🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-100 Domain 1
Domain 1 — Module 9 of 12 75%
9 of 32 overall

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads
Domain 1: Design Solutions That Align with Security Best Practices and Priorities Premium ⏱ ~13 min read

Backup, Recovery, and Business Continuity

Design backup strategies, data retention policies, and recovery architectures that keep organisations running when the worst happens. Covers secure backup configurations, archival strategy, and RTO/RPO design.

Why backup is a security architecture decision

☕ Simple explanation

Backup is your safety net — but only if nobody can cut the ropes.

Think of a trapeze act. The performers practice dangerous moves because there’s a safety net below. But what if someone could sneak in and remove the net before the show? That’s exactly what ransomware attackers do — they target your backups first, then encrypt everything.

A cybersecurity architect doesn’t just say “back up your data.” They design the entire safety system: where the backups live (somewhere attackers can’t reach), who can access them (not the same people who manage production), how long they’re kept (long enough to recover from slow-moving attacks), and how often they’re tested (regularly, not just “we assume it works”).

Backup and recovery architecture is a security concern, not just an operations concern. Modern attacks specifically target backup infrastructure — deleting backup agents, encrypting backup repositories, and compromising backup admin credentials. The cybersecurity architect must design backup systems that are resilient to attack, not just resilient to hardware failure.

This module covers three exam areas: backup and recovery strategy (what to back up, how often, where), secure backup configurations (isolation, immutability, access control), and data retention and archival (how long to keep data, regulatory requirements, lifecycle management). All three require architecture-level thinking — balancing cost, compliance, recovery speed, and security.

Designing a backup strategy

RTO and RPO — the architect’s starting point

Every backup strategy begins with two business requirements:

MetricWhat It MeansExample
RTO (Recovery Time Objective)Maximum acceptable downtime after an incident”Payment systems must be back within 4 hours”
RPO (Recovery Point Objective)Maximum acceptable data loss measured in time”We can afford to lose at most 1 hour of transactions”

The architect maps these to backup frequency and recovery methods:

RTO/RPO RequirementBackup ApproachMicrosoft Technology
RTO < 1 hour, RPO < 15 minContinuous replication, instant failoverAzure Site Recovery, SQL Always On, Cosmos DB multi-region
RTO 1-4 hours, RPO < 1 hourFrequent snapshots, automated recoveryAzure Backup (hourly), VM snapshots, managed disk snapshots
RTO 4-24 hours, RPO < 24 hoursDaily backups, documented recovery proceduresAzure Backup (daily), Azure Files backup
RTO > 24 hours, RPO = last full backupWeekly full + daily incrementalAzure Backup vault, offline media for air-gapped recovery
💡 💰 Scenario: Ingrid's tiered recovery design

Ingrid Svensson at Nordic Capital Partners classifies systems into three tiers:

  • Tier 1 (trading platform): RTO 1 hour, RPO 15 minutes → Azure Site Recovery with continuous replication + SQL Always On
  • Tier 2 (client portal): RTO 4 hours, RPO 1 hour → Azure Backup with hourly snapshots
  • Tier 3 (internal tools): RTO 24 hours, RPO 24 hours → Daily Azure Backup

Each tier has a different cost profile. Ingrid justifies the investment by mapping RTO/RPO to business impact — trading platform downtime costs millions per hour, while internal tools can wait.

Yuki Tanaka, the IAM lead, asks: “Why don’t we just put everything on Tier 1?” Ingrid explains: “Continuous replication for 500 systems costs more than the downtime risk for Tier 3 systems. We spend money where the business risk demands it.”

What to back up — the architect’s scope

Backup strategy goes beyond just data. The architect considers:

CategoryWhat Needs BackupWhy
DataDatabases, files, blob storageCore business data — the obvious target
ConfigurationAzure Policy, NSG rules, Conditional Access policiesRebuilding configuration from scratch takes days
IdentityEntra ID configuration, Conditional Access, PIM settingsIdentity is the control plane — losing it means losing access control
SecretsKey Vault contents, certificates, connection stringsWithout secrets, applications can’t authenticate to anything
Infrastructure as CodeARM templates, Bicep files, Terraform stateEnables rapid redeployment of entire environments
💡 Exam tip: Configuration backup is often overlooked

Exam questions may describe a scenario where data is recovered successfully but the organisation still can’t operate because configuration was lost — Conditional Access policies, network rules, application settings.

The architect’s answer: treat configuration as code (IaC), store it in version-controlled repositories, and include it in the recovery plan. Azure Resource Graph and Azure Policy export support this approach. For Entra ID, export configurations using IaC tools (e.g., Terraform, Microsoft365DSC) and store them in source control — native Entra backup/recovery capabilities are limited and evolving, so version-controlled IaC remains the primary recovery mechanism for identity configuration.

Secure backup configurations

The 3-2-1-1-0 backup rule

Modern backup best practice extends the classic 3-2-1 rule:

Rule ComponentWhat It Means
3 copiesProduction data + 2 backup copies
2 different mediaAt least two different storage types (disk + tape, disk + cloud object storage, or local backup appliance + cloud repository)
1 offsiteAt least one copy in a different physical location
1 offline or immutableAt least one copy that attackers cannot modify or delete
0 errorsVerified — recovery tested with zero errors

Immutable backup vaults

Immutable storage is the architect’s strongest protection against ransomware-targeted backup deletion:

FeatureWhat It Does
Azure Backup immutable vaultOnce enabled, backup data cannot be deleted before retention period expires — even by the backup admin
Soft deleteDeleted backup data is retained for 14 additional days before permanent removal
Multi-user authorisationCritical operations (disable immutability, reduce retention) require approval from a second security admin
Azure Blob immutability policiesTime-based retention or legal hold prevents modification of blob data
Immutable vaults are non-negotiable for ransomware-resilient architecture
FeatureStandard Backup VaultImmutable Backup Vault
Admin can delete backups early?Yes — any vault admin can deleteNo — data retained until retention period expires
Attacker with admin creds can destroy backups?Yes — full control if credentials are compromisedNo — immutability policy cannot be bypassed
Can immutability be disabled?N/AOnly with multi-user authorisation (requires second approver)
Soft delete protectionOptional — can be turned offMandatory — always enabled, cannot be disabled
Best forGeneral purpose backup with lower costRansomware-resilient, compliance-required backup

Data retention and archival strategy

Retention isn’t just about backup — it’s about how long data must be kept for regulatory, legal, and operational purposes.

Retention tiers

TierRetention PeriodPurposeStorage
Operational1-30 daysQuick recovery from accidental deletion or corruptionHot/cool storage, Azure Backup daily
Compliance1-7 yearsMeet regulatory requirements (SOX, GDPR, PCI DSS)Cool/archive storage, retention policies
Legal holdIndefinite until releasedPreserve data for litigation or investigationLegal hold policies, immutable storage
Archival7+ yearsLong-term historical records, audit trailsArchive storage tier, offline media

Designing retention with Microsoft tools

RequirementMicrosoft Solution
M365 data retentionPurview retention labels and policies (Exchange, SharePoint, Teams, OneDrive)
Azure resource backup retentionAzure Backup vault retention policies (daily, weekly, monthly, yearly)
Azure storage data archivalBlob storage lifecycle management policies (hot → cool → archive → delete)
Legal holdPurview eDiscovery holds, blob storage legal hold
Audit log retentionMicrosoft Purview Audit (standard: 180 days, premium: up to 10 years)
💡 Exam tip: Retention conflicts

The exam may present scenarios where different regulations require different retention periods for the same data — for example, GDPR’s data minimisation principle (delete when no longer needed) vs. financial regulations requiring 7-year retention.

The architect’s approach: the longest mandatory retention period wins, but you must also implement data minimisation for non-regulated attributes. Classify data by regulation, apply the strictest requirement, and document the justification.

Also watch for: litigation hold overrides everything. If data is under legal hold, you cannot delete it regardless of what any retention policy says.

💡 🌐 Scenario: Elena's retention matrix

Elena builds a retention matrix for Meridian Global:

Data TypeGDPRIndustry RegulationMeridian PolicyApplied Retention
Customer PIIDelete when consent withdrawnN/A3 years after last interaction3 years (consent-based)
Financial transactionsN/A7 years (SOX)7 years7 years
Employee records6 years post-employment (UK)N/A7 years7 years
Audit logsN/A5 years10 years10 years
Manufacturing IPN/AN/AIndefiniteIndefinite (company asset)

She implements this through Purview retention labels (M365 data) and Azure Backup policies (infrastructure data), with legal hold capability for any data that enters litigation.

Li Wei asks: “Can’t we just keep everything forever?” Elena explains: “Keeping data longer than required increases our exposure surface. Under GDPR, holding customer PII beyond the retention period is itself a compliance violation.”

Business continuity architecture

Business continuity extends beyond backup. The architect designs for continued operations during incidents:

ComponentWhat It CoversDesign Consideration
Disaster recoveryFailover to secondary site/regionAzure Site Recovery, paired regions, multi-region deployment
High availabilityRedundancy within a regionAvailability zones, load balancers, geo-redundant storage
Backup and restoreData and configuration recoveryBackup strategy, immutable vaults, configuration as code
Communication planStakeholder notification during incidentsOut-of-band communication channels (not dependent on affected systems)
Recovery runbooksStep-by-step recovery proceduresDocumented, tested, accessible offline
💡 💰 Scenario: Ingrid's communication plan gap

During a tabletop exercise at Nordic Capital Partners, Ingrid’s team discovers a critical gap: the incident communication plan relies on Microsoft Teams. If Azure or M365 is the affected system, they can’t communicate.

Ingrid designs an out-of-band communication plan:

  • Primary: Microsoft Teams (normal operations)
  • Secondary: SMS-based group notification (vendor-hosted, not Azure-dependent)
  • Tertiary: Personal mobile phone tree for executive team

Harald Eriksen asks: “Isn’t this over-engineering?” Ingrid replies: “In our last tabletop, the simulated Azure outage knocked out our entire communication chain. The board couldn’t reach IT for 45 minutes. That’s not a cost we can accept.”

💡 Exam tip: Business continuity is more than DR

Watch for exam questions that conflate backup, DR, and business continuity. They’re related but distinct:

  • Backup = data recovery (can I get my data back?)
  • DR = system recovery (can I bring my systems back online in another location?)
  • Business continuity = operational recovery (can the business keep running?) — includes communication, runbooks, alternate processes, and stakeholder management

The architect designs all three. An answer that only addresses backup or DR is incomplete.

🎬 Video coming soon

Key takeaways

Question

What is the 3-2-1-1-0 backup rule?

Click or press Enter to reveal answer

Answer

3 copies of data, on 2 different media types, with 1 offsite copy, 1 offline or immutable copy, and 0 recovery errors (verified through testing). The '1 immutable' and '0 errors' additions address ransomware and operational confidence.

Click to flip back

Question

What are RTO and RPO?

Click or press Enter to reveal answer

Answer

RTO (Recovery Time Objective) = maximum acceptable downtime. RPO (Recovery Point Objective) = maximum acceptable data loss measured in time. Both are business requirements that drive backup strategy, technology selection, and cost.

Click to flip back

Question

How does Azure Backup immutable vault protect against ransomware?

Click or press Enter to reveal answer

Answer

Immutable vaults prevent backup data from being deleted before the retention period expires — even by backup admins. Combined with mandatory soft delete and multi-user authorisation, they ensure backups survive even if all admin credentials are compromised.

Click to flip back

Question

Name the four data retention tiers and a tool for each.

Click or press Enter to reveal answer

Answer

Operational (1-30 days, Azure Backup daily), Compliance (1-7 years, Purview retention labels), Legal hold (indefinite, eDiscovery holds), Archival (7+ years, blob archive tier). Each tier has different cost and access profiles.

Click to flip back

Question

What three components make up business continuity beyond backup?

Click or press Enter to reveal answer

Answer

Disaster recovery (failover to another region), high availability (redundancy within a region), and operational continuity (communication plans, recovery runbooks, stakeholder management). Business continuity = all three working together.

Click to flip back

Knowledge check

Knowledge Check

Ingrid's trading platform has an RTO of 1 hour and RPO of 15 minutes. Which backup and recovery approach meets these requirements?

Knowledge Check

Elena discovers that Meridian's Azure Backup vault does not have immutability enabled. An attacker who compromises the backup admin account could delete all backups. Which combination of controls should Elena implement?

Knowledge Check

During a tabletop exercise, Nordic Capital Partners discovers their incident communication plan relies entirely on Microsoft Teams. Why is this a business continuity risk, and what should Ingrid recommend?


Next up: Evaluating Security Architecture Decisions — the capstone module where you practise making and justifying architecture trade-offs across all the frameworks.

← Previous

Ransomware Resiliency by Design

Next →

Backup, Recovery, and Business Continuity

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.