🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-100 Domain 1
Domain 1 — Module 5 of 12 42%
5 of 32 overall

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads
Domain 1: Design Solutions That Align with Security Best Practices and Priorities Free ⏱ ~14 min read

MCRA and Cloud Security Benchmark

Map Microsoft's security capabilities to your architecture decisions. Learn the Cybersecurity Reference Architecture and Cloud Security Benchmark controls that guide every SC-100 design choice.

What are MCRA and MCSB?

☕ Simple explanation

MCRA is the blueprint. MCSB is the checklist.

Imagine you’re renovating a commercial kitchen. The blueprint shows you where the ovens, fridges, ventilation, and fire suppression go — how everything fits together. That’s MCRA — it maps all of Microsoft’s security products into one architecture diagram showing how they connect and where they fit.

The checklist is the health and safety inspection form — does the kitchen have proper ventilation? Fire extinguishers? Hand-washing stations? That’s MCSB — it lists specific security controls you must implement, grouped by category (network security, identity, data protection, etc.).

An architect uses the blueprint to design the kitchen layout, then uses the checklist to verify nothing is missing.

The Microsoft Cybersecurity Reference Architecture (MCRA) is a comprehensive visual map of Microsoft’s security capabilities and how they integrate. It covers identity, endpoints, data, applications, infrastructure, network, security operations, and governance — showing which products address which security functions and how signals flow between them.

The Microsoft Cloud Security Benchmark (MCSB) is a prescriptive set of security controls organised into categories. It aligns with industry standards (CIS, NIST, PCI DSS) and provides specific implementation guidance for Azure services. MCSB is the foundation for Defender for Cloud’s security recommendations and Secure Score.

Together: MCRA tells you what capabilities exist and how they connect, MCSB tells you what controls to implement and how to measure compliance.

Microsoft Cybersecurity Reference Architecture (MCRA)

MCRA is a visual architecture diagram that maps Microsoft’s security ecosystem. It organises capabilities by function, not by product name — which is exactly how an architect thinks.

Key capability areas in MCRA

Capability AreaWhat It CoversPrimary Microsoft Products
People securityInsider risk, awareness training, human behaviourPurview Insider Risk, Attack Simulation Training
DevOps securitySecure development lifecycle, supply chainGitHub Advanced Security, Defender for DevOps
IoT and OT securityIndustrial control, connected devicesDefender for IoT, Sentinel IoT connectors
Information protectionData classification, DLP, encryptionPurview Information Protection, Purview DLP
Security operationsSIEM, XDR, SOAR, threat intelligenceSentinel, Defender XDR, Threat Intelligence
Cloud securityPosture management, workload protectionDefender for Cloud (CSPM, CWP)
Endpoint securityDevice protection, EDR, vulnerability managementDefender for Endpoint, Intune
Identity securityAuthentication, authorisation, governanceEntra ID, Conditional Access, PIM
Network securitySegmentation, inspection, SSEAzure Firewall, NSGs, Entra Internet/Private Access
Governance and compliancePolicy, regulatory compliance, riskPurview Compliance Manager, Azure Policy
💡 Exam tip: Think capabilities, not products

MCRA organises by capability, not by product. The exam often describes a security need (e.g., “detect lateral movement”) and expects you to identify the right capability area first, then the specific product.

For example:

  • “Detect insider threats” → People security → Purview Insider Risk Management
  • “Secure the CI/CD pipeline” → DevOps security → GitHub Advanced Security / Defender for DevOps
  • “Protect industrial control systems” → IoT/OT security → Defender for IoT

Don’t memorise product names in isolation — understand which capability bucket they serve.

How signals flow in MCRA

One of MCRA’s key insights is that security products don’t work in isolation. They share signals:

  • Entra ID sends sign-in risk signals → Conditional Access adjusts policies
  • Defender for Endpoint sends device risk → Conditional Access blocks non-compliant devices
  • Defender for Cloud Apps detects shadow IT → Entra ID blocks risky apps
  • All Defender products send alerts → Sentinel correlates across the estate
  • Sentinel triggers → SOAR playbooks automate response

This signal flow is critical for architect-level thinking. The exam tests whether you understand that choosing one product creates dependencies and integration points with others.

💡 ☁️ Scenario: Rajan maps a client's security stack

Rajan Krishnamurthy is onboarding a new client at Skyline Security Consulting. The client has deployed 8 different Microsoft security products but configured them independently — no signal sharing, no unified incident view.

Rajan uses MCRA to visualise the intended architecture:

  • Defender for Endpoint signals should flow to Conditional Access (device risk)
  • All Defender alerts should feed into Sentinel (unified SIEM)
  • Sentinel should trigger automated playbooks (SOAR)
  • Entra ID Protection signals should inform insider risk assessments

By mapping the client’s actual configuration against MCRA, Rajan identifies 5 missing integration points. Fixing these doesn’t require new products — it requires connecting the ones they already own.

Priya Anand asks: “How did the client miss these connections?” Rajan explains: “They bought products one at a time, configured them in isolation. MCRA shows you the full picture — an architect sees the system, not just the components.”

Microsoft Cloud Security Benchmark (MCSB)

MCSB provides specific, actionable security controls organised into categories. It’s the “what should we implement?” answer to MCRA’s “what capabilities exist?”

MCSB control categories

CategoryIDWhat It CoversKey Controls
Network securityNSSegmentation, traffic filtering, inspectionPrivate endpoints, NSGs, Azure Firewall, DDoS protection
Identity managementIMAuthentication, authorisation, SSOMFA, Conditional Access, workload identity
Privileged accessPAAdmin accounts, JIT, PAWsPIM, emergency access accounts, admin workstations
Data protectionDPClassification, encryption, DLPSensitivity labels, CMK encryption, data-in-transit TLS
Asset managementAMInventory, discovery, lifecycleResource tagging, shadow IT discovery, decommissioning
Logging and threat detectionLTAudit logging, threat detection, SIEMDiagnostic settings, Defender alerts, Sentinel integration
Incident responseIRPreparation, detection, containment, recoveryIncident playbooks, forensic readiness, communication plans
Posture and vulnerability managementPVScanning, patching, configurationDefender vulnerability management, Update Management
Endpoint securityESAV, EDR, device hardeningDefender for Endpoint, attack surface reduction
Backup and recoveryBRBackup strategy, testing, protectionAzure Backup, immutable vaults, recovery testing
DevOps securityDSCI/CD security, code scanning, supply chainGitHub Advanced Security, pipeline hardening
Governance and strategyGSOrganisational strategy, roles, policiesSecurity strategy, RACI, policy frameworks
MCRA shows how capabilities connect; MCSB tells you what to implement
AspectMCRAMCSB
PurposeVisual map of security capabilities and signal flowPrescriptive security controls checklist
FormatArchitecture diagramControl framework with IDs (NS-1, IM-2, etc.)
ScopeAll Microsoft security products and integrationAzure and Microsoft 365 security configurations
Use caseUnderstanding how products connect and where gaps existAssessing compliance, measuring posture, guiding implementation
Industry alignmentMicrosoft-specific architectureMaps to CIS, NIST 800-53, PCI DSS, SOC 2
Defender for CloudShows where Defender fits in the ecosystemPowers security recommendations and Secure Score

MCSB and Defender for Cloud

MCSB isn’t just a document — it’s operationalised in Defender for Cloud. When you enable Defender for Cloud on a subscription:

  1. MCSB is applied as the default security initiative (a set of Azure Policy definitions)
  2. Resources are assessed against MCSB controls automatically
  3. Non-compliant resources generate recommendations with remediation steps
  4. Compliance is measured via Secure Score (percentage of controls implemented)

This means MCSB is both a design tool (for architects) and an operational tool (for engineers). The architect chooses which controls apply; Defender for Cloud enforces and monitors them.

Prioritising controls with MCSB

Not all controls are equally important. MCSB assigns severity levels, and the architect must prioritise based on:

FactorHow It Affects Priority
Business riskControls protecting crown jewels get priority
Regulatory requirementsMandatory controls come first (e.g., encryption for PCI DSS)
Attack surfaceInternet-facing resources need NS controls immediately
Implementation effortQuick wins (enable MFA, enable logging) before complex changes
Blast radiusControls that reduce lateral movement (segmentation, least privilege) rank high
💡 💰 Scenario: Ingrid's compliance mapping

Ingrid Svensson at Nordic Capital Partners must demonstrate compliance with PCI DSS for payment processing and GDPR for customer data. She uses MCSB’s industry mapping:

  • MCSB control DP-4 (Enable data encryption) maps to → PCI DSS 3.4 (render stored cardholder data unreadable), GDPR Art. 32 (security of processing)
  • MCSB control NS-1 (Establish network segmentation) maps to → PCI DSS 1.3 (network segmentation)
  • MCSB control LT-1 (Enable logging) maps to → PCI DSS 10.1 (audit trail), GDPR Art. 30 (records of processing)

Instead of implementing PCI DSS and GDPR controls separately, Ingrid uses MCSB as a unified control framework that satisfies both — reducing duplication and simplifying audits. Harald Eriksen, the compliance officer, appreciates this: “One set of controls, two regulations covered. That’s efficiency.”

Cybersecurity capabilities best practices

MCRA and MCSB together inform best practices for cybersecurity capabilities — how to design solutions for specific security functions:

CapabilityBest PracticeWhy
Network securityDefault to deny-all; use private endpoints for PaaS; centralise inspectionReduces attack surface, prevents lateral movement
IdentityEnforce MFA for all users; use Conditional Access with risk signals; deploy PIM for admin rolesIdentity is the primary control plane in Zero Trust
EndpointDeploy EDR on all endpoints; enforce device compliance; use attack surface reduction rulesEndpoints are the most common initial access vector
DataClassify before protecting; encrypt by default; apply DLP to high-sensitivity data firstProtection without classification leads to over-blocking or under-protecting
ApplicationsUse managed identities (no credentials in code); scan dependencies; protect APIsApplication vulnerabilities are the second most common attack vector
Security operationsCentralise logs in Sentinel; automate common responses; retain logs for at least 90 daysDetection speed directly reduces breach cost
💡 Exam tip: The 'which product?' pattern

The exam frequently describes a security requirement and asks you to recommend the right solution. The pattern:

  1. Identify the capability area (using MCRA thinking) — is this an identity problem? Endpoint? Data?
  2. Identify the control category (using MCSB) — which control ID addresses this?
  3. Recommend the product that implements that control

Example: “An organisation needs to prevent sensitive documents from being emailed to external recipients.”

  • Capability: Information protection (MCRA)
  • Control: DP-2 Monitor anomalies and threats targeting sensitive data (MCSB)
  • Product: Microsoft Purview DLP with Exchange Online transport rules

This structured thinking prevents you from guessing product names and grounds your answer in frameworks.

🎬 Video coming soon

Key takeaways

Question

What is the difference between MCRA and MCSB?

Click or press Enter to reveal answer

Answer

MCRA is a visual architecture map showing how Microsoft's security capabilities connect and how signals flow between products. MCSB is a prescriptive control framework listing specific security controls to implement. MCRA = how things fit together. MCSB = what to implement.

Click to flip back

Question

How does MCSB integrate with Defender for Cloud?

Click or press Enter to reveal answer

Answer

MCSB is applied as the default security initiative in Defender for Cloud. It automatically assesses Azure resources against MCSB controls, generates recommendations, and calculates Secure Score based on control compliance.

Click to flip back

Question

Name four MCSB control categories and their IDs.

Click or press Enter to reveal answer

Answer

Any four of: Network security (NS), Identity management (IM), Privileged access (PA), Data protection (DP), Asset management (AM), Logging and threat detection (LT), Incident response (IR), Posture/vulnerability management (PV), Endpoint security (ES), Backup and recovery (BR), DevOps security (DS), Governance and strategy (GS).

Click to flip back

Question

Why does MCRA emphasise signal flow between products?

Click or press Enter to reveal answer

Answer

Security products in isolation leave gaps. MCRA shows how signals flow — device risk from Defender for Endpoint to Conditional Access, all alerts to Sentinel, Sentinel triggers to SOAR. The architect must design these integrations, not just deploy individual products.

Click to flip back

Question

How does an architect prioritise MCSB controls?

Click or press Enter to reveal answer

Answer

Prioritise by: business risk (protect crown jewels first), regulatory requirements (mandatory controls), attack surface (internet-facing first), implementation effort (quick wins), and blast radius (controls that limit lateral movement rank high).

Click to flip back

Knowledge check

Knowledge Check

Rajan discovers that a client has Defender for Endpoint, Defender for Cloud Apps, and Microsoft Sentinel deployed — but none are sharing signals. Sentinel receives no alerts from Defender products. Using MCRA guidance, what should Rajan recommend first?

Knowledge Check

Ingrid needs to prioritise MCSB controls for Nordic Capital Partners. The company processes payments (PCI DSS) and handles EU customer data (GDPR). She has limited resources. Which approach best aligns with MCSB guidance?

Knowledge Check

Which statement best describes the relationship between MCRA, MCSB, and Defender for Cloud?


Next up: Ransomware Resiliency by Design — design defences against the most financially devastating cyberattack, using Microsoft’s three-phase framework.

← Previous

CAF and WAF: Designing Secure Azure Foundations

Next →

MCRA and Cloud Security Benchmark

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.