Design identity, governance, and monitoring solutions
Design logging, monitoring, authentication, authorization, and governance solutions for Azure.
Designing identity, governance, and monitoring solutions in Azure requires a comprehensive approach to ensure security, compliance, and operational visibility across cloud resources. **Identity Solutions:** Azure Active Directory (Azure AD) serves as the foundation for identity management. Archite…
Concepts covered: Recommend a logging solution, Recommend a solution for routing logs, Recommend a monitoring solution, Recommend an authentication solution, Recommend an identity management solution, Recommend a solution for authorizing access to Azure resources, Recommend a solution for authorizing access to on-premises resources, Recommend a solution to manage secrets, certificates, and keys, Recommend a structure for management groups, subscriptions, and resource groups, Recommend a strategy for resource tagging, Recommend a solution for managing compliance, Recommend a solution for identity governance
AZ-305 - Design identity, governance, and monitoring solutions Example Questions
Test your knowledge of Design identity, governance, and monitoring solutions
Question 1
A supply chain analytics company operates a vendor performance tracking platform on Azure that monitors supplier delivery metrics, quality ratings, and compliance documentation across 8,400 suppliers in 67 countries. The infrastructure consists of Azure Container Apps hosting 28 microservices for supplier scoring algorithms, Azure PostgreSQL Flexible Server managing supplier contracts and performance history, Azure Event Hubs streaming real-time shipment status updates from logistics partners, and Azure API Management exposing vendor portals. The platform processes 340,000 supplier transactions daily, generating 52GB of application logs during regular business periods, which increases to 165GB during quarter-end procurement cycles when suppliers submit compliance certifications. The procurement audit team investigates supplier disputes by reconstructing complete transaction histories across all microservices from 6-9 months prior, requiring detailed traces of scoring calculations, contract validation logic, and API calls to third-party logistics systems, with query results needed within 15 seconds to support supplier negotiation meetings. The legal compliance department mandates that all supplier audit trails, contract modification logs, and quality incident records must be preserved for 11 years in append-only storage for regulatory examinations and potential supplier litigation. The operations team executes correlation analytics every 8 minutes across container logs, database connection metrics, and Event Hubs throughput to identify integration failures with supplier systems that could delay procurement workflows. The data analytics team performs quarterly analyses on 14 months of historical supplier performance data to refine scoring algorithms and identify at-risk vendors, requiring efficient export capabilities for machine learning model training. The NOC team needs unified dashboards displaying API Management request latencies, PostgreSQL query performance, and Event Hubs consumer lag, refreshed every 3 minutes. The finance director has allocated $2,650 monthly for logging solutions and requires cost breakdown visibility by microservice and data source. Which logging architecture should be recommended?
Question 2
A biotechnology company has deployed a genomic sequencing platform on Azure with the following components: Azure Batch pools processing DNA sequencing workloads, Azure PostgreSQL Flexible Server storing research metadata and experimental results, Azure Blob Storage containing raw sequencing files organized by research project, and Azure Container Registry hosting custom bioinformatics container images. The company collaborates with five external research institutions, each running their own Azure Batch jobs using container images from the company's registry. The architecture requires: Batch compute nodes must pull container images from Container Registry during job initialization, authenticate to PostgreSQL to record job progress and results, and read input files from Blob Storage while writing analysis outputs to project-specific containers. The external institutions deploy Batch pools in their own Azure subscriptions but must access the company's shared Container Registry, Storage Account, and PostgreSQL instance. The company's internal research teams (18 scientists) use the same infrastructure from the company's subscription. The security team mandates that Batch compute nodes authenticate using platform-managed identities rather than embedded credentials, and each institution's Batch pools should have isolated write access to their designated Storage containers while maintaining read access to shared reference datasets. The PostgreSQL database administrator should retain the ability to revoke an institution's database access centrally when collaborations end. Additionally, audit logs must identify which institution's compute nodes accessed which resources for IP protection and compliance tracking. What authorization configuration should the Solutions Architect implement to support this multi-tenant research collaboration model?
Question 3
NovaTech Telecommunications operates a distributed SD-WAN infrastructure across Azure with 280 Azure Firewall instances, 95 Azure VPN Gateway resources, and 140 Azure Application Gateway deployments spanning 9 subscriptions across North America and Latin America. The platform generates three primary log categories: firewall threat intelligence logs (290 GB daily), VPN Gateway diagnostic logs (110 GB daily), and Application Gateway access logs (385 GB daily). The Chief Security Officer requires that firewall threat intelligence logs must support advanced threat hunting queries by the security operations center for 90 days, with query completion times under 7 seconds to enable rapid incident triage during active security events. The network engineering team needs VPN Gateway diagnostic logs accessible for 45 days to analyze tunnel connectivity patterns and optimize branch office connectivity, expecting interactive query performance for capacity planning workflows. The Application Gateway access logs contain primarily routine health probe requests and successful traffic patterns that must be preserved for 5 years to satisfy telecommunications regulatory audits, but these logs are examined only during semi-annual compliance reviews. The platform expands by 20-25 network resources monthly as new retail locations come online, and the infrastructure automation team wants newly deployed network components to adopt enterprise logging standards through governance policies rather than manual configuration by regional network administrators. The monthly budget allocated by finance supports $9,400 for security analytics capabilities and $1,600 for regulatory compliance storage. The IT Security Director insists that the solution must enable correlation analysis between firewall threat events and corresponding VPN Gateway connection attempts to detect coordinated network intrusion attempts. Which log routing architecture should the Solutions Architect design to address the security operations requirements, network capacity analysis needs, and telecommunications regulatory obligations?