AZ-500 Tests Security Implementation Judgment, Not Azure Feature Lists
Every AZ-500 scenario requires you to select and configure the right security control for a specific threat, compliance requirement, or access model.
Check Your Readiness →Most candidates understand Azure Security Engineer Associate concepts — and still fail. This exam tests how you apply knowledge under pressure.
AZ-500 covers four security domains. Questions test implementation decisions: which control to apply, how to configure it, and how to investigate security events. Know the difference between each Azure security service's purpose and scope.
Assign the user the privileged role permanently with a note to remove it later
Use Azure AD Privileged Identity Management (PIM) to configure just-in-time role activation with approval workflow, time limits, and audit logging — permanent privileged assignments are a security antipattern
Implement an NSG rule to block malicious IPs
Deploy Azure Application Gateway with Web Application Firewall (WAF) — WAF provides OWASP rule sets for SQL injection and XSS protection; NSGs cannot inspect application-layer payloads
Use Azure managed keys (platform-managed encryption)
Use customer-managed keys (CMK) in Azure Key Vault with BYOK (bring your own key) — this ensures Microsoft cannot access the keys; platform-managed keys are managed by Microsoft
Defender for Cloud provides security posture management and threat protection for Azure resources (CSPM + CWP). Sentinel is a cloud-native SIEM/SOAR for security event correlation and response. They serve different purposes and are frequently confused.
Conditional Access controls access based on signals (user, location, device, app, risk). Candidates apply it to the wrong resources, set incorrect grant controls, or fail to account for named locations and compliance requirements in policy design.
NSGs are stateful L4 filters that operate at the subnet/NIC level. Azure Firewall is a managed, stateful L4-L7 firewall with FQDN filtering and application rules. NSGs for granular subnet control; Azure Firewall for centralized network security with advanced filtering.
AZ-500 tests layered access control: RBAC for resource management, Entra ID roles for directory operations, resource-level policies for data access, and PIM for just-in-time privileged access. Using only RBAC misses the other layers.
Managed Identity is for Azure resources authenticating to other Azure services — no credential management required. Service Principals are for external applications or service-to-service scenarios outside Azure's managed identity scope.
AZ-500 requires security implementation judgment in Azure. Test whether you're selecting the right control for the right threat.