Implement platform protection (35-40%)
Please complete the following course on LinkedIn Learning for intermediate knowledge of this exam objectives: Implementing platform protection in Azure
NOTE: In addition to the great content listed below, there are 20 Labs for you to follow on the AZ-500 GitHub site for this learning objective. WE STRONGLY RECOMMEND that you complete all the labs in order to be exam ready.
Implement network security
Topic | Link |
---|---|
configure virtual network connectivity | What is Azure Virtual Network? |
Complete all tutorials listed in this section | |
Centralize your core services by using hub and spoke Azure virtual network architecture | |
configure Network Security Groups (NSGs) | Network security groups |
Create, change, or delete a network security group | |
Secure and isolate access to Azure resources by using network security groups and service endpoints | |
create and configure Microsoft Azure firewall | What is Azure Firewall? |
Tutorial: Deploy and configure Azure Firewall using the Azure portal | |
create and configure Azure Front Door service | What is Azure Front Door? |
Quickstart: Create a Front Door for a highly available global web application | |
create and configure application security groups | Application security groups |
configure remote access management | Security management in Azure |
configure baseline | Create security baselines |
Implement host security
Topic | Link |
---|---|
configure endpoint security within the VM | Azure Virtual Machines security overview |
Security best practices for IaaS workloads in Azure | |
configure VM security | Secure your management ports with just-in-time access |
harden VMs in Microsoft Azure | Security recommendations for Windows virtual machines in Azure |
configure system updates for VMs in Microsoft Azure | Update Management solution in Azure |
Manage updates and patches for your Azure VMs | |
Keep your virtual machines updated | |
LinkedIn Learning | Implement Platform Protection |
Configure container security
Topic | Link |
---|---|
configure network | Control egress traffic |
Secure traffic between pods | |
configure authentication | Configure authentication |
configure container isolation | Best practices for container image management and security |
configure AKS security | Security concepts for applications and clusters in Azure Kubernetes Service (AKS) |
Best practices for cluster security | |
configure container registry | Tutorial: Deploy and use Azure Container Registry |
implement vulnerability management | Secure the images and run time |
Implement Microsoft Azure Resource management security
Topic | Link |
---|---|
create Microsoft Azure resource locks | Lock resources to prevent unexpected changes |
manage resource group security | Security controls for Azure Resource Manager |
configure Microsoft Azure policies | Tutorial: Create and manage policies to enforce compliance |
Apply and monitor infrastructure standards with Azure Policy | |
configure custom RBAC roles | Create and assign a custom role in Azure Active Directory |
Create custom roles for Azure resources with role-based access control (RBAC) | |
configure subscription and resource permissions | Elevate access to manage all Azure subscriptions and management Groups |
Manage access to an Azure subscription by using Azure role-based access control (RBAC) |