Book Image

Exam Ref AZ-304 Microsoft Azure Architect Design Certification and Beyond

By : Brett Hargreaves
Book Image

Exam Ref AZ-304 Microsoft Azure Architect Design Certification and Beyond

By: Brett Hargreaves

Overview of this book

The AZ-304 exam tests an architect's ability to design scalable, reliable, and secure solutions in Azure based on customer requirements. Exam Ref AZ-304 Microsoft Azure Architect Design Certification and Beyond offers complete, up-to-date coverage of the AZ-304 exam content to help you prepare for it confidently, pass the exam first time, and get ready for real-world challenges. This book will help you to investigate the need for good architectural practices and discover how they address common concerns for cloud-based solutions. You will work through the CloudStack, from identity and access through to infrastructure (IaaS), data, applications, and serverless (PaaS). As you make progress, you will delve into operations including monitoring, resilience, scalability, and disaster recovery. Finally, you'll gain a clear understanding of how these operations fit into the real world with the help of full scenario-based examples throughout the book. By the end of this Azure book, you'll have covered everything you need to pass the AZ-304 certification exam and have a handy desktop reference guide.
Table of Contents (30 chapters)
1
Section 1: Exploring Modern Architecture
4
Section 2: Identity and Security
9
Section 3: Infrastructure and Storage Components
14
Section 4: Applications and Databases
19
Section 5: Operations and Monitoring
23
Section 6: Beyond the Exam
26
Mock Exam
27
Mock Answers

Controlling access with PIM

The traditional security model defines policies such as least privileged access, meaning you should always assign the least amount of rights to any one user. However, you still need to assign administrator rights to some users.

With PIM, you can control when and for how long those rights are granted. In other words, users have to request elevated access as they need it explicitly, and this access can then be time-boxed to be automatically removed after a defined period.

This way, even if an individual account were compromised, an attacker would still not have high levels of access.

Specifically, PIM can help you by doing the following:

  • Providing just-in-time elevated access to Azure AD and resources
  • Assigning accounts with time-boxed start and end dates/times
  • Requiring an additional approval step for elevated access
  • Enforcing MFA
  • Requesting justification for why access is required
  • You getting notified when privileged roles are granted...