CC
ClearCertify
首页
首页
AZ-500
AZ-500
考试指南
考试指南
🌐
中文
Login
Sign Up
返回到 AZ-500
官方 AZ-500 考试指南
考试格式、领域和准备技巧
AZ-500: Microsoft Azure Security Technologies Study Guide
Exam Overview
Certification
: Microsoft Azure Security Engineer Associate
Exam Code
: AZ-500
Target Audience
: Security engineers implementing, managing, and monitoring security for Azure resources
Experience Required
: Practical experience in Azure administration, strong familiarity with Microsoft Entra ID, compute, network, and storage
Skills Measured (as of January 31, 2025)
1. Secure Identity and Access (15-20%)
Manage Security Controls for Identity and Access
Manage Azure built-in role assignments
Manage custom roles (Azure roles and Microsoft Entra roles)
Implement and manage Microsoft Entra Permissions Management
Plan and manage Azure resources in Microsoft Entra Privileged Identity Management
Implement multi-factor authentication (MFA) for Azure resources
Implement Conditional Access policies for cloud resources
Manage Microsoft Entra application access
Manage Microsoft Entra Application Access
Manage access to enterprise applications (including OAuth permission grants)
Manage Microsoft Entra app registrations
Configure app registration permission scopes
Manage app registration permission consent
Manage and use service principals
Manage managed identities
2. Secure Networking (20-25%)
Plan and Implement Security for Virtual Networks
Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs)
Manage virtual networks using Azure Virtual Network Manager
Plan and implement user-defined routes (UDRs)
Plan and implement Virtual Network peering or VPN gateway
Plan and implement Virtual WAN (including secured virtual hub)
Secure VPN connectivity (point-to-site and site-to-site)
Implement encryption over ExpressRoute
Configure firewall settings on Azure resources
Monitor network security using Network Watcher
Plan and Implement Security for Private Access to Azure Resources
Plan and implement virtual network Service Endpoints
Plan and implement Private Endpoints
Plan and implement Private Link services
Plan and implement network integration for App Service and Functions
Network security configurations for App Service Environment (ASE)
Network security configurations for Azure SQL Managed Instance
Plan and Implement Security for Public Access to Azure Resources
Plan and implement TLS to applications (App Service, API Management)
Plan, implement, and manage Azure Firewall (including Firewall Manager)
Plan and implement Azure Application Gateway
Plan and implement Azure Front Door (including CDN)
Plan and implement Web Application Firewall (WAF)
Recommend when to use Azure DDoS Protection Standard
3. Secure Compute, Storage, and Databases (20-25%)
Plan and Implement Advanced Security for Compute
Plan and implement remote access to VMs (Azure Bastion, JIT)
Configure network isolation for Azure Kubernetes Service (AKS)
Secure and monitor AKS
Configure authentication for AKS
Configure security monitoring for Azure Container Instances
Configure security monitoring for Azure Container Apps
Manage access to Azure Container Registry
Configure disk encryption (ADE, encryption at host, confidential disk encryption)
Recommend security configurations for Azure API Management
Plan and Implement Security for Storage
Configure access control for storage accounts
Manage storage account access keys
Select and configure access to Azure Files
Select and configure access to Azure Blob Storage
Protect against data security threats (soft delete, backups, versioning, immutable storage)
Configure Bring Your Own Key (BYOK)
Enable double encryption at Azure Storage infrastructure level
Plan and Implement Security for Azure SQL Database and SQL Managed Instance
Enable Microsoft Entra database authentication
Enable database auditing
Plan and implement dynamic masking
Implement Transparent Data Encryption (TDE)
Recommend when to use Azure SQL Database Always Encrypted
4. Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel (30-35%)
Implement and Manage Enforcement of Cloud Governance Policies
Create, assign, and interpret policies and initiatives in Azure Policy
Configure Azure Key Vault network settings
Configure access to Key Vault (vault access policies and Azure RBAC)
Manage certificates, secrets, and keys
Configure key rotation
Perform backup and recovery of certificates, secrets, and keys
Implement security controls to protect backups
Implement security controls for asset management
Manage Security Posture Using Microsoft Defender for Cloud
Identify and remediate security risks using Secure Score and Inventory
Assess compliance against security frameworks
Manage compliance standards
Add custom standards
Connect hybrid cloud and multi-cloud environments (AWS, GCP)
Implement and use Microsoft Defender External Attack Surface Management
Configure and Manage Threat Protection Using Microsoft Defender for Cloud
Enable workload protection services
Configure Microsoft Defender for Servers, Databases, and Storage
Implement and manage agentless scanning for VMs
Implement and manage Microsoft Defender Vulnerability Management
Connect and configure Defender for Cloud DevOps Security (GitHub, Azure DevOps, GitLab)
Configure and Manage Security Monitoring and Automation Solutions
Manage and respond to security alerts in Microsoft Defender for Cloud
Configure workflow automation
Monitor network security events and performance data using DCRs in Azure Monitor
Configure data connectors in Microsoft Sentinel
Enable analytics rules in Microsoft Sentinel
Configure automation in Microsoft Sentinel
Key Study Resources
Official Microsoft Learn Paths
Manage identity and access
Implement platform protection
Secure data and applications
Manage security operations
Security Documentation
Microsoft Entra ID security
Azure network security
Azure Storage security
Microsoft Defender for Cloud
Microsoft Sentinel
Azure Policy
Practice Resources
Free Practice Assessment on Microsoft Learn
Azure Security Center labs
Microsoft Sentinel training lab
Azure security hands-on labs
Exam Details
Passing Score
: 700
Question Format
: Multiple choice, case studies, drag-and-drop
Exam Duration
: 120 minutes (150 minutes for non-native English speakers)
Languages Available
: Multiple languages including English, Japanese, Chinese, Korean, German, French, Spanish, Portuguese
Exam Cost
: $165 USD (varies by region)
Key Security Concepts
Zero Trust Model
Verify explicitly
Least privilege access
Assume breach
Microsegmentation
Identity as the security perimeter
Defense in Depth
Physical security
Identity and access
Perimeter security
Network security
Compute layer
Application layer
Data layer
Identity Security
Privileged Identity Management (PIM)
Conditional Access
Identity Protection
Access Reviews
Entitlement Management
Network Security
Network segmentation
DMZ implementation
Service endpoints vs Private endpoints
Network Security Groups
Application Security Groups
Data Protection
Encryption at rest
Encryption in transit
Key management
Data classification
Data loss prevention
Important Azure Security Services
Microsoft Entra ID (formerly Azure AD)
Authentication methods
Conditional Access policies
Identity Protection
Privileged Identity Management
Application management
Azure Firewall
FQDN filtering
Network rules
Application rules
Threat intelligence
Firewall Manager
Microsoft Defender for Cloud
Secure Score
Regulatory compliance
Workload protection
Cloud Security Posture Management (CSPM)
Cloud Workload Protection Platform (CWPP)
Microsoft Sentinel
Data connectors
Analytics rules
Playbooks (Logic Apps)
Workbooks
Threat hunting
Azure Key Vault
Secrets management
Key management
Certificate management
HSM-backed keys
RBAC vs vault access policies
Security Best Practices
Identity Management
Enable MFA for all users
Use PIM for privileged roles
Regular access reviews
Implement Conditional Access
Use managed identities
Network Security
Implement hub-spoke topology
Use NSGs at subnet level
Enable DDoS protection
Implement WAF for web apps
Use Private Endpoints
Data Security
Enable encryption by default
Use customer-managed keys
Implement data classification
Regular backup and test restore
Enable soft delete
Monitoring and Response
Enable diagnostic logging
Configure security alerts
Automate incident response
Regular security assessments
Threat hunting activities
Certification Path
Prerequisites
: Azure Fundamentals (AZ-900) recommended
Renewal
: Required every 12 months through Microsoft Learn
Related Certifications
:
Azure Administrator Associate (AZ-104)
Azure Solutions Architect Expert (AZ-305)
Security Operations Analyst (SC-200)
Compliance and Governance
Azure Policy vs RBAC
Regulatory compliance dashboard
Azure Blueprints
Resource locks
Management groups
Cost management and tags
相关资源
概述
学习指南
速查表
练习测试