
The AZ-500 exam description has just had a minor revision that shouldn’t have an impact on the preparation that you need to do, instead just keep focused on the weaknesses you have identified and are working on addressing. If you are starting your preparation from scratch, following are some examples of guidance for how you should focus your preparation.
If you are already familiar with Azure Active Directory (AAD) Premium P2 functionality, whether through Azure of through Microsoft 365 related services, you should be in pretty good shape for this exam. There is an exception here though – make sure you spend extra time in the managing application access section, this isn’t something you may have had exposure to. If you don’t have much AAD experience, then you will need to spend time here understanding the capabilities of AAD Premium P2, not just the free edition that’s included with Azure subscriptions by default.
If you are approaching this exam with a fairly solid understanding of networking concepts including subnets, routing, appliances etc. you are off to a strong start with the advanced network security section. The most important thing here is for you to understand how the Azure native versions of the services may differ from those of other solutions from other vendors. If you don’t have much or any networking in your prior experiences, make sure you spend some time going through some basics of TCP/IP and networking including what’s mentioned earlier in this paragraph, and then focus on the technologies in the exam objectives.
During the early days of this exam, understanding how to protect Azure virtual machines worked would have covered you quite well in the advanced security for compute section, but now you can’t just know what acronyms like ACI, ACR, AKS etc. stand for, you also need to how to secure them, including their networking configuration. At this stage it’s most likely you’re familiar with these container related technologies if you have Linux experience, but over the last few years I’ve seen more Windows centric exam takers having some exposure to these technologies as well.
The final thing here is to make sure you have an understanding of what’s in Azure Security Center, and the additional features you get when you move up to Azure Defender capabilities for the different workloads. Use the additional workload protections to help drive your understanding of the workloads that you aren’t familiar with.
The examples I’ve just provided don’t cover all of the different combinations of exam preparation scenarios based on your skills, but hopefully they give you some idea of what I see catch people out.
Manage identity and access (30-35%)
Manage Azure Active Directory identities
- Configure security for service principals
- Manage Azure AD directory groups
- Manage Azure AD users
- Configure password writeback
- Configure authentication methods including password hash and Pass Through Authentication (PTA), OAuth, and passwordless
- Transfer Azure subscriptions between Azure AD tenants
Configure secure access by using Azure AD
- Monitor privileged access for Azure AD Privileged Identity Management (PIM)
- Configure Access Reviews
- Configure PIM
- Implement Conditional Access policies including Multi-Factor Authentication
- Configure Azure AD identity protection
Manage application access
- Create App Registration
- Configure App Registration permission scopes
- Manage App Registration permission consent
- Manage API access to Azure subscriptions and resources
Manage access control
- Configure subscription and resource permissions
- Configure resource group permissions
- Configure custom RBAC roles
- Identify the appropriate role
- Apply principle of least privilege
- Interpret permissions
- Check access
Implement platform protection (15-20%)
Implement advanced network security
- Secure the connectivity of virtual networks (VPN authentication, Express Route encryption)
- Configure Network Security Groups (NSGs) and Application Security Groups (ASGs)
- Create and configure Azure Firewall
- Implement Azure Firewall Manager
- Configure Azure Front Door service as an Application Gateway
- Configure a Web Application Firewall (WAF) on Azure Application Gateway
- Configure Azure Bastion
- Configure a firewall on a storage account, Azure SQL, KeyVault, or App Service
- Implement Service Endpoints
- Virtual Network service endpoints
- Tutorial: Restrict network access to PaaS resources with virtual network service endpoints using the Azure portal
- Create, change, or delete service endpoint policy using the Azure portal
- Use private endpoints for Azure Storage
- Quickstart: Create a Private Endpoint using Azure portal
- Implement DDoS Protection
Configure advanced security for compute
- Configure endpoint protection
- Configure and monitor system updates for VMs
- Configure authentication for Azure Container Registry
- Configure security for different types of containers
- Implement vulnerability management
- Configure isolation for AKS
- Configure security for container registry
- Implement Azure Disk Encryption
- Configure authentication and security for Azure App Service
- Configure SSL/TLS certs
- Configure authentication for Azure Kubernetes Service
- Configure automatic updates
Manage security operations (25-30%)
Monitor security by using Azure Monitor
- Create and customize alerts
- Monitor logs by using Azure Monitor
- Configure diagnostic logging and log retention
Monitor security by using Azure Security Center
- Create and customize alerts
- Evaluate vulnerability scans from Azure Security Center
- Configure Just in Time VM access by using Azure Security Center
- Configure centralized policy management by using Azure Security Center
- Configure compliance policies and evaluate for compliance by using Azure Security Center
Monitor security by using Azure Sentinel
- Create and customize alerts
- Configure data sources to Azure Sentinel
- Evaluate results from Azure Sentinel
- Configure a playbook
Configure security policies
- Configure security settings by using Azure Policy
- Configure security settings by using Azure Blueprint
Secure data and applications (20-25%)
Configure security for storage
- Configure access control for storage accounts
- Configure key management for storage accounts
- Configure Azure AD authentication for Azure Storage
- Configure Azure AD Domain Services authentication for Azure Files
- Create and manage Shared Access Signatures (SAS)
- Create a shared access policy for a blob or blob container
- Configure Storage Service Encryption
- Configure Azure Defender for Storage
Configure security for databases
- Enable database authentication
- Enable database auditing
- Configure Azure Defender for SQL
- Implement database encryption
- Implement Azure SQL Database Always Encrypted
Configure and manage Key Vault
- Manage access to Key Vault
- Manage permissions to secrets, certificates, and keys
- Configure RBAC usage in Azure Key Vault
- Manage certificates
- Manage secrets
- Configure key rotation
- Backup and restore of Key Vault items
- Configure Azure Defender for Key Vault