Learn Concepts of Security, Compliance, and Identity (SC-900) with Interactive Flashcards

Master key concepts in Concepts of Security, Compliance, and Identity through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.

Shared Responsibility Model

The Shared Responsibility Model is a fundamental framework in cloud computing that defines how security and compliance obligations are divided between the cloud service provider (such as Microsoft Azure) and the customer. This model ensures that both parties understand their respective roles in protecting data, applications, and infrastructure.

In a traditional on-premises environment, the organization is responsible for everything — from physical security to data protection. However, when moving to the cloud, some of these responsibilities shift to the cloud provider, depending on the type of service being used.

The model is typically broken down across three cloud service types:

1. **Infrastructure as a Service (IaaS):** The cloud provider manages the physical infrastructure (data centers, networking, and hardware), while the customer is responsible for the operating system, applications, data, identity management, and network controls.

2. **Platform as a Service (PaaS):** The provider takes on additional responsibilities, including the operating system and some middleware. The customer remains responsible for applications, data, and identity management.

3. **Software as a Service (SaaS):** The provider manages nearly everything, including the application itself. The customer is still responsible for their data, accounts, identities, and access management.

Regardless of the cloud deployment type, certain responsibilities always remain with the customer. These include protecting data and information, managing devices, and controlling accounts and identities. Conversely, the cloud provider is always responsible for the physical data center, network infrastructure, and host hardware.

The Shared Responsibility Model is critical because it helps organizations avoid security gaps by clearly delineating duties. Misunderstanding these boundaries can lead to vulnerabilities, data breaches, or compliance failures. Organizations must assess their responsibilities carefully and implement appropriate security measures such as encryption, access controls, and monitoring to fulfill their part of the model. Understanding this framework is essential for achieving robust security and compliance in any cloud environment.

Defense-in-Depth Strategy

Defense-in-depth is a comprehensive cybersecurity strategy that employs multiple layers of security controls and mechanisms to protect an organization's assets, data, and infrastructure. Rather than relying on a single security measure, this approach assumes that no single layer is completely impenetrable and that layering defenses provides redundancy — if one layer fails, others continue to provide protection.

In the context of Microsoft Security, Compliance, and Identity fundamentals, defense-in-depth typically consists of several key layers:

1. **Physical Security**: Protecting physical access to data centers, hardware, and facilities through measures like biometric access controls and surveillance.

2. **Identity and Access**: Implementing strong authentication and authorization mechanisms, such as multi-factor authentication (MFA), role-based access control (RBAC), and Azure Active Directory to ensure only authorized users can access resources.

3. **Perimeter Security**: Using firewalls, DDoS protection, and network perimeter defenses like Azure Firewall and Azure DDoS Protection to guard the network boundary.

4. **Network Security**: Segmenting networks, employing network security groups (NSGs), and limiting communication between resources to reduce lateral movement by attackers.

5. **Compute Layer**: Securing virtual machines, endpoints, and applications by keeping systems patched, using endpoint protection, and hardening operating systems.

6. **Application Security**: Ensuring applications are developed securely, free of vulnerabilities, and regularly tested through secure development practices.

7. **Data Security**: Protecting data at rest and in transit through encryption, data classification, and data loss prevention (DLP) policies.

The CIA triad — Confidentiality, Integrity, and Availability — serves as the guiding principle behind defense-in-depth. Microsoft implements this strategy across its cloud services, including Azure, Microsoft 365, and Dynamics 365, providing built-in tools at each layer. By combining these layers, organizations create a robust security posture where attackers must overcome multiple barriers, significantly reducing the likelihood of a successful breach.

Zero Trust Model and Guiding Principles

The Zero Trust Model is a modern security framework that operates on the principle of 'never trust, always verify.' Unlike traditional security models that assume everything inside a corporate network is trustworthy, Zero Trust assumes that threats can originate from both inside and outside the network. Every access request is treated as if it originates from an untrusted network, regardless of where the request comes from or what resource it accesses.

The Zero Trust Model is built upon three guiding principles:

1. **Verify Explicitly**: Always authenticate and authorize based on all available data points. This includes user identity, location, device health, service or workload, data classification, and anomalies. Rather than relying on a single factor like a password, organizations should leverage multiple signals to make informed access decisions.

2. **Use Least Privilege Access**: Limit user access with just-in-time (JIT) and just-enough-access (JEA) policies, risk-based adaptive policies, and data protection measures. Users and applications should only be granted the minimum permissions necessary to perform their tasks. This minimizes the potential blast radius if an account is compromised, reducing lateral movement opportunities for attackers.

3. **Assume Breach**: Operate as if a breach has already occurred. This principle drives organizations to minimize the blast radius by segmenting access by network, user, devices, and application awareness. It encourages the use of end-to-end encryption, analytics for threat detection, and improved visibility across the environment to identify and respond to threats in real time.

In Microsoft's ecosystem, Zero Trust is implemented through tools like Azure Active Directory (now Microsoft Entra ID), Microsoft Defender, Microsoft Intune, and Microsoft Sentinel. These tools work together to enforce conditional access policies, monitor device compliance, protect data, and detect threats. By adopting Zero Trust, organizations create a robust, adaptive security posture that protects identities, endpoints, applications, data, infrastructure, and networks against evolving cyber threats.

Encryption and Hashing Fundamentals

Encryption and hashing are two fundamental concepts in cybersecurity that protect data integrity and confidentiality.

**Encryption** is the process of converting plaintext data into an unreadable format (ciphertext) using an algorithm and a key. Only authorized parties with the correct decryption key can revert the data to its original form. There are two main types:

1. **Symmetric Encryption**: Uses the same key for both encryption and decryption. It is fast and efficient for large data volumes. Examples include AES (Advanced Encryption Standard) and DES (Data Encryption Standard).

2. **Asymmetric Encryption**: Uses a pair of keys — a public key for encryption and a private key for decryption. This method is commonly used in secure communications like SSL/TLS and digital signatures. Examples include RSA and Elliptic Curve Cryptography (ECC).

Encryption protects data in two states:
- **Data at rest**: Data stored on disks, databases, or storage accounts.
- **Data in transit**: Data moving across networks, such as between a user and a server.

**Hashing** is a one-way process that converts data into a fixed-length string (hash value) using a mathematical algorithm. Unlike encryption, hashing is irreversible — you cannot retrieve the original data from the hash. Common hashing algorithms include SHA-256 and MD5.

Hashing is primarily used for:
- **Data integrity verification**: Ensuring data has not been tampered with by comparing hash values.
- **Password storage**: Storing hashed passwords instead of plaintext, often combined with salting (adding random data before hashing) to prevent rainbow table attacks.

**Key Differences**:
- Encryption is reversible with the correct key; hashing is not.
- Encryption ensures confidentiality; hashing ensures integrity.
- Encryption produces variable-length output; hashing produces fixed-length output.

In Microsoft's security ecosystem, both techniques are extensively used across Azure services, Microsoft 365, and identity platforms to safeguard sensitive information and ensure compliance with security standards.

Governance, Risk, and Compliance (GRC) Concepts

Governance, Risk, and Compliance (GRC) is a structured framework that organizations use to align their IT operations and business strategies with regulatory requirements, manage risks effectively, and ensure accountability. In the context of Microsoft Security, Compliance, and Identity Fundamentals, GRC plays a critical role in helping organizations maintain a secure and compliant environment.

**Governance** refers to the policies, procedures, and processes that an organization establishes to guide decision-making and ensure accountability. It defines roles and responsibilities, sets strategic direction, and ensures that organizational activities align with business objectives. In the Microsoft ecosystem, governance involves using tools like Microsoft Purview and Azure Policy to enforce organizational standards and monitor compliance across cloud resources.

**Risk Management** involves identifying, assessing, and mitigating potential threats that could impact an organization's assets, operations, or reputation. This includes evaluating cybersecurity threats, data breaches, regulatory penalties, and operational disruptions. Microsoft provides tools such as Microsoft Defender for Cloud and Microsoft Secure Score to help organizations assess their security posture, identify vulnerabilities, and prioritize risk mitigation strategies. Risk management ensures that organizations proactively address threats rather than reactively responding to incidents.

**Compliance** refers to adhering to external laws, regulations, industry standards, and internal policies. Organizations must comply with frameworks such as GDPR, HIPAA, ISO 27001, and NIST. Microsoft offers compliance solutions like Microsoft Purview Compliance Manager, which provides assessments, actionable insights, and compliance scores to help organizations track their adherence to regulatory requirements.

Together, GRC ensures that organizations operate within legal and ethical boundaries while effectively managing risks. It promotes a culture of transparency, accountability, and continuous improvement. By integrating governance, risk, and compliance into a unified strategy, organizations can reduce redundancies, streamline operations, and build trust with stakeholders. Microsoft's comprehensive suite of security and compliance tools enables organizations to implement robust GRC frameworks efficiently across their digital environments.

Identity as the Primary Security Perimeter

In modern cybersecurity, the concept of identity as the primary security perimeter represents a fundamental shift from traditional network-based security models. Historically, organizations relied on firewalls, VPNs, and network boundaries to protect their resources — essentially creating a 'castle and moat' approach where everything inside the network was trusted. However, with the rise of cloud computing, remote work, mobile devices, and bring-your-own-device (BYOD) policies, the traditional network perimeter has dissolved.

Identity has now become the new security perimeter. This means that verifying who or what is requesting access to resources is the first and most critical line of defense. An identity can represent a user, an application, a device, or a service. Every access attempt must be authenticated (proving who you are) and authorized (determining what you can do) regardless of the network location.

This shift aligns closely with the Zero Trust security model, which operates on the principle of 'never trust, always verify.' Under this model, no entity — whether inside or outside the network — is automatically trusted. Every request is validated based on identity, device health, location, and other signals before granting access.

Key components of identity as the primary security perimeter include:

1. **Authentication** – Verifying identity through methods like passwords, multi-factor authentication (MFA), and biometrics.
2. **Authorization** – Granting appropriate access levels based on roles, policies, and conditions.
3. **Identity Governance** – Managing the lifecycle of identities, ensuring proper access rights, and conducting regular access reviews.
4. **Identity Protection** – Detecting and responding to identity-based threats such as compromised credentials and suspicious sign-ins.

Microsoft supports this paradigm through services like Azure Active Directory (now Microsoft Entra ID), which provides centralized identity management, conditional access policies, and real-time risk detection. By treating identity as the primary security perimeter, organizations can better protect their resources in a borderless digital environment.

Authentication Concepts and Methods

Authentication is the process of verifying the identity of a user, device, or entity before granting access to resources. In Microsoft's security framework, authentication is a foundational concept that ensures only legitimate users can access systems and data.

**Key Authentication Methods:**

1. **Password-based Authentication:** The most traditional method where users provide a username and password. While widely used, it is vulnerable to phishing, brute-force attacks, and credential theft.

2. **Multi-Factor Authentication (MFA):** Enhances security by requiring two or more verification factors: something you know (password), something you have (phone or security key), and something you are (biometrics like fingerprint or facial recognition). Microsoft Entra ID (formerly Azure AD) strongly supports MFA.

3. **Passwordless Authentication:** Microsoft promotes passwordless methods such as Windows Hello for Business, Microsoft Authenticator app, and FIDO2 security keys. These eliminate password vulnerabilities while improving user experience.

4. **Certificate-based Authentication:** Uses digital certificates to verify identity, commonly employed in enterprise environments for device and user authentication.

5. **Token-based Authentication:** After initial verification, tokens (such as OAuth 2.0 or SAML tokens) are issued to grant access without repeated credential entry. This is fundamental to Single Sign-On (SSO).

**Core Concepts:**

- **Single Sign-On (SSO):** Allows users to authenticate once and access multiple applications seamlessly.
- **Federation:** Enables trust relationships between different identity providers, allowing cross-organizational authentication.
- **Modern Authentication:** Refers to protocols like OAuth 2.0 and OpenID Connect that support secure, token-based authentication flows.

**Authentication vs. Authorization:** Authentication (AuthN) confirms identity, while authorization (AuthZ) determines what resources an authenticated user can access.

Microsoft emphasizes a Zero Trust approach where authentication is continuously validated, never implicitly trusted, ensuring robust security across cloud and hybrid environments. These methods collectively form a layered defense strategy against identity-based threats.

Authorization Concepts and Access Control

Authorization is a fundamental security concept that determines what actions or resources an authenticated user, device, or entity is permitted to access. While authentication verifies identity (who you are), authorization defines permissions (what you can do). Together, they form the backbone of secure access management.

Access control refers to the policies and mechanisms used to regulate who can access specific resources and under what conditions. There are several key access control models:

1. **Role-Based Access Control (RBAC):** Permissions are assigned based on roles within an organization. For example, a finance manager may have access to billing systems, while an IT admin has access to infrastructure tools. RBAC simplifies management by grouping permissions into roles rather than assigning them individually.

2. **Attribute-Based Access Control (ABAC):** Access decisions are based on attributes such as user location, device type, time of access, and data sensitivity. This model provides more granular and dynamic control compared to RBAC.

3. **Discretionary Access Control (DAC):** Resource owners determine who can access their resources. This is flexible but can be less secure if not properly managed.

4. **Mandatory Access Control (MAC):** Access is governed by centralized policies and security classifications. Users cannot override these controls, making it common in highly regulated environments.

5. **Least Privilege Principle:** Users are granted only the minimum level of access necessary to perform their tasks, reducing the attack surface and limiting potential damage from compromised accounts.

6. **Conditional Access:** In Microsoft's ecosystem, Conditional Access policies act as if-then statements that evaluate signals (user identity, device compliance, location, risk level) to enforce authorization decisions, such as granting access, requiring multi-factor authentication, or blocking access entirely.

Effective authorization and access control are essential for protecting sensitive data, maintaining compliance with regulations, and ensuring that organizational resources are only accessible to the right people under the right conditions.

Identity Providers and Their Role

An Identity Provider (IdP) is a trusted system or service responsible for creating, maintaining, and managing digital identities while providing authentication services to applications and resources. In the context of Microsoft Security, Compliance, and Identity, identity providers play a central and foundational role in modern security architectures.

**What Identity Providers Do:**
Identity providers authenticate users by verifying their credentials (such as usernames, passwords, biometrics, or multi-factor authentication tokens) and then issue security tokens that contain claims about the user's identity. These tokens are used by applications and services to authorize access without requiring each application to manage credentials independently.

**Key Roles of Identity Providers:**
1. **Centralized Authentication:** IdPs serve as a single source of truth for identity verification, eliminating the need for multiple credential stores across different applications.
2. **Single Sign-On (SSO):** Users authenticate once with the IdP and gain access to multiple applications and services without re-entering credentials.
3. **Federation:** IdPs enable trust relationships between different organizations, allowing users from one organization to access resources in another through federated identity protocols like SAML, OAuth 2.0, and OpenID Connect.
4. **Security Enhancement:** By centralizing authentication, IdPs enable consistent enforcement of security policies, including multi-factor authentication (MFA), conditional access, and risk-based authentication.

**Microsoft's Identity Provider - Azure Active Directory (Azure AD/Microsoft Entra ID):**
Microsoft Entra ID (formerly Azure AD) is Microsoft's cloud-based identity provider. It manages identities for millions of organizations and supports authentication for Microsoft 365, Azure services, and thousands of third-party applications.

Identity providers are essential to the Zero Trust security model, where the principle of 'never trust, always verify' requires every access request to be authenticated and authorized through a trusted IdP. This shift from traditional network-based perimeter security to identity-based security makes identity providers the new control plane for modern security infrastructure.

Directory Services and Active Directory

Directory Services are specialized database systems designed to store, organize, and manage information about network resources such as users, computers, printers, and services. They provide a hierarchical structure that enables efficient lookup, authentication, and authorization across an organization's IT infrastructure.

Active Directory (AD) is Microsoft's implementation of directory services, introduced with Windows 2000 Server. It serves as the backbone of identity management in enterprise environments. Active Directory stores information about objects on a network and makes this information accessible to users and administrators through a structured framework.

Key components of Active Directory include:

1. **Active Directory Domain Services (AD DS):** The core component that provides authentication and authorization mechanisms. It stores directory data and manages communication between users and domains, including user sign-in processes, authentication, and directory searches.

2. **Domain Controllers:** Servers that host AD DS and handle authentication requests, enforce security policies, and replicate directory data across the network.

3. **Organizational Units (OUs):** Containers within a domain that allow administrators to group users, computers, and other objects for easier management and policy application.

4. **Group Policy Objects (GPOs):** Enable centralized configuration management across the domain, controlling security settings, software deployment, and user environments.

5. **Forests, Domains, and Trees:** The logical structure of AD, where a forest is the top-level container, domains represent administrative boundaries, and trees are collections of domains sharing a contiguous namespace.

Active Directory supports protocols like LDAP (Lightweight Directory Access Protocol) and Kerberos for directory queries and authentication respectively.

In the modern cloud era, Microsoft has extended these concepts through **Azure Active Directory (now Microsoft Entra ID)**, which provides cloud-based identity and access management services. While traditional AD focuses on on-premises infrastructure, Azure AD enables single sign-on, multi-factor authentication, and identity protection for cloud applications, bridging on-premises and cloud environments in hybrid identity scenarios.

Federation Concepts

Federation is a concept in identity management that enables users from one organization (or identity domain) to access resources in another organization without needing separate credentials. It establishes a trust relationship between two or more domains, allowing seamless and secure authentication across organizational boundaries.

At its core, federation relies on a trust relationship between an Identity Provider (IdP) and a Service Provider (SP). The Identity Provider is responsible for authenticating the user and issuing security tokens that contain claims about the user's identity and attributes. The Service Provider trusts the Identity Provider and grants access based on the tokens it receives.

Here's how federation typically works:

1. A user attempts to access a resource at the Service Provider.
2. The Service Provider redirects the user to their Identity Provider for authentication.
3. The Identity Provider authenticates the user (using credentials stored in their home domain).
4. Upon successful authentication, the IdP issues a security token containing claims (such as username, email, roles, or group memberships).
5. The token is sent to the Service Provider, which validates it and grants appropriate access based on the claims.

Federation uses standard protocols such as SAML (Security Assertion Markup Language), WS-Federation, and OpenID Connect to facilitate this process. These protocols ensure interoperability between different systems and platforms.

A common real-world example is when an organization uses Azure Active Directory (now Microsoft Entra ID) as their IdP and federates with cloud applications like Microsoft 365, Salesforce, or other SaaS providers. Users sign in once with their organizational credentials and gain access to multiple federated services without re-entering passwords.

Key benefits of federation include:
- **Single Sign-On (SSO):** Users authenticate once and access multiple services.
- **Reduced credential management:** No need for separate accounts across systems.
- **Enhanced security:** Centralized authentication and policy enforcement.
- **Improved user experience:** Seamless access across organizational boundaries.

Federation is fundamental to modern cloud-based identity management and Zero Trust security architectures.

More Concepts of Security, Compliance, and Identity questions
495 questions (total)