Secure compute, storage, and databases
Implement advanced security for compute resources, storage accounts, and Azure SQL databases.
Secure compute, storage, and databases are fundamental pillars of Azure security that protect your cloud infrastructure and data assets. **Secure Compute** involves protecting virtual machines, containers, and serverless functions. Key practices include implementing Azure Defender for servers, ena…
Concepts covered: Access methods for Azure Files, Azure SQL Database Always Encrypted, Azure Bastion and just-in-time (JIT) VM access, Network isolation for Azure Kubernetes Service (AKS), AKS security and monitoring, Authentication for AKS, Security monitoring for Azure Container Instances (ACIs), Security monitoring for Azure Container Apps (ACAs), Access management for Azure Container Registry (ACR), Disk encryption (ADE, encryption at host, confidential disk), Security configurations for Azure API Management, Access control for storage accounts, Storage account access keys management, Access methods for Azure Blob Storage, Data protection (soft delete, backups, versioning, immutable storage), Bring your own key (BYOK) for storage, Double encryption at Azure Storage infrastructure level, Microsoft Entra database authentication, Database auditing, Dynamic data masking, Transparent Data Encryption (TDE)
AZ-500 - Secure compute, storage, and databases Example Questions
Test your knowledge of Secure compute, storage, and databases
Question 1
Constellation Media operates a content distribution platform where archived video assets totaling 280 TB are stored across 6 Azure Storage accounts in the Australia East region. Each storage account uses BYOK encryption with customer-managed keys stored in Azure Key Vault Premium tier. The original encryption key 'MediaArchive2023' is an RSA-2048 key that has been operational for 19 months. The Chief Information Security Officer initiates a cryptographic key rotation policy requiring an upgrade to RSA-4096 keys for enhanced security posture. The security architect creates a new key 'MediaArchive2024' with RSA-4096 specification in the same Key Vault and updates all 6 storage accounts to reference the new key URI through the Azure Portal encryption settings blade. The configuration change completes successfully, and the storage accounts now display 'MediaArchive2024' as their active encryption key. The operations team confirms that applications can successfully read existing video files and write new content to the storage accounts. The CFO questions whether the organization needs to allocate budget for re-encrypting 280 TB of existing data to fully benefit from the stronger RSA-4096 key protection. What is the accurate technical outcome regarding the cryptographic protection applied to the pre-existing 280 TB of archived video content after the key rotation operation?
Question 2
What is the cryptographic relationship between the two encryption layers when infrastructure encryption is enabled on an Azure Storage account?
Question 3
BlueSky Aviation operates an Azure Container Registry named 'bluesky-acr-fleet' in the Japan East region containing containerized aircraft maintenance scheduling and flight operations planning applications across repositories: 'maintenance-schedulers', 'flight-planners', 'crew-rosters', and 'fuel-optimizers'. The company has a legacy on-premises data center hosting 20 Docker Swarm nodes that execute nightly batch processing jobs for aircraft utilization analytics. These Swarm nodes need to pull images from 'maintenance-schedulers' and 'fuel-optimizers' repositories during their scheduled execution windows between 01:00 and 05:00 UTC. The IT Director has mandated a security upgrade requiring that authentication credentials must be rotated quarterly, access should be restricted to pull operations only on the two designated repositories, and the solution must provide audit trails showing which Swarm node pulled which image version during each batch execution cycle. The infrastructure runs in an air-gapped network segment where Azure AD integration and managed identity assignment are architecturally infeasible due to regulatory restrictions on external authentication dependencies. The operations team requires that credentials can be programmatically retrieved and injected into Docker Swarm service definitions during deployment using configuration management tools, and the authentication mechanism must function reliably using standard Docker login commands across all 20 nodes. The security team needs the capability to revoke access for individual credentials if any Swarm node is suspected of compromise while maintaining uninterrupted operations for the remaining nodes. What authentication approach should the cloud architect implement for these on-premises Docker Swarm nodes?