🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-100 Domain 1
Domain 1 — Module 3 of 12 25%
3 of 32 overall

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads
Domain 1: Design Solutions That Align with Security Best Practices and Priorities Free ⏱ ~13 min read

CAF and WAF: Designing Secure Azure Foundations

Learn how the Cloud Adoption Framework and Well-Architected Framework give cybersecurity architects a structured approach to security strategy, Azure Landing Zones, and design trade-offs.

Why frameworks matter to architects

☕ Simple explanation

Imagine building a house without building codes.

You could wire the electricity however you wanted, skip the fire exits, and put the plumbing wherever it fits. It might work — until something goes wrong.

Building codes exist because smart people already figured out what fails and how to prevent it. They don’t tell you what colour to paint the walls — they tell you where the load-bearing walls must go.

CAF and WAF are the building codes for Azure security. They don’t replace your creativity as an architect — they give you guardrails so you don’t have to rediscover every failure mode yourself. The SC-100 exam expects you to know these frameworks and design within them.

The Cloud Adoption Framework (CAF) provides a full lifecycle approach for cloud adoption — from strategy through governance. Its security methodology covers how to define a security strategy, manage risk during cloud transformation, and establish security governance.

The Well-Architected Framework (WAF) focuses on workload-level design. Its Security pillar provides specific design principles and recommendations for protecting workloads running in Azure.

These frameworks are complementary: CAF operates at the organisation level (strategy, governance, landing zones), while WAF operates at the workload level (architecture patterns, design decisions). A cybersecurity architect uses both — CAF to shape the platform, WAF to validate individual solutions.

Cloud Adoption Framework — security methodology

The CAF security methodology defines how security integrates into every phase of cloud adoption:

CAF PhaseSecurity RoleArchitect’s Contribution
StrategyDefine security strategy aligned with business outcomesIdentify crown jewels, risk appetite, regulatory requirements
PlanIntegrate security into the cloud adoption planAssess current security posture, define target state, identify skill gaps
ReadyImplement security in the Azure Landing ZoneDesign identity, networking, and governance guardrails
SecureEstablish security baselines and implement security controlsDefine security posture, threat model, security operations strategy
Adopt (Migrate)Secure workloads during migrationAssess workload security posture, design secure migration paths
Adopt (Innovate)Build security into new developmentDevSecOps integration, secure-by-default architecture patterns
GovernEstablish ongoing security governanceAzure Policy, compliance monitoring, cost governance with security budget
ManageOperate security continuouslySecOps, monitoring, incident response, patching
💡 🌐 Scenario: Elena's cloud transformation

Meridian Global Industries is migrating 200 workloads from on-premises data centres to Azure over 18 months. Dr. Elena Vasquez uses CAF to ensure security is embedded from day one:

  • Strategy: Elena identifies customer payment data and manufacturing IP as crown jewels. The board — led by Marcus Chen — accepts moderate risk for general workloads but zero tolerance for payment systems.
  • Plan: Li Wei, IT Ops director, assesses the current security posture. They discover 40% of workloads use legacy authentication. Elena adds “eliminate legacy auth” to the adoption plan.
  • Ready: She works with the platform team to deploy Azure Landing Zones with mandatory policies — all resources must be in approved regions, all storage encrypted, all public endpoints blocked by default.
  • Govern: Azure Policy enforces guardrails automatically. Workload teams cannot deploy resources that violate security baselines.

Without CAF, security would be bolted on after migration — finding problems only when auditors come knocking.

CAF security design principles

The CAF security methodology centres on these principles that shape architect decisions:

  • Security is a team sport — Security teams advise, but workload teams own their security posture
  • Align security to business priorities — Not every asset gets the same protection level
  • Assume compromise and verify explicitly — Direct alignment with Zero Trust
  • Build security into the adoption lifecycle — Not as an afterthought
  • Use native security capabilities first — Azure-native controls before third-party tools

Well-Architected Framework — Security pillar

While CAF covers the journey, WAF covers the destination. The Security pillar defines five design principles for secure workloads:

WAF Security PrincipleWhat It MeansExample
Plan your security readinessEstablish security requirements before designDefine data classification, compliance needs, and threat model before choosing services
Design to protect confidentialityApply defence in depth to data, access, and communicationEncrypt data at rest and in transit, use private endpoints, apply sensitivity labels
Design to protect integrityPrevent corruption of design, implementation, operations, and dataImmutable infrastructure, code signing, tamper-evident logging
Design to protect availabilityEnsure the system meets availability targets despite security incidentsRedundant security controls, DDoS protection, backup and recovery design
Sustain and evolve your security postureContinuously improve through monitoring, testing, and automationRegular security assessments, automated compliance checks, threat modelling updates
CAF and WAF are complementary — use both
AspectCloud Adoption Framework (CAF)Well-Architected Framework (WAF)
ScopeOrganisation-wide cloud journeyIndividual workload design
When to usePlanning cloud adoption, building platformDesigning or reviewing a specific workload
Security focusStrategy, governance, landing zones, operating modelArchitecture patterns, design principles, trade-offs
Key outputLanding Zone with policy guardrailsSecure workload architecture with design decisions documented
Who drives itCloud platform team + CISO officeWorkload architect + security team
Exam relevanceQuestions about security strategy, governance, landing zonesQuestions about workload-level design decisions and trade-offs

Azure Landing Zones — security by design

An Azure Landing Zone is the target Azure environment architecture that implements CAF security principles through automation. It’s the platform foundation that every workload lands on.

Security components of a Landing Zone

ComponentWhat It ProvidesWhy It Matters
Identity baselineCentralised Entra ID tenant, Conditional Access policies, PIMAll workloads inherit identity controls
Management groupsHierarchical organisation with inherited policiesPolicy governance at scale
Azure PolicyAutomated compliance enforcementPrevents insecure configurations before deployment
Network topologyHub-spoke or Virtual WAN with centralised securityConsistent network security, centralised inspection
LoggingCentralised Log Analytics workspace, Defender for CloudUnified visibility across all workloads
Security baselinesMCSB-aligned default configurationsNew resources start secure by default
💡 Exam tip: Landing Zones vs custom builds

The exam often presents scenarios where an architect must choose between deploying Azure Landing Zones (with Microsoft’s reference architecture) or building custom infrastructure. The correct answer almost always favours Landing Zones because:

  1. They encode security best practices automatically
  2. They scale across multiple workloads
  3. They align with CAF — which the exam explicitly tests
  4. Custom builds require justification for every deviation

The exception: when the organisation has unique regulatory or sovereignty requirements that Landing Zones don’t support out of the box. Even then, the architect customises a Landing Zone — not abandons the concept.

💡 ☁️ Scenario: Rajan's client architecture review

Rajan Krishnamurthy from Skyline Security Consulting is reviewing a client’s Azure deployment. The client has 15 subscriptions, no management groups, and each team deploys their own networking. Security policies are applied manually per subscription.

Rajan’s recommendation: implement Azure Landing Zones with:

  • Management group hierarchy (Platform → Landing Zones → Sandbox)
  • Centralised hub-spoke networking with Azure Firewall
  • Azure Policy for MCSB compliance at the management group level
  • Centralised logging to a shared Log Analytics workspace

Priya Anand, his junior architect, suggests configuring security per subscription instead of using management groups. Rajan explains: “That’s how this client ended up with 15 islands. Management groups enforce consistency — you set the policy once and every subscription inherits it.”

This transforms the client from “15 independent islands” to “one governed platform” — exactly the architect thinking SC-100 tests.

How CAF, WAF, and Zero Trust connect

These aren’t competing frameworks. They work at different levels:

LayerFrameworkQuestion It Answers
PrinciplesZero Trust”What should we never assume?”
JourneyCAF”How do we adopt cloud securely?”
PlatformCAF Landing Zones”What guardrails does every workload inherit?”
WorkloadWAF”Is this specific architecture secure?”
ControlsMCSB (next module)“What specific controls should we implement?”

The SC-100 exam tests your ability to navigate all these layers. A question might describe a business scenario and ask you to identify which framework guides the decision — or which design principle justifies a particular architectural choice.

💡 💰 Scenario: Ingrid bridges the framework gap

Ingrid Svensson at Nordic Capital Partners encounters a common problem: the platform team used CAF to deploy Landing Zones, but individual workload teams are designing applications without consulting WAF.

Result? The platform is secure (thanks to CAF), but individual applications have unencrypted databases, missing private endpoints, and over-privileged service accounts.

Ingrid’s fix: mandate a WAF Security pillar review for every workload before production deployment. She creates a checklist aligned to the five WAF security principles and makes it part of the change approval process. Harald Eriksen, the compliance officer, embeds the checklist into the audit cycle.

The takeaway: CAF without WAF gives you a secure platform with insecure workloads. WAF without CAF gives you well-designed workloads on an ungoverned platform. You need both.

🎬 Video coming soon

Key takeaways

Question

What's the difference between CAF and WAF in security?

Click or press Enter to reveal answer

Answer

CAF operates at the organisation level — security strategy, governance, landing zones, adoption lifecycle. WAF operates at the workload level — architecture design principles and trade-offs for individual solutions. They're complementary, not competing.

Click to flip back

Question

Name three security components of an Azure Landing Zone.

Click or press Enter to reveal answer

Answer

Any three of: Identity baseline (Entra ID, Conditional Access), Management group hierarchy, Azure Policy enforcement, Hub-spoke network topology, Centralised logging, MCSB-aligned security baselines.

Click to flip back

Question

What are the five WAF Security pillar design principles?

Click or press Enter to reveal answer

Answer

1. Plan your security readiness. 2. Design to protect confidentiality. 3. Design to protect integrity. 4. Design to protect availability. 5. Sustain and evolve your security posture.

Click to flip back

Question

In what order do Zero Trust, CAF, WAF, Landing Zones, and MCSB apply?

Click or press Enter to reveal answer

Answer

Zero Trust (principles) → CAF (adoption journey) → Landing Zones (platform guardrails) → WAF (workload design) → MCSB (specific controls). They work at different layers — not strictly in sequence.

Click to flip back

Knowledge check

Knowledge Check

Meridian Global is migrating 200 workloads to Azure. Dr. Elena Vasquez wants security embedded from the start. Which approach best aligns with Microsoft's recommended frameworks?

Knowledge Check

A workload architect is designing a new application on Azure and wants to ensure it meets security best practices. Which framework should guide their workload-level security design decisions?

Knowledge Check

Ingrid discovers that Nordic Capital Partners' platform team deployed Azure Landing Zones with strong governance, but workload teams are deploying applications with unencrypted databases and over-privileged service accounts. What is the root cause?


Next up: MCRA and Cloud Security Benchmark — the reference architecture and controls that map Zero Trust principles to specific Microsoft security capabilities.

← Previous

Zero Trust: The Architect's Lens

Next →

CAF and WAF: Designing Secure Azure Foundations

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.