SC-900 2022
SC-900 2022
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Exam Released May 2021
Latest Update November 2022
SCI -
Security,
Compliance,
Identity
Microsoft Azure SCI Fundamentals
“familiar with Microsoft Azure and Microsoft 365 and want to understand how
Microsoft security, compliance, and identity solutions can span across these
solution areas to provide a holistic and end-to-end solution”
Microsoft Azure SCI Fundamentals
● Business stakeholders
Azure Firewall
Azure Bastion
Intune
What Basic Azure Compliance Capabilities Exist?
Azure Policy
Azure Blueprints
Resource Locks
Records Management
eDiscovery
Advanced Auditing
What Basic Azure Identity Capabilities Exist?
Active Directory
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Describe the Concepts of
Security, Compliance, and Identity
(10-15%)
Security Methodologies
Zero-Trust
Methodology
Don’t assume
everything behind
the firewall is safe
Zero Trust Principles
● Verify explicitly
● Assume breach
Use every available
method to validate
identity and
authorization
Just-in-time (JIT)
Just-enough-access (JEA)
Security even inside
the network;
encryption,
segmentation,
threat detection
Identity: Verify and
secure each identity
Devices: ensure
compliance and
health status
Applications:
appropriate in-app
permissions,
monitor user
actions
Data: data-driven
protection, encrypt
and restrict access
Infrastructure:
robust monitoring
to detect attacks,
block and flag risky
behavior
Network: encrypt all
communications
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Security Concepts
Common Threats
● Data breach
● Dictionary attack
● Ransomware
● Denial of Service (Disruptive) attacks
Entry Points for Data Breach
Phishing attack
Spear phishing
SQL injection
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Encryption and hashing
Encryption (n):
the process of converting
information or data into a code,
especially to prevent
unauthorized access.
“Hello.”
f7ff9e8b7bb2e09b70935a5d785e0cc5d9d0abf0
Types of Encryption
Symmetric and Asymmetric:
Asymmetric - the concept of a key pair - a public key and a private key; public
used to encrypt and private used to decrypt
Can take a long message, of any length, and make it a short code
32 or 64 characters
Rainbow tables
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Identity as the
Primary Security Perimeter
Security Perimeters
The person is who they say they are
Services are provided only inside company data center - Cloud computing
Identity is now the
primary security
perimeter
Identity is not just a “person”
Employees
Cloud apps
On-prem apps
Devices
Zero trust model
Advances in
security focus on
ensuring identity is
trustable
Ways to verify identity
Beyond the simple user id/password
Multi-factor authentication
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Define Authentication
(AuthN)
How much proof do
you need for me to
prove my identity to
you?
“Modern
Authentication”
Server should use
an identity provider
to validate identity
The Old Way
Username , password
Client Server
The New Way
Identity
Username, Provider
password
token
Token, claims
Client Server
Single Sign On
Server
Identity
Provider
Server
Username,
password
token
Server
Client Server
Define Authorization
(AuthZ)
The level of access
an authenticated
person has
“Permissions”
Principle of least
privilege
A user
is granted a set of
permissions to
perform some
tasks
A user role
is granted a set of
permissions to
perform some
tasks
What role do you
have?
Users can have
multiple roles
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Identity Providers
The New Way
Identity
Username, Provider
password
token
Token, claims
Client Server
Creates, maintains
and manages
identity
information...
Plus offers
authentication,
authorization and
auditing services
Azure Active
Directory
(Azure AD)
Active Directory
Google
Facebook
Twitter
LinkedIn
GitHub
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Active Directory
A set of directory
services developed
by Microsoft as part
of Windows 2000
Managed on-prem
identity
“Domain controller”
Uses protocols that
do not work over
the Internet
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Federation
The use of multiple
identity providers
The identity
providers have a
trust relationship
between each other
Company A AD
trusts
Company B AD
User from
Company B
can log in to
Company A app
Trust isn’t always
bi-directional
Azure AD B2C
can be configured
to use social media
sites for identity
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Azure Active Directory,
part of Microsoft Entra
Identity as a Service
in Azure
Azure AD
Azure AD
Username,
password
token
Token, claims
User Your
Web Browser Application
A Tenant =
An Organization
A tenant can have a
subscription to
enable compute
resources to be
created
Applications can
register with
Azure AD
Demo of Azure AD
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Azure AD Password
Protection
Global Banned
Password List
Custom Banned
Password List
Bad password
attempts and
lockout duration
Can also protect
Windows Server
Active Directory
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Something you are
Something you have
Something you know
Authenticator app
OATH Hardware token
SMS
Voice call
Enabled by
administrators
Signed up by users
Conditional access
Session lifetime
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Passwordless
Gestures to sign in
Sign in using a PIN
or biometric
recognition (facial,
iris, or fingerprint)
with Windows
devices.
Your phone:
“Are you attempting
to sign in to this
app?”
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Conditional Access
Using signals to
make decisions and
enforce policies
User and location
Device
Application
Risk
Allow access
Require MFA
Deny access
Require MFA for all
Admin users
Require MFA signup
from trusted
locations
Some minimum
standard for device,
location, or risk
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Identity Governance
Balance the need
for security...
… and employee
productivity
Identity Lifecycle
From the time you start your first day with the company, to the time you retire
Understanding the data handling policies for different regions of the world
Dynamic groups
Just-in-time access
Access reviews
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Network Security Group
Simple, rules-based control that allows or denies traffic travelling over a network
boundary
Two network boundaries - the subnet and a network interface card (NIC)
Deny by default
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
WAF Features
● SQL-injection attacks
● Cross-site scripting attacks
● Other common attacks, such as command injection, HTTP request
smuggling, HTTP response splitting, and remote file inclusion
● HTTP protocol violations
● HTTP protocol anomalies, such as missing host user-agent and accept
headers
● Bots, crawlers, and scanners
● Common application misconfigurations
(for example, Apache and IIS)
OWASP Rule Sets
Core Rule Sets 3.1, 3.0, and 2.2.9
Custom Rules
Geomatch Rules
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Data Encryption
Data at rest
Data in transit
Key management
Data At Rest
Server-Side Service-Managed Key - All Azure Database, Storage, AI, etc encrypted
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Azure Security Center
Infrastructure
Security
Management
Security Center
Cloud Security Posture Management - assessments and recommendations
Supports PaaS Workloads like App Service Plans, Storage and SQL Servers
Free and paid
versions
Protects Azure and
non-Azure
resources
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
SIEM
SOAR
Collecting Data
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
United suite of
enterprise defense
services
Detection
Prevention
Investigation
Response
Not just network
protection...
… apps and services
that run on the
network, the
identities, devices,
M365, etc
Microsoft 365 Defender services
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Formerly Advanced
Threat Protection
(ATP)
Azure AD Signals
Microsoft 365 Defender for Identity
Monitor user behavior and activities
Alerts
License plans:
Atypical travel
Leaked credentials
Password spray
Inbox forwarding
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Formerly Office 365
Advanced Threat
Protection (ATP)
Microsoft 365 Defender for O365
E-mails
Links (URLs)
Licenses:
● Threat Trackers
● Threat Explorer
● Automated investigation and response (AIR)
● Attack Simulator
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Formerly Microsoft
Defender
Advanced Threat
Protection (ATP)
Microsoft 365 Defender for Endpoint
Endpoints are “devices”
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Microsoft Defender for Cloud Apps (CASB)
CAS Security Framework
O365 CAS
CAS architecture
Discover Shadow IT
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Microsoft 365 Defender Portal
Manage security
across identities,
data, devices, apps,
and infrastructure
Microsoft 365 Defender Portal
● Protection
● Detection
● Investigation
● Response
● Email
● Collaboration
● Identity
● Device
● Cloud App
● Defender for Office 365
● Defender for Endpoint
● Defender for Identity
● Defender for Cloud Apps
A Set of Unified Experiences For…
● Incidents & alerts
● Hunting
● Actions & submissions
● Threat analytics
● Secure score
● Learning hub
● Trials
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Intune
Microsoft Intune - device management
● MDM (company-owned)
● MAM (personal devices)
Endpoint Security with Intune
Manage devices
Integration with Microsoft Defender for Endpoint - Android, iOS, Windows 10+
RBAC
Endpoint Security with admin center
Security tasks for at-risk devices
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Service Trust Portal
https://servicetrust.microsoft.com/
https://aka.ms/STP
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Privacy Principles
Microsoft’s Six Privacy Principles
● Control
● Transparency
● Security
● Strong legal protections
● No content-based targeting
● Benefits to you
You’re in control of
your privacy with
easy tools and clear
choices.
Transparent about
the data they
collect
Strong security and
the use of
encryption
Respecting local
privacy laws and
fighting for privacy
They won’t use the
content of
documents and
emails to target ads
They only collect
data to make your
experience better
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Microsoft Purview
“a unified data governance
service that helps you manage
your on-premises, multi-cloud,
and software-as-a-service
(SaaS) data.”
Purview Features:
● Up-to-date map of your data landscape
○ Data discovery
○ Sensitive data classification
○ End-to-end data lineage
Solution catalog
Active alerts
https://compliance.microsoft.com/
Helps to manage an
organization’s
compliance
requirements
Compliance manager
Prebuilt assessments
Workflow capabilities
Compliance score
Compliance score
Helps an organizations:
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Data Classification
Data classification
Sensitive
information types
Trainable classifiers
Content explorer
Activity explorer
Content Explorer
A current snapshot of individual items that have been classified across the
organization
Activity Explorer
Provides visibility into what content has been discovered, labeled, and where that
content is
Activity Explorer
Some activity types that can be analyzed:
Label applied
Label changed
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Sensitivity labels
Sensitivity labels
Customizable
Clear text
Persistent
Sensitivity label usage
Encrypt email or both email and documents
Mark content
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Retention policies and labels
Ensuring content is kept only for a required time, and then permanently deleted
Works with:
Labels travel with content if moved to a different location within your M365 tenant
Applied manually/automatically
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Records Management
Used to look after your companies legal obligations and helps to demonstrate
compliance with regulations
● Regulatory Record
Retention labels
enable admins to
mark items as
records
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Data Loss
Prevention: Protect
sensitive information
and prevent its
inadvertent
disclosure
Data Loss Prevention (DLP)
Identify, monitor, and automatically protect sensitive information across M365:
Personal Information
Endpoint Data Loss Prevention
To audit and manage activities that users complete on sensitive content on
Windows 10 devices, eg.:
Creating an item
Renaming an item
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Insider Risk
Management is
used to minimize
internal risks
Leaks of sensitive
data and data
spillage
Confidentiality
violations
Intellectual property
(IP) theft
Four Insider Risk solutions in M365:
● Communication compliance
● Information barriers
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Communication Compliance
Minimize communication risks by detecting, capturing, and take remediation
actions for inappropriate messages
● Microsoft Teams
● Exchange Online
● Yammer
● Third-party communications
Monitoring email
and chat for
compliance risks
Inappropriate Communications
Profanity
Threats
Harassment
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Information barriers
restrict
communications
among specific
groups of users
I.e. User in the day
trader group should
not communicate
or share files with
the marketing team
Information barriers
Only support two-way restrictions
And more..
SC-900 Microsoft Security,
Compliance, and Identity
Fundamentals
Scott Duffy, Instructor
© 2022-2023 Scott Duffy, getcloudskills.com… get the course for these slides at:
http://sjd.ca/sc900
Prevent resources
from being
accidentally deleted
or changed
Azure Resource Locks
Apply a lock at a parent scope, all resources within that scope inherit that lock
Changes to the actual resource are restricted, but resource operations aren't
restricted
CanNotDelete
ReadOnly
A way to define a
repeatable set of
Azure resources
Azure Blueprints
Always in line with the organization’s compliance requirements
● Role Assignments
● Policy Assignments
● ARM templates
● Resource Groups
Azure Policy is
designed to help
enforce standards
and assess
compliance
Azure Policy
evaluates all
resources in Azure
and Arc enabled
resources
Azure Policy uses cases
Implementing governance for resource consistency
Regulatory compliance