Book Image

Microsoft Azure Architect Technologies: Exam Guide AZ-300

By : Sjoukje Zaal
Book Image

Microsoft Azure Architect Technologies: Exam Guide AZ-300

By: Sjoukje Zaal

Overview of this book

From designing solutions on Azure to configuring and managing virtual networks, AZ-300 certification can help you achieve all this and more. Whether you want to get certified or gain hands-on experience in administering, developing, and architecting Azure solutions, this study guide will help you get started. The book features not only the different exam objectives, but also guides you through configuring, managing, securing, and architecting Azure resources. Divided into five modules, this book will systematically take you through the different concepts and features as you advance through the sections. The first module demonstrates how to deploy and configure infrastructure. You will cover techniques related to implementing workloads and security, before learning how to create and deploy apps in the next module. To build on your knowledge, the final two modules will get you up to speed with implementing authentication, data security, and application and platform monitoring, along with covering Azure storage, alerting, and automation strategies. Finally, you’ll work through exam-based mock tests with answers to boost your confidence in passing the exam. By the end of this book, you’ll have learned the concepts and techniques you need to know in order to prepare for the AZ-300 exam, along with the skills to design effective solutions on Microsoft Azure.
Table of Contents (30 chapters)
1
Section 1: Deploying and Configuring Infrastructure
9
Section 2: Implementing Workloads and Security
16
Section 3: Creating and Deploying Apps
19
Section 4: Implementing Authentication and Secure Data
22
Section 5: Developing for the Cloud and for Azure Storage
26
Mock Questions
27
Mock Answers

Understanding Azure confidential computing

In the previous sections, we covered how to secure data at rest and in transit, but you also need to protect data from threats as it's being processed. In many cases, poorly configured access control will result in breaches. However, most breaches can be traced to data that is accessed while it is in use. This can be done through administrative accounts and by using compromised keys to access the encrypted data. This is the main reason why customers are not willing to move their most sensitive data to the cloud.

Azure confidential computing offers protection for data in use. By using Trusted Execution Environments (TEEs) or encryption mechanisms to protect your data while in use, new data security capabilities are added by confidential computing. This means that data can be processed in the cloud with the assurance that it is always under customer control. A TEE can be implemented using hardware or software. The hardware secures a portion...