app-service/overview-managed-identity
- https://docs.microsoft.com/en-us/azure/app-service/app-service-key-vault-references
- create an application security baseline
Configure and manage Key Vault
- manage access to Key Vault
- manage permissions to secrets, certificates, and keys
- manage certificates
- manage secrets
- configure key rotation
Best of luck to you on your studies and learning journeys, and do let me know how you did when you sit the exam. Also, if this resource helps you, please share with others!
Last, but certainly not least, I owe the inspiration to blog my cloud experience and expertise to both Gregor Suttie and Richard Hooper (aka Pixel Robots). They have fully embraced #HustleAsAService for the past few years, and have made the Azure community better with their efforts! I can only hope to follow in their footsteps and provide the #AzureFamily community yet another learning perspective!