🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-305 Domain 1
Domain 1 — Module 7 of 7 100%
7 of 30 overall

AZ-305 Study Guide

Domain 1: Design Identity, Governance, and Monitoring Solutions

  • Monitoring & Logging Design
  • Choosing Authentication Methods
  • Designing Identity Management
  • Authorizing Access to Resources
  • Secrets, Keys & Certificates
  • Governance at Scale
  • Compliance & Identity Governance

Domain 2: Design Data Storage Solutions

  • Relational Data: Choosing Your SQL Platform
  • Database Performance & Scalability
  • Database Security & Compliance
  • Cosmos DB & Semi-Structured Data
  • Blob, Data Lake & Azure Files
  • Data Integration & Analytics

Domain 3: Design Business Continuity Solutions

  • Recovery Objectives: RPO, RTO & SLA Free
  • Backup & Recovery for Compute Free
  • Backup for Databases & Unstructured Data Free
  • High Availability for Compute Free
  • High Availability for Data Free

Domain 4: Design Infrastructure Solutions

  • Compute Design: VMs & When to Use Them
  • Container Solutions: AKS, ACI & Container Apps
  • Serverless & Batch Processing
  • Messaging Architecture
  • Event-Driven Architecture
  • API Integration & Caching
  • App Configuration & Automated Deployment
  • Migration Strategy & Assessment
  • Executing Migrations
  • Network Connectivity: Internet & Hybrid
  • Network Security & Performance
  • Load Balancing & Routing

AZ-305 Study Guide

Domain 1: Design Identity, Governance, and Monitoring Solutions

  • Monitoring & Logging Design
  • Choosing Authentication Methods
  • Designing Identity Management
  • Authorizing Access to Resources
  • Secrets, Keys & Certificates
  • Governance at Scale
  • Compliance & Identity Governance

Domain 2: Design Data Storage Solutions

  • Relational Data: Choosing Your SQL Platform
  • Database Performance & Scalability
  • Database Security & Compliance
  • Cosmos DB & Semi-Structured Data
  • Blob, Data Lake & Azure Files
  • Data Integration & Analytics

Domain 3: Design Business Continuity Solutions

  • Recovery Objectives: RPO, RTO & SLA Free
  • Backup & Recovery for Compute Free
  • Backup for Databases & Unstructured Data Free
  • High Availability for Compute Free
  • High Availability for Data Free

Domain 4: Design Infrastructure Solutions

  • Compute Design: VMs & When to Use Them
  • Container Solutions: AKS, ACI & Container Apps
  • Serverless & Batch Processing
  • Messaging Architecture
  • Event-Driven Architecture
  • API Integration & Caching
  • App Configuration & Automated Deployment
  • Migration Strategy & Assessment
  • Executing Migrations
  • Network Connectivity: Internet & Hybrid
  • Network Security & Performance
  • Load Balancing & Routing
Domain 1: Design Identity, Governance, and Monitoring Solutions Premium ⏱ ~18 min read

Compliance & Identity Governance

Azure Policy for compliance at scale, plus Privileged Identity Management, access reviews, and entitlement management — the governance layer that keeps your Azure environment audit-ready.

Why compliance and identity governance matter

☕ Simple explanation

Compliance is the rulebook. Identity governance is the referee.

Azure Policy enforces rules across your resources: “All storage must be encrypted,” “VMs must be in approved regions,” “Public endpoints are not allowed.” These rules run continuously — not just at deployment time.

Identity governance controls WHO has access and for HOW LONG: “Admins only get privileges when they need them (PIM),” “Guest access is reviewed every 90 days,” “New employees automatically get the right access packages.”

Compliance and identity governance are the enforcement layer of your Azure architecture:

  • Azure Policy: Declarative compliance rules with effects (Deny, Audit, Modify, DeployIfNotExists, Append)
  • Policy initiatives (sets): Groups of related policies for regulatory frameworks (CIS, NIST, ISO 27001)
  • Microsoft Defender for Cloud: Compliance dashboard, secure score, and recommendations
  • Privileged Identity Management (PIM): Just-in-time, time-bound access to elevated roles
  • Access reviews: Periodic review of who has access to what
  • Entitlement management: Self-service access packages for internal and external users

Well-Architected Framework (Security): Governance and compliance are part of the security pillar’s “govern and manage” design principle. Automate compliance — don’t rely on human discipline.

Azure Policy: compliance at scale

Policy effects

EffectWhat HappensWhen to Use
DenyBlocks the resource operationHard guardrails — “MUST NOT happen”
AuditAllows operation but creates compliance entryVisibility — “should not happen, but don’t block yet”
ModifyChanges resource properties at create/updateAuto-remediate — “fix it for them”
DeployIfNotExistsDeploys a companion resource if missingAuto-configure — “if VM exists, deploy agent”
AppendAdds properties to a resourceAdd fields — “force HTTPS on storage accounts”
DisabledPolicy exists but isn’t enforcedTesting, temporary exclusion
💡 Exam tip: Deny vs Audit for new vs existing resources

New deployments: Start with Audit to understand what would break, then switch to Deny once teams are ready.

Existing resources: Policies with Deny effect only block new operations. Existing non-compliant resources are flagged but not changed. Use Modify or DeployIfNotExists with a remediation task to fix existing resources.

The exam often tests this: “You apply a Deny policy for encryption. Will existing unencrypted storage accounts be blocked?” Answer: No — they’ll be flagged as non-compliant but continue working. New storage accounts will be blocked.

Policy initiatives for regulatory compliance

Instead of managing individual policies, use initiatives (policy sets) that map to compliance frameworks:

InitiativeFrameworkWhat It Covers
CIS Microsoft Azure FoundationsCIS Benchmark200+ controls: identity, networking, logging, storage, databases
NIST SP 800-53 Rev. 5US GovernmentComprehensive security and privacy controls
ISO 27001:2013InternationalInformation security management
PCI DSS v4.0Payment Card IndustryCardholder data protection
Azure Security BenchmarkMicrosoftBest practices across all Azure services

🏦 Elena’s compliance stack: FinSecure Bank assigns three initiatives at the management group level:

  1. PCI DSS v4.0 — mandatory for any subscription handling payment data
  2. CIS Azure Foundations — baseline for all subscriptions
  3. Custom initiative — bank-specific requirements (data residency, approved regions, encryption standards)

All three are assigned in Audit mode during rollout, then promoted to Deny after a 30-day compliance assessment.

Compliance dashboards

ToolWhat It ShowsBest For
Azure Policy compliancePolicy-level compliance percentage per scopeDay-to-day governance operations
Microsoft Defender for CloudSecure score, regulatory compliance dashboardExecutive reporting, security posture
Azure Resource GraphQuery all resources and their compliance stateCustom reports, automation, cross-subscription queries

Identity governance with Entra ID P2

Identity governance answers three questions: WHO has access? SHOULD they still have it? HOW do they get new access?

Privileged Identity Management (PIM)

Permanent Assignment vs PIM Just-In-Time
FactorPermanent Role AssignmentPIM Just-In-Time (JIT)
Access durationAlways active — 24/7Time-bound — 1-24 hours (configurable)
ActivationNone — always has permissionsUser must activate and justify the request
ApprovalNone requiredOptional — require manager/security team approval
MFADepends on CA policyRequired at activation
Audit trailAssignment logged, usage hard to trackFull trail: who activated, when, why, what they did
Blast radiusLarge — compromised account always has privilegesMinimal — privileges expire, attacker window is narrow
Best forBreak-glass accounts onlyAll admin roles in production

🏛️ David’s PIM design for government: CloudPath Advisory’s standard:

  • Global Administrator: PIM-eligible only, 2-person approval, 4-hour max activation, MFA required
  • Subscription Contributor: PIM-eligible, self-approval with justification, 8-hour max
  • Reader roles: Permanent (low risk, read-only)
  • Break-glass accounts (2): Permanent Global Admin, excluded from all Conditional Access, stored in physical safe
ℹ️ Design decision: PIM for Azure resources too

PIM isn’t just for Entra ID roles — it also works for Azure resource roles (RBAC). You can make someone “eligible” for Owner on a subscription and require activation with justification.

Design pattern: Developers are permanent Readers but eligible Contributors. They activate Contributor when they need to deploy, and it expires after 4 hours.

Access reviews

SettingDescriptionRecommended
FrequencyHow often reviews occurQuarterly for most roles, monthly for privileged
ScopeWhich assignments to reviewAll members of a group, all guests, specific role assignments
ReviewerWho decides to approve/denyResource owner, manager, or self-review
Auto-applyWhat happens if reviewer doesn’t respondRemove access (default safe) or keep access
DurationHow long reviewers have to complete14-30 days

🏗️ Priya’s access review strategy:

  • Guest access: Quarterly review — sponsoring employee must confirm each guest still needs access
  • Privileged roles: Monthly review — security team validates all PIM-eligible assignments
  • Application access: Quarterly — application owners review who has access to their apps
  • Auto-apply: Non-responses default to “remove access” (fail-safe)

Entitlement management

Entitlement management creates access packages — bundles of groups, apps, and sites that users can request through self-service.

ComponentDescription
Access packageBundle: “Marketing team access” = SharePoint site + Teams team + Power BI workspace
CatalogContainer for access packages — organised by department or project
PolicyWho can request, who approves, how long it lasts, auto-renewal rules
Connected organisationsExternal orgs whose users can request access packages

🚀 Marcus’s use case: When NovaSaaS hires a new developer:

  1. Developer requests the “Engineering Access Package” from the self-service portal
  2. Package includes: GitHub org membership, Azure DevOps project, shared Key Vault, dev subscription Contributor role
  3. Manager approves automatically (pre-approved for Engineering department)
  4. Access expires after 365 days, auto-renewal with manager re-approval

Knowledge check

Question

What's the difference between Azure Policy Deny and Audit effects?

Click or press Enter to reveal answer

Answer

Deny blocks the operation (hard guardrail). Audit allows the operation but flags it as non-compliant (soft guardrail). Both effects only evaluate new/updated resources. Existing non-compliant resources need Modify or DeployIfNotExists with remediation tasks.

Click to flip back

Question

What does Privileged Identity Management (PIM) provide?

Click or press Enter to reveal answer

Answer

Just-in-time, time-bound access to elevated roles. Users are made 'eligible' for a role and must activate it when needed — with justification, MFA, and optional approval. The activation expires after a configured time (1-24 hours). Requires Entra ID P2.

Click to flip back

Question

What are access packages in Entra ID entitlement management?

Click or press Enter to reveal answer

Answer

Bundles of groups, applications, and SharePoint sites that users can request through self-service. They have approval policies, expiry dates, and auto-renewal rules. Used for onboarding (new joiner gets all needed access in one request) and external collaboration.

Click to flip back

Knowledge Check

🏦 Elena needs to ensure all Azure Storage accounts across FinSecure Bank's 20 subscriptions use encryption with customer-managed keys. Existing storage accounts that don't comply should be flagged but not disrupted. New storage accounts must comply or be blocked. Which policy approach should she recommend?

Knowledge Check

🏛️ David's government client has 15 users with Global Administrator privileges — all permanently assigned. The security audit requires: only 2 break-glass accounts should have permanent admin access, all others must activate when needed with approval. Which solution should David recommend?

🎬 Video coming soon


Domain 1 complete! You’ve designed monitoring, authentication, identity management, authorization, secrets management, governance, and compliance for your Azure architecture.

Next up: Now let’s design where your data lives — Relational Data: Choosing Your SQL Platform.

← Previous

Governance at Scale

Next →

Relational Data: Choosing Your SQL Platform

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.