9 minute read

SC-100: Microsoft Cybersecurity Architect

https://aka.ms/courseSC-100

Day 1

Zero Trust Security

Core principles: Always verify, use least privilege access, assume breach.

6 pillars of Zero Trust

  • Identity
  • Endpoints
  • Network
  • Applications
  • Data
  • Infrastructure

Zero trust is a journey, not a product; no single tool can “enable” it.

Frameworks

  • Cloud Adoption Framework (CAF): Guides cloud migration, including strategy, planning, readiness, and adoption. Landing zones are critical for scalable, secure cloud environments.
  • Well-Architected Framework (WAF): Focuses on reliability, security, cost optimization, operational excellence, and performance efficiency. Trade-offs between pillars discussed.
  • Microsoft Cybersecurity Reference Architecture (MCRA): Comprehensive reference library for security design, including anti-patterns, tool mapping, and modernization strategies. https://aka.ms/MCRA
  • Microsoft Cloud Security Benchmark (MCSB): Prioritized security controls for Azure and multi-cloud, mapped to industry standards. https://aka.ms/mcsb

Risk Management & Best Practices

Risk assessment: Impact vs. likelihood, not all risks can or should be eliminated. Importance of patching, balancing operational and security risks. Anti-patterns: Documented in the Cloud Adoption Framework, but not exhaustive.

Technical Tools & Operations

Azure Advisor: Provides recommendations aligned with the Well-Architected Framework. Landing zones: Templates and deployment scripts available for scalable Azure environments. SIEM/SOAR: Sentinel, Defender XDR, and integration with MITRE ATT&CK (https://attack.mitre.org/) for incident detection and response.

Ransomware & Resilience

Modern ransomware attacks involve both encryption and data exfiltration/extortion. Defense: Immutable backups, data classification, encryption, and incident response planning. Business continuity: Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are key metrics.

RPO RTO

Day 2

Tools for compliance management

  • Microsoft Purview (for M365)
  • Defender for Cloud (for Azure infrastructure), and their respective portals. Azure Policy and Initiatives were explained as mechanisms for enforcing technical controls and regulatory standards.

Azure Architecture & Management

Structure and relationships between tenants, subscriptions, management groups, and resource groups were clarified. Role-based access control (RBAC) and policy assignment strategies were discussed for scalable management and security. Azure Lighthouse was mentioned for cross-tenant management, especially in scenarios involving mergers and acquisitions.

Identity & Access Management

PIM

Microsoft Entra Privileged Identity Management (PIM) enables just-in-time and approval based access to privileged roles.

Synchronization options:

  • Password Hash Sync (PHS)
  • Pass-Through Authentication (PTA)
  • Federation (ADFS), with pros, cons, and failover considerations.

External user management: B2B collaboration, guest/member distinctions, and new Entra External ID for B2C scenarios. Conditional Access policies, user/sign-in risk, and mitigation strategies (MFA, password change) were covered. Detailed privileged identity management (PIM), including eligible vs. active roles, time-bombed access, and access reviews. Discussed break-glass accounts, tiered access models (Tier 0/1/2), and the evolution to the enterprise access model. Managed identities, workload identity federation, and secure application authentication patterns.

Security Operations & Monitoring

Defender for Identity, Entra ID Protection, and Defender for Endpoint were introduced for threat detection, lateral movement analysis, and endpoint security.

  • Sentinel and Defender XDR were discussed as SIEM/SOAR solutions for centralized threat detection and incident response.

Case study

Case study Identity and data security

Day 3

SOC Operations & Security Monitoring

Outlined SOC design, including tiered response (triage, investigation, hunting/communication). Introduced key metrics: Mean Time to Acknowledge (MTTA) and Mean Time to Recover (MTTR).

Discussed integration of Sentinel and Defender XDR, transition to the Defender portal, and the use of Security Copilot for incident investigation and reporting. Highlighted the importance of collecting relevant logs, tuning monitoring tools, and avoiding overcollection.

Application Security & Threat Modeling

Secure Development Lifecycle (SDL) and Secure Future Initiative. Emphasized threat modeling using STRIDE, OWASP, and deprecated DREAD models. Microsoft Threat Modeling Tool and the importance of identifying and mitigating vulnerabilities.

Discussed static vs. dynamic application security testing, dependency management, and penetration testing (including Azure-specific rules of engagement).

Data Security & Encryption

Explained data protection in three states: at rest, in transit, and in use. Covered encryption options for VMs (BitLocker, dm-crypt, FileVault), Azure Disk Encryption, and encryption at host. Detailed SQL Server protections: TLS for data in transit, Transparent Data Encryption (TDE) for data at rest, Always Encrypted for data in use, and dynamic data masking. Clarified Azure Storage encryption: customer-managed keys, customer-provided keys, and their application to BLOB storage and files.

Cloud Security Products & Solutions

Reviewed Azure Backup, Azure Arc, Azure Policy, Defender for Cloud, Sentinel, Defender XDR, Security Copilot, Entra lifecycle management, and entitlement management. Discussed the use of Global Secure Access (GSA) as a VPN replacement, application proxy, and conditional access for granular policy enforcement. Highlighted the importance of compliance frameworks (HIPAA, HITRUST) and governance for healthcare and regulated industries.

Case study

Case study Identity and data security

Day 4

Network security groups (NSG)

Are on Layer 3/4 (TCP IP layer) and can control 5 things:

  1. Source IP
  2. Destination IP
  3. Source Port
  4. Destination Port
  5. Protocol (TCP, UDP, ICMP)

Application Security Group (ASG)

Case study 1

Securing apps and data

Case study 2

Securing endpoint and infrastructure

Connect private network from different locations

To connect different networks privately over internet (on-prem, AWS, Azure) you should use VPN Gateway or SD-WAN.

SD-WAN

Software defined wide area network. In the past, it was about connecting branches to headquarter. But now with cloud, its more about connecting branches to cloud providers (Azure, AWS etc.) It is more flexible and cheaper than MPLS and apparently replaces it.

Other kids on the block

MPLS (Multiprotocol Label Switching)

Uses labels for routing instead of IP addresses. This makes it fast. Useful for real-time applications like VoIP and video conferencing. Used to connect branch offices. Its expensive and inflexible.

DMVPN

Dynamic multipoint virtual private network. Uses IpSec encryption Starts with Hub and spoke model. Used to connect office branches to central headquarter.

iWAN

intelligent WAN, fancy DMVPN.

SDN

Software defined networking. SDN Controller tells network devices how to route traffic via software. No more manual configuration of routers/switches etc.

Overview network and security tools

Azure Backup

Creates immutable backups to protect against ransomware.

Microsoft security copilot

Ai based tool to help security analysts (SOC) to investigate incidents and generate reports

Microsoft Entra

Microsoft Entra Identity Protection

Uses risk-base policies to minimize anomalous behaviour, identify compromised credentials and dangerous logins Can react dynamically based on user risk level and sign-in risk level.

Microsoft Entra Conditional access

Can enforce policies based on user, location, device state, app sensitivity and risk level. For cloud and hybrid environments. Can use Intune device compliance states like non-compliant or high-risk devices to restrict access.

Self-service Password reset (SSPR)

Allows users to reset their password without helpdesk intervention. To prevents account lockouts.

Entra ID Lifecycle Workflow

Automates user lifecycle management via workflows, like onboarding, offboarding, role changes and approval flows.

Entra Entitlement Management

Standardizes access request, approval, review and expiration for internal and external users. Provides access packages for groups of resources. Auto expiry, recurring access reviews etc.

Entra application proxy

Provides secure remote access to on-prem web apps. Works with conditional access policies. Enables SSO and MFA for on-prem apps.

Entra private access

Provides secure remote access to internal apps without VPN.

Entra public access

Provides secure access to public apps (SaaS) via conditional access policies.

Azure SQL Db - Always Encrypted

It protects sensitive data inside a database. Data is encrypted on client side and never appears as plaintext in the database system. Data is decrypted only on client side, therefore the DBA or sysadmin cannot see the data and also join, filter and sort operations are not possible on encrypted columns.

Always Encrypted with secure enclaves

It enables in-place encryption, decryption, and processing of sensitive data inside a secure enclave (protected area in memory) in the SQL server process. This (SQL server 2022+) allows filtering, joining, sorting and grouping on encrypted columns.

Azure Application Gateway

Used for routing and managing http/https traffic to web apps.

Purview

Information protection in M365 to label information based on sensitivity.

Purview Data Loss Prevention (DLP)

It detects sensitive information in M365 (emails, documents) and prevents data leaks via policies. Warns or blocks users from sharing sensitive information externally.

Purview eDiscovery

Focuses on legal investigations.

MS Intune

Centralizes device management for mobile devices and computers.

Azure Arc

Agent to install on non-azure resources like on-prem servers or other cloud providers to manage them via azure portal. It enables centralized visibility and compliance enforcement for Kubernetes (apply policies across EKS and AKS.) ARM (azure resource manager) can be used to deploy configurations to Arc-enabled servers and kubernetes clusters. Azure Arc can enable Azure policy and Defender for Containers on EKS. Azure Arc is used to configure workload identity federation for EKS clusters for access Azure SQL DB, cosmos DB, Azure key vaults etc. via Entry ID.

Is used with Guest configuration to enforce security baselines (password policies, firewall, autdit settings on OS level) on VMs (on-prem or other clouds)

Azure Arc can be used to configure admission controllers for EKS/AKS clusters.

Azure Policy

It automates compliance enforcement for Kubernetes deployments across EKS and AKS clusters. Preventing misconfiguration via Azure Arc. Supports regulations like HIPAA and HITRUST and can apply policies to azure resources and via Azure Arc to non-azure resources.

Azure lighthouse

Provide access to a subscription over different tenants.

Azure ioT Edge

Azure IoT Hub

Microsoft Sentinel

It is the SIEM/SOAR solution from microsoft.

MS Sentinel integrates with:

  • Microsoft Defender XDR
  • Defender for Cloud
  • Defender for Cloud apps
  • Defender for containers (EKS/AKS)
  • Defender for IoT

Allows automated remediation via playbooks and integrated ticketing systems. (alerting) It also integrates with Microsoft security copilot for ai based incident investigation and report generation.

Microsoft Sentinel can also aggregate logs from regional SIEMs.

Azure Container registry (ACR) Tasks

Automate container image builds and patching.

Azure container instances (ACI)

Runs containers without managing servers. Doesnt provide vulnerability scanning or automated updates of open-source dependencies or base images.

Microsoft Defender family

Microsoft Defender XDR

It is the extended detection and response platform. Provides unified investigation across endpoints, IoT, email and cloud apps. It correlates signals across endpoints email, identities and cloud apps to detect sophisticated attacks.

Microsoft Defender for Endpoint

It protects end-user devices and servers from malware, ransomware. It surfaces vulnerabilities in Intune managed devices and can automate response and remediation.

You can deploy this agent on all Intune managed devices via Intune app deployment policies.

Has advanced features like Automated investigation and remediation (AIR) and Endpoint detection and response (EDR). This features can run in block mode to stop malicious activities automatically.

Microsoft Defender for cloud

Can display dashboard for compliance posture.

Azure Defender for Cloud Apps

It secures cloud apps after deployment. Extends visibility to cloud app permissions and Oauth tokens, detecting excessive or risky permissions.

Azure Defender for Cloud DevOps security

Complements Azure Policy by helping to enforce security earlier in the development lifecycle. Provides automated scanning for vulnerabilities and misconfiguration in code, IaC and containers in CI/CD pipelines.

Microsoft Defender for Containers - AKS/EKS

It provides runtime protection and vulnerability management for container workloads running in AKS or EKS clusters.

Microsoft Defender for Identities

Correlates signals from AD and Entra ID, analyzes attack timelines and lateral movement paths. Can identify credential theft and lateral movement based on domain controllers logs from AD.

Workload identity for EKS/AKS

Workloads identity enable pods to authenticate with short-lived tokens. They integrate with Entra ID for AKS, IAM roles for EKS and extend Entra ID to EKS via Azure Arc. In AKS its called Workload identities In EKS its called IAM roles for service accounts (IRSA)

Azure VPN Gateway

Enable secure IPsec tunnel between on-premises, AWS EKS and Azure networks.

Certificate SC-100

certificate path

Go truth this: https://learn.microsoft.com/en-us/training/courses/sc-100t00?wt.mc_id=esi_m2l_content_wwl#study-guide

Watch this: https://learn.microsoft.com/de-de/shows/exam-readiness-zone/preparing-for-sc-100-design-solutions-that-align-with-security-best-practices-and-priorities

  • Taking Sc-100 doesn’t give you the three star badge automatically.
  • You need to pass also AZ-500, SC-200, SC-300

  • Design solution with guidance of CAF (Cloud Adoption Framework)
  • Design solution with guidance of WAF (Well-Architected Framework)
  • Design solution with guidance of MCRA (Microsoft Cybersecurity Reference Architecture)
  • Design solution with guidance of MCSB (Microsoft Cloud Security Benchmark)

Read this: https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-100?source=docs Train this: https://learn.microsoft.com/en-us/credentials/certifications/exams/sc-100/practice/assessment?assessment-type=practice&assessmentId=87

Register here: https://learn.microsoft.com/de-de/credentials/certifications/exams/sc-100/

Categories:

Updated: