Study Guide: Microsoft Cybersecurity Architect
Study guide to SC-100: Microsoft Cybersecurity Architect
🏡Reference Architectures and Best Practice🏡
Well-Architected Framework: Essential for building secure, high-performing, resilient, and efficient cloud infrastructure, aligning with Zero Trust principles.
Cloud Adoption Framework: Focuses on effective implementation and security integration in cloud technologies, emphasizing hybrid and multicloud environments.
🔥Microsoft Cybersecurity Reference Architecture🔥 : Critical for understanding the interconnectivity and comprehensive capabilities of Microsoft's security solutions. Most of the questions revolve around this; take a look at the powerpoint to get an overview.
Microsoft Security Benchmark: Provides a standard for security baselines, important for designing solutions that align with best practices and priorities.
Rapid Application Modernization Program: Relevant for modernizing applications with an emphasis on security, particularly in cloud-based solutions.
Microsoft DART ransomware approach and best practices: List of best practices around Ransomware. Some key elements are listed below.
💻Products💻
Purview: Not just for data governance, but also crucial for data discovery, classification, and compliance as per regulatory requirements.
Sentinel: SIEM and SOAR - for designing security operations and threat intelligence integration.
EntraID/Azure AD: Central to managing external identities in hybrid and multicloud scenarios.
Defender for Cloud: Essential for evaluating and improving security posture and for integrated security management in hybrid and multicloud environments.
Defender XDR/Defender 365: Plays a vital role in securing Microsoft 365 environments, aligning with Microsoft's security best practices. Including Defender for Endpoint, Defender for Office, Threat Management, Defender for Identity, Defender for Cloud Apps and more.
Intune: Compliance management for endpoints.
⚡️Highlighted Security Features⚡️
AZ Bastion: Key for secure remote access and part of a broader strategy for protecting cloud services. Typical questions around how it works, use-cases and secure remote access.
Conditional Access: Modern multi factor authentication and authorization , aligning with a Zero Trust strategy.
PIM/PAM: Central to designing identity governance solutions and managing privileged roles.
WAF (Web Application Firewall): Essential for securing web workloads and applications.
Data Catalog & Data Map: Important for a comprehensive data security strategy, particularly for data at rest and in motion.
AZ Arc: Vital for integrating hybrid and multicloud environments.
AZ Update Manager & AZ Policy: Important for maintaining compliance and security in Azure environments.
AZ Blueprint & AZ Lighthouse: Useful for creating and managing secure, governed Azure environments at scale.
Entitlement Management: Key for access management and compliance.
Data Connectors in Sentinel: Crucial for a comprehensive security operations strategy.
B2C and B2B: Important for designing solutions for external identities.
🦹🏻♂️Ransomware Best Practices🦹🏻♂️
Backup: Aligns with Microsoft's ransomware best practices, including restore strategies.
Pins: (General knowledge) Part of secure authentication in a broader security strategy.
Resource Lock: Important for protecting Azure resources as part of a business resiliency strategy.