Bash, the Crucial Exams Chat Bot
AI Bot
Design and Implement Security Solutions Flashcards
Microsoft Azure Security Engineer Associate AZ-500 Flashcards
| Front | Back |
| Access Reviews in Azure AD | Process for reviewing and ensuring the appropriateness of user access rights |
| Azure Active Directory Identity Secure Score | Assessment score for securing identities within Azure AD environment |
| Azure AD Conditional Access | A feature to enforce access controls based on compliance signals |
| Azure Backup | Solution for data protection and recovery within Azure environments |
| Azure Bastion | Service for securely accessing VMs in Azure without exposing them to the internet |
| Azure Blueprints | Templates for implementing governance and compliance policies across Azure environments |
| Azure Firewall | A managed network service providing traffic filtering and security |
| Azure Host Security Posture | Ensuring virtual machines are patched, monitored, and secured against vulnerabilities |
| Azure Identity Protection | A service for detecting and responding to identity-based risks in Azure AD |
| Azure Key Vault | A solution for securely managing keys, secrets, and certificates |
| Azure Management Groups | Hierarchical collections for managing access and compliance across subscriptions |
| Azure Monitor Logs | A tool for collecting and analyzing log data across Azure resources |
| Azure Policy | A service for implementing governance and compliance across Azure resources |
| Azure Private Link | Service for accessing Azure resources privately via a private endpoint |
| Azure Privileged Identity Management (PIM) | Service for managing, controlling, and monitoring privileged Azure AD roles |
| Azure Resource Locks | A mechanism to prevent accidental deletion or modification of critical resources |
| Azure Security Alerts | Notifications triggered by suspicious activities and potential security threats |
| Azure Security Benchmark | Industry-standard security best practices for securing Azure services and workloads |
| Azure Security Center | A tool for monitoring the security posture of Azure resources |
| Azure Sentinel | Cloud-native SIEM and SOAR service for threat detection and response |
| Compliance Manager in Microsoft Purview | Tool for tracking and managing compliance requirements and controls |
| DDoS Protection | Azure service to mitigate distributed denial-of-service attacks |
| Disk Encryption Configuration | Process of enabling encryption to secure data at rest on Azure disks |
| Encryption at Rest | Data encryption for files stored on disk, such as Azure Blob Storage |
| Endpoint Protection Integration | Integrating antivirus tools into your Azure deployments |
| Implementing Network Security Groups (NSGs) | Use rules to control inbound and outbound traffic in Azure networks |
| Implementing Service Endpoints | Limits access to Azure services from specific subnets within a virtual network |
| Managed Identity in Azure | A service for securing resource access by eliminating secrets in app code |
| Multi-Factor Authentication (MFA) | Security mechanism requiring two or more verification methods for access |
| Principle of Least Privilege | Limit access rights to users and resources to the bare minimum necessary |
| Role-Based Access Control (RBAC) | Controls access to Azure resources based on user roles |
| Secure DevOps Kit for Azure (AzSK) | Tools for integrating security into Azure DevOps processes |
| Secure Remote Access | Using VPN gateways or bastion hosts for secure connections to Azure networks |
| Secure Score in Azure | A representation of an organization's security posture with actionable recommendations |
| Securing API Management in Azure | Implementing access controls and security measures for Azure API Management |
| Shared Responsibility Model | The distribution of security responsibilities between the cloud provider and customer |
| Virtual Network Peering | Connecting two Azure virtual networks for seamless communication and enhanced security |
| Web Application Firewall (WAF) | A firewall that protects web apps from common exploits and vulnerabilities |
| Zero Trust Model | Security model emphasizing "never trust; always verify" |
This deck provides insights into designing secure architectures, implementing advanced security configurations, and leveraging Azure security tools and services to meet compliance requirements.