Implement Azure security
Implement user authentication, authorization, and secure Azure solutions using identity services and Key Vault.
Implementing Azure security involves multiple layers of protection to safeguard applications, data, and infrastructure in the cloud environment. As an Azure Developer, understanding these security measures is essential for building robust solutions. **Identity and Access Management** Azure Active …
Concepts covered: Create and implement shared access signatures, Authenticate and authorize users using Microsoft Identity platform, Authenticate and authorize users and apps using Microsoft Entra ID, Implement solutions that interact with Microsoft Graph, Secure app configuration using Azure App Configuration or Key Vault, Develop code using keys, secrets, and certificates from Key Vault, Implement Managed Identities for Azure resources
AZ-204 - Implement Azure security Example Questions
Test your knowledge of Implement Azure security
Question 1
Your company operates a regulatory compliance application on Azure Kubernetes Service that manages document attestation workflows for government contract submissions. The application uses Azure Key Vault to store EdDSA (Ed25519) signing keys for creating digital signatures on compliance certificates before submission to federal oversight agencies. The development team has implemented document signing by instantiating a KeyClient during pod initialization, calling GetKey() to retrieve the signing key, and then using a third-party cryptographic library to extract the Ed25519 private key parameters from the JsonWebKey object into a custom SigningContext class that persists throughout the pod's lifecycle. This SigningContext holds the raw private key scalar value as a byte array in a private field, and the application invokes signing methods on this context object to generate Ed25519 signatures for each compliance certificate. Each pod processes approximately 280 document signatures per hour during regulatory reporting periods. During a FedRAMP compliance assessment, auditors discovered that when pods are terminated due to node maintenance or cluster scaling operations, Kubernetes captures termination state including memory contents that are forwarded to Azure Monitor Logs and retained for 180 days per the organization's incident investigation policy. These archived memory artifacts contain the extracted Ed25519 private key scalar values in plaintext within the SigningContext object allocations, persisting sensitive cryptographic material outside the Key Vault HSM environment for an extended retention period. The compliance framework mandates that all asymmetric signing operations must execute within the Key Vault cryptographic boundary to ensure private key material never exists in application process memory or any derived diagnostic artifacts. The business requires maintaining sub-90ms signature generation latency per compliance certificate to satisfy federal submission deadline requirements. The application generates 6,720 attestation signatures daily across all pods and contract workflows. What implementation approach should you adopt to satisfy the FedRAMP requirements while maintaining the signature generation latency target?
Question 2
Your company is developing a microservices application on Azure that consists of an Azure Function App that needs to retrieve secrets from Azure Key Vault. The security team has mandated that no credentials should be stored in application code or configuration files. The development team has enabled a system-assigned managed identity on the Function App. However, when the application attempts to access Key Vault secrets, it receives an authorization error. What is the most appropriate action to resolve this issue while maintaining the security requirements?
Question 3
Which Azure identity feature provides automatic credential lifecycle management that is bound to a single Azure resource instance and gets removed when that resource is deleted?