Az 900
Az 900
Az 900
Fundamentals
Exam Syllabus
Applications
Responsibility
varies with type
Network Controls
Operating System
Physical Hosts
Responsibility lies
Physical Network
with CSP
Physical Datacenter
The most flexible category that gives you
maximum control over your cloud
resources.
Infrastructure
The CSP is responsible for physical security,
as a Service connectivity to internet, and the hardware
(IaaS)
only – you control everything else.
Platform as a
Service (PaaS)
Allows you to focus more on development & go-live
than patching & maintaining infrastructure.
Private Cloud
• A private cloud is a cloud infrastructure operated solely for a single organization. It can be hosted internally
or by a third-party provider. This model provides enhanced control and security for organizations that
require a dedicated environment.
• However, it has fewer of the benefits of a public cloud deployment and higher costs associated to it as well.
1 2 3 4 5
Isolation: Resources are Customization: Data Security: Private Examples: Organizations like
Key Characteristics of dedicated to a single Organizations can tailor the clouds are ideal for sensitive financial institutions or
Private Cloud: organization, ensuring environment to meet data and industries with government agencies that
better control over security specific needs and strict compliance require stringent control
and compliance. requirements. regulations. over their data might opt for
a private cloud.
Define Cloud Models
Public Cloud
• The public cloud is a cloud computing model where cloud services are owned and provided by third-party vendors over the internet. These
services are available to anyone who wants to use them, making it a versatile and cost-effective option for various purposes. With a public
cloud, all hardware, software, and other supporting infrastructure are owned and managed by the cloud provider.
• In a public cloud, you share the same hardware, storage, and network devices with other organizations or cloud “tenants,” and you access
services and manage your account using a web browser.
• General public availability is a key difference between public and private clouds.
1 2 3 4 5
Shared Infrastructure: Cost Efficiency: Users only Scalability: Public cloud Examples: Amazon Web
Key Characteristics of Resources are shared among pay for the resources they services can easily scale up Services (AWS), Microsoft
multiple users and consume, eliminating the or down to accommodate Azure, Google Cloud
Public Cloud: organizations, optimizing need for upfront changing demands. Platform (GCP) etc.
utilization and cost. investments.
Define Cloud Models
Hybrid Cloud
• A hybrid cloud is a combination of public and private clouds, designed to allow data and applications to be shared between them. This
model offers flexibility and allows organizations to balance the benefits of both public and private environments.
• For many organizations, a hybrid cloud approach is a MUST due to regulatory and data sovereignty requirements, tackling low latency issues
etc.
• Simply put – A private deployment can be used for the extra layer of security, and it can be coupled with a public deployment to handle
surge in traffic / computing needs!
1 2 3 4 5
Flexibility: Organizations Scalability: Hybrid clouds Data Mobility: Data can be Examples: Healthcare
Key Characteristics of can choose where to host can handle spikes in demand moved seamlessly between organizations might use a
different workloads based by utilizing resources from private and public clouds as private cloud for patient
Hybrid Cloud: on factors like security, both environments. needed. data storage while using a
performance, and cost. public cloud for non-
sensitive applications.
Define Cloud Models
Multi Cloud
1. Resource Management: Azure Arc allows you to connect and manage resources,
including virtual machines, Kubernetes clusters, and databases, as if they were native
Azure resources.
2. Unified Management: With a consistent Azure interface, you can apply policies,
configure settings, and monitor the health of resources across various environments.
3. Governance and Compliance: Azure Policy and Azure Security Center can be used to
enforce consistent governance and compliance policies across hybrid environments.
4. Automation and DevOps: Azure Arc integrates with Azure Resource Manager
templates, enabling consistent resource provisioning and management using
infrastructure as code.
5. Data Services: You can deploy Azure data services like Azure SQL Database and Azure
Database for PostgreSQL Hyperscale to your preferred environment.
Consumption
Based Model
CapEx (Capital
Expenditure)
12
CapEx (Capital
Expenditure) : Problem
10
ü 0 upfront costs!
12
OpEx
10
The ability to adjust Peak traffic? Add more Less traffic? Shut down
resources to meet resources. resources.
demand.
• When you need to handle new demands, horizontal scaling (also known as scaling
out) involves adding more nodes or machines to your infrastructure.
• For instance, if an application hosted on a server is struggling to manage traffic
due to a lack of capacity or capability, the solution may be to add another server.
Reliability
The ability of a system/service to
recover from failure & continue its
operation.
Focused on performance or cost. A well architected solution helps us move SLA’s and cost management play a big
forward with confidence and avoid role.
surprises.
Predictability: Performance
Focuses on the resources Imp. concepts – Auto-Scaling, Auto scaling helps add / Load Balancing allows to
needed to deliver a seamless Load Balancing, High remove resources based on distribute load evenly on not
experience. Availability. demand. on just a few resources.
Predictability: Cost
We want visibility on our Track and control spends, Analyze the data to optimize Tools like pricing calculator to
spends & not a huge bill out of apply tight budgets. spending. estimate cloud spends.
the blue.
Security in the Cloud
It’s all about how you’re able to deploy Possible options are :
and manage cloud resources.
Command Line Interface (CLIs)
A Web Portal
APIs
Let’s take a quick look at
the Azure Portal!
High level operating hierarchy
Azure Account
Development Marketing
Subscriptions
Resources
Free Azure Accounts?
• Free access to popular Azure resources for 12 months. Credit Card (Will not be charged)
• A credit that can be used within the first 30 days.
• Access to more than 25 services that are ALWAYS free! GitHub/Microsoft Account
An expanding set of services, that help you deploy A huge variety of IoT, BI, AI, ML based services – the
infrastructure and solutions with the click of a few power is all in your hands now.
buttons!
Physical
Infrastructure
Region
AZ-1 AZ-2 Pair AZ-1 AZ-2
Region Region
AZ-3 AZ-3
Region - 1 Region - 2
Region Pairs
• Most pairs are bi-direction but NOT ALWAYS! E.g. – West India
-> South India. South India’s secondary region is Central India.
Sovereign
Regions
Azure Account
Development Marketing
Subscriptions
Resources
Resource Groups
• A resource group can have a location different than the resources within it.
Azure Account
Development Marketing
Subscriptions
Resources
Subscriptions
Advantages –
Azure Account
Management Groups
Subscriptions
• VMs are excellent choices to not manage physical hardware & pay as you go. Issue –
One OS per VM.
• You don’t manage the OS unlike a VM and containers are much more light-weight
(package an app and all its dependencies as a single unit).
• Containers share the host operating system's kernel, which makes them extremely
resource-efficient. They use fewer system resources compared to VMs.
• They can start quickly, often in seconds, making them suitable for microservices
architectures (break one big architecture into multiple small pieces) and dynamic
scaling.
Azure Containers Azure Containers Azure Kubernetes
Instances Apps Service
• Easiest way to run containers in Azure. • Think of it as containers – the container • Orchestration service.
management overhead.
• PaaS offering (refer to the shared • PaaS offering (refer to the shared
responsibility chart) • PaaS offering (refer to the shared responsibility chart)
responsibility chart)
• Simply create containers & upload them • Very helpful when looking to deploy and
• Way more elastic – the ability to auto scale
– run them using this service. and load balance both are possible. manage a fleet of containers.
App Hosting Options
ü In most cases you need a resource to be running for your app to work – not
with Azure Functions.
ü An event will wake up your function, and you ONLY pay for the CPU time it
takes to execute the code!
ü As a developer, I only need to care about the code & not infrastructure.
ü Scalable!
ü Subnets: Within VNets, you can create subnets to further segment your
network. Subnets help organize resources and control traffic flow.
VNet
Subnet - 1 Subnet - 2
Azure Virtual Networks
2. Digital Houses: In this neighborhood, you can build digital houses (virtual machines,
servers, and services). These houses are like your online spaces.
3. Digital Streets: Azure Virtual Network has digital streets (networks) that connect all
the houses. These streets are like the pathways for your digital devices to
communicate.
4. Friendly Neighbors: Your digital devices, like your computer or phone, are like friendly
neighbors who chat and share things with each other.
5. Security Fences: Just like you have a fence around your house, you can put up security
measures to protect your digital houses from unwanted visitors (cybersecurity).
6. Visitors Welcome: You can invite digital visitors (cloud services) to your neighborhood
and let them interact with your digital houses. It's like having guests over.
7. Private Gardens: Azure Virtual Network lets you create private gardens (subnets)
within your neighborhood. You can decide which plants (resources) go where.
Azure Virtual Networks – Main Use Cases
ü Filtering of Traffic
ü Routing of Traffic
Isolation and Segmentation
ü Breaking down one big monolithic network into chunks, smaller subsets.
ü Azure ExpressRoute
Azure ExpressRoute
Azure
Communication without
Datacenter in Canada Office in Ireland
Transferring data over public
internet
Filter Network Traffic
ü Network Security Groups (NSGs) - Like a virtual wall that you can place
around your Azure resources. It acts as a protective shield, allowing you
to define rules that control inbound and outbound traffic to and from
those resources. Think of it as a security guard that decides who can
enter and exit your building.
ü With NSGs, you can specify which network traffic is allowed or denied,
based on factors like source and destination IP addresses, ports, and
protocols.
ü E.g. - https://<storage-accountname>.blob.core.windows.net
Azure Storage
Redundancy
ü Multiple copies of the data is stored.
ü Data in the Primary Region is always replicated 3 times - does not matter
which option we choose – HOW it is stored is the key difference.
ü Options –
ü Cheapest redundancy option & least durable out of all the Storage
options.
Account
Datacenter Datacenter
ü Provides at least 12 nines of durability (99.9999999999%) of
objects over a year. Storage
Account
Storage
Account
Copy - 1 Copy - 2
ü Costlier than LRS but much more durable!
ü Data still available for read & write if a zone becomes Availability Zone - 3
unavailable – Azure will take care of DNS repointing, other
networking tasks. Datacenter
Storage
Account
Storage Storage
Account Account
Secondary Region
Primary Region
Storage Storage
Account Account
Storage
Copy - 1 Copy - 2
Account
Availability Zone - 3
Datacenter
Copy - 3
Storage Services - Azure
Blobs
• Hot Access Tier – Optimized for storing data that’s accessed frequently &
low-latency is needed (Your Profile Picture)
🔥
• Cool Access Tier – Optimized for storing data that’s accessed infrequently
and stored for at least 30 days (Historical data / compliance data) 🆒
• Cold Access Tier – Optimized for storing data that’s access infrequently
and stored for at least 90 days! ❄
• Archive Access Tier – Best for data that’s rarely accessed for at least 180
days with flexible latency needs. Costs the lowest but has the highest 💤
costs to rehydrate the data and then access it.
Azure Files
Can be mounted as MicrosoQ will take care of Excellent for lift and shift
Network Drives on infrastructure, high scenarios – can move both
Windows or Directories on availability and backups! app & data to the cloud
Linux and MacOS to (classic scenario) or just the
seamlessly access data. data (hybrid scenario)
Azure Queues
• A messaging service that enables async communication & storing large
number of messages (backlog).
• Each message can be upto 64KB in sizes, and millions of messages can
be stored.
• Messages are stored in the queues until they are processed by the
receiving component.
• Managed disks are also available that handle storage for you,
including replications, backups and availability!
Azure Tables
Storage
Table Entity
Account
• Part of the NoSQL family – suitable for storing large
amounts of structured & semi-structured data
without the need of a fixed schema. OS=MacOS
Browser = Safari
Source: https://learn.microsoft.com/en-us/azure/databox/media/data-box-overview/data-box-combined.png
Data on Azure Data Box devices is encrypted, ensuring
data security during transit.
AzCopy
• Can be used to move data to and from other cloud providers too!
• Syncs are uni-directional. Specify source & destination & let it sync.
• Configure Cloud Tiering – replicated more imp. files locally & less
imp. sit in Azure.
Azure AD
Azure AD Connect
On-prem AD
Azure Active Directory Domain Service (DS)
Managed
VNet Domain
1. Same Key, New Places: With Azure AD DS, you can use your office key (your
username and password) to unlock doors on the internet. So, you don't need a
new key for online stuff.
2. Office Rules Apply: The same rules and settings that keep your computer safe
at the office also apply online. It's like having the same lock on your office door
and your internet accounts.
3. Easy Connections: You can connect your work computer to the internet (like a
cloud computer) and still use your office key to access files and apps, just like
you do at the office.
Azure AD
4. Extra Security: It makes sure your key works safely online by using special
codes and protections.
5. No New Keys: You don't need to remember new usernames and passwords for
internet stuff. Your office key works everywhere.
Azure AD Connect
6. Simply use AD without supporting the infrastructure it needs.
7. Great for moving legacy apps to the cloud that need modern authentication
but can't support it!
On-prem AD
8. Supports LDAP, group policies, Kerberos authentication.
Azure Authentication
Services
ü User leaves -> delete all credentials (tracking is hard). Similarly, granting
access by mistake or extra privilege is common.
Multi-Factor
Authentication (MFA)
ü What if password gets leaked? Single point of
failure.
ü Adds an extra layer of defence – OTP (One time
passcode) is an example.
ü 3 categories :
• Something you know – OTP, passphrase,
security key, security question
• Something you have.- Mobile Phone,
Security Key
• Something you are – Biometrics like facial
scan, fingerprint etc.
ü 3 options!
Windows Hello!
My AD
üUsers not represented as guests but can
view them in this shared Teams channel.
Business 2 Consumer (B2C)
ü Designed for customer-facing applications, where you need
to manage and authenticate many external users or
customers. Designed for customer identity and access
management.
My AD
ü Provides features like self-service password reset and multi-
factor authentication for consumer accounts.
Conditional Access
ü Like having a security gatekeeper in the cloud who's also your tech-savvy friend - helps
keep your digital world safe while making sure you have easy and secure access
ü Enhances security – ensures that the right users have the right level of access to Azure
resources and applications, while also considering factors like device health and location.
ü Policies can be based on various signals - user identity, device status, location, application
sensitivity etc. E.g., enforce multi-factor authentication (MFA) only for users accessing
sensitive applications from outside the corporate network / block requests from unusual
locations.
ü Conditional Access allows you to define access controls, such as requiring multi-factor
authentication, blocking access, granting access with limited access rights, or requiring
password changes.
ü One of the most common use cases is enforcing MFA, which adds an extra layer of
security by requiring users to provide two or more forms of verification during sign-in.
ü You can set policies to ensure that devices meet specific security and compliance
standards before granting access. This is especially important for BYOD (Bring Your Own
Device) scenarios.
Azure RBAC
• RBAC (Role-Based Access Control) is like giving people
different keys to open different doors in a building. Each
key (role) has a specific set of permissions.
• RBAC helps you control who can do what with your Azure
resources, making sure people have the right access to
do their job, but nothing more (least privilege).
2. Least Privilege - Means that users and devices should only have the minimum
level of access necessary to perform their tasks.
Perimeter
• Layering to slow the advance of attackers – multiple layers instead of just one. Network
• Every layer is a backup (ready to fight) in case one is breached.
Compute
• Physical - Datacenters, disks, physical hosts etc.
• Identity & Access – Access to resources & roles / privileges + logging. Application
• Perimeter – Sniffing for DDoS attacks before they render a service unusable.
• Network – Limiting access between resources through Vnets, Subnets etc. & deny
by default.
Data
• Compute – Makes sure that VMs are safe and secure.
• Application – Makes sure that apps are safe & secure – risk assessment, pen-tests,
storing credentials separate from code etc.
• Data – The crux: Internal and External data that you’re protecting. Need to ensure
confidentiality & integrity.
Physical
Microsoft Defender for Cloud
• Can monitor & suggest improvements for both on-prem and cloud
deployments!
• Azure – Built in support & monitoring for many resources (PaaS mostly).
On-prem & mulm cloud? Deploy Log Analymcs agent to gather
informamon.
• Pay-as-you-go
Subscription Type
• E.g. – i3 vs i9.
ü Budgeting and Forecasting - Set budgets and spending limits using Cost
Management. The tool allows users to create budget plans, set alerts,
and receive notifications when spending approaches or exceeds defined
thresholds. It also offers forecasting capabilities based on historical
spending patterns. Department spending quota alerts.
Tags – Key Points valuable in organizations where multiple teams share cloud resources - helps
allocate expenses to the right teams.
ü Cost Reporting and Optimization: Tags are essential for detailed cost reporting
and optimization efforts. Azure Cost Management and other cost analysis tools can
leverage tags to provide insights into spending patterns. You can create custom
reports and dashboards based on tags to track costs by various dimensions,
helping identify areas for optimization.
ü Security and Access Control: Tags can also be used in conjunction with Azure Role-
Based Access Control (RBAC) to control access to resources. You can use tags to
define specific access policies and ensure that only authorized users or teams can
manage or modify tagged resources.
Azure Policy
ü Like having a superhero for your cloud resources in Microsoft Azure. This superhero makes
sure everything in your Azure world follows the rules and stays safe.
ü A set of rules that you can define for your Azure resources.
ü These rules ensure that your resources follow specific guidelines, like having the right security
settings or using approved services. It's like setting house rules to keep everything in order and
secure in your cloud.
ü Can have both individual policies & group of policies – initiatives. Working towards a larger
goal.
ü Non-compliant resources can be denied creation. Existing ones will not be deleted by default.
ü E.g. – Certain # of cores only – will disallow new ones & re-evaluate old ones.
Azure Policy – Key
Points
ü Scalable and Automated: Can be applied across large numbers of
resources automatically, making it scalable for cloud environments.
2. Two Types of Locks: There are two types of resource locks: "CanNotDelete" and "ReadOnly."
1. "CanNotDelete" acts like a seat belt that doesn't let you remove the resource. You can
still make changes but can't delete it.
2. "ReadOnly" is like locking the resource in a glass case. You can't make any changes, like
a seat belt that keeps you in your seat.
3. Simple to Apply: Just like putting on a seat belt is easy, applying a resource lock is
straightforward in the Azure Portal.
4. Great for Critical Resources: You'd use resource locks for critical resources that you never want
to delete accidentally, like important databases or production servers.
5. Flexibility: Resource locks can be applied at different levels, such as a resource group or a single
resource.
6. Remember to Unlock: Just like you need to unbuckle your seat belt when you're out of the car,
you should remember to remove resource locks when they're no longer needed.
7. Visual Reminder: When a resource has a lock, it's like seeing a bright-colored seat belt in the
car—it reminds you to be cautious.
Azure Service Trust Portal
ü One stop shop to get information relating to Microsoft security, compliance
and privacy.
ü This portal is like a mission control center where you can see all the
operations and strategies to protect your digital world.
ü Safety Blueprints: Just like superheroes have blueprints for their secret
hideouts, Azure Service Trust Portal has blueprints for keeping your data safe.
These blueprints are called compliance reports.
ü Safe Data Centers: This portal shows you how Microsoft builds super-secure
data centers, where your digital treasures are stored.
ü Privacy Shields: Azure Service Trust Portal has privacy shields (compliance
certifications) to ensure that your personal data is handled with care.
Tools for interacting with Azure
ü 3 main ways to manage & maintain your environment – Azure Portal,
Azure CLI, Azure PowerShell.
ü Like having a super organized master planner for building your dream Lego
city in the cloud. It helps you assemble all the pieces (resources) together,
just the way you want.
ü Lifecycle : Portal, SDK, CLI -> ARM -> Resource -> Request completed.
ü Uses templates (JSON files) instead of scripts! Confident that resource will
be created consistently.
Azure Resource Manager (ARM) –
Key Points
1. The Lego Master Planner: ARM is like the Lego master planner who knows
exactly how to build your dream city in the cloud.
2. Resource Organizer: It helps you keep all your Lego pieces (resources like virtual
machines, databases, and networks) in one neat box, called a resource group.
3. Resource Relationships: ARM knows which Lego pieces fit together. It's like
having a guide that tells you which resources depend on others.
4. One-Stop Shop: You can use ARM to create, update, and delete all your
resources in one go. It's like getting everything you need from one store.
5. Tagging and Sorting: ARM can also label and sort your Lego pieces. It's like
having labels on your Lego bricks so you know which ones belong where.
Azure Resource Manager (ARM) –
Templates
ü You can be rest assured that the results are repeatable, can be
orchestrated & declarative (tell what you want but don’t write code).
ü Bicep – Also declarative , but much simpler and concise file. Comes
with the benefit of modularity & support for all resources & APIs.
ü Azure Advisor is like having a wise and friendly guru in the cloud
who helps you save money, improve your cloud efficiency, and
follow best practices. It's like getting expert advice for your digital
kingdom.
Azure Advisor ü Helps to save money, implement best practices, and optimize
resources.
ü Cost – To spend less overall.
Azure Advisor ü Reliability - Ensuring that apps & env. remain available &
robust.
ü Azure Monitor is like having superhero senses for your cloud resources. It
gives you the ability to see, hear, and feel what's happening in your digital
world – Azure, multi-cloud, hybrid!
ü It provides two main types of data: metrics and logs. Metrics are numerical
measurements that describe the performance of a resource, such as CPU
Azure Monitor
usage or network traffic. Logs are textual records of events and activities,
which can include error messages, security events, and application traces.
Azure Log AnalyGcs
ü Logs are textual records of events and activities, which can include error
messages, security events, and application traces.
ü It can collect data from a wide range of sources, including virtual machines,
containers, Azure services, custom applications, and third-party tools. This
data includes logs, metrics, events, and traces.
ü Run queries to analyze the data collected by Azure Monitor. Supports both
simple and complex queries.
Azure Monitor Alerts
ü KPIs like response rates, page load performance, user count etc.