🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-100 Domain 1
Domain 1 — Module 1 of 12 8%
1 of 32 overall

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads
Domain 1: Design Solutions That Align with Security Best Practices and Priorities Free ⏱ ~14 min read

Zero Trust: The Architect's Lens

Before you design anything, you need to think like a cybersecurity architect. Learn the Zero Trust principles and technology pillars that shape every security decision on the SC-100 exam.

What is Zero Trust?

☕ Simple explanation

Imagine a building where every door checks your badge — even the internal ones.

Old security was like a castle with a moat. Once you crossed the drawbridge (the VPN), you were trusted everywhere inside. But if an attacker got past the moat, they had free reign.

Zero Trust flips this. Every door — every resource, every app, every data store — checks who you are, what device you’re using, and whether you should be there. No one gets a free pass just because they’re “inside the network.”

As a cybersecurity architect, Zero Trust isn’t a product you buy. It’s a design philosophy that shapes every decision you make. Every architecture choice on the SC-100 exam flows through this lens.

Zero Trust is a security strategy that eliminates implicit trust from an organisation’s digital infrastructure. Instead of assuming that users, devices, or network segments are trustworthy based on their location, Zero Trust requires continuous verification of every access request using multiple signals — identity, device health, location, data sensitivity, and anomaly detection.

Microsoft’s Zero Trust model is built on three core principles and six technology pillars. It is not a single product or feature — it is an architectural approach that integrates across Microsoft Entra, Defender, Purview, Sentinel, Intune, and Azure networking.

For the SC-100 exam, Zero Trust is the foundational design lens. Every “Design a solution for…” question expects you to evaluate options through Zero Trust principles — explicit verification, least privilege, and assumed breach.

The three core principles

Every Zero Trust decision comes back to these three ideas:

PrincipleWhat It MeansArchitect’s Question
Verify explicitlyAlways authenticate and authorise based on all available data points — identity, location, device health, service, data classification, anomalies”Am I using enough signals to make this access decision?”
Use least privilege accessLimit access with just-in-time (JIT) and just-enough-access (JEA), risk-based adaptive policies, and data protection”Does this design give more access than needed?”
Assume breachMinimise blast radius, segment access, verify end-to-end encryption, use analytics to detect threats and improve defences”If this component is compromised, what’s the damage?”
💡 Exam tip: The 'assume breach' trap

Many exam questions test whether you default to assume breach thinking. When two designs both “work,” the correct answer is usually the one that limits blast radius — microsegmentation over flat networks, JIT over standing access, separate admin accounts over shared credentials.

If a question asks “what should you recommend first?” and one option prevents the attack while another detects it — the exam usually favours prevention (verify explicitly) over detection (assume breach). But when prevention isn’t possible, detection with blast radius reduction wins.

The six technology pillars

Zero Trust isn’t just about identity. Microsoft defines six technology areas where Zero Trust must be applied:

PillarWhat It CoversKey Microsoft Technologies
IdentityUsers, service accounts, workload identitiesMicrosoft Entra ID, Conditional Access, PIM
EndpointsDevices — laptops, phones, servers, IoTMicrosoft Intune, Defender for Endpoint
DataClassification, labelling, encryption, DLPMicrosoft Purview, Information Protection
ApplicationsSaaS, custom, legacy, shadow ITDefender for Cloud Apps, App Proxy, Entra ID
InfrastructureServers, VMs, containers, serverlessDefender for Cloud, Azure Policy, Arc
NetworkSegmentation, encryption, monitoringNSGs, Azure Firewall, Entra Internet/Private Access
💡 🌐 Scenario: Elena's Zero Trust assessment

Dr. Elena Vasquez, CISO at Meridian Global Industries, just joined the company after a competitor suffered a devastating ransomware attack. The board wants assurance that Meridian’s security is solid.

Elena’s first action isn’t buying a new product. She runs a Zero Trust maturity assessment across all six pillars. Her findings:

  • Identity: Strong (Conditional Access deployed, MFA enforced)
  • Endpoints: Moderate (Intune for corporate devices, but BYOD has gaps)
  • Data: Weak (no sensitivity labels, no DLP policies)
  • Applications: Moderate (SSO for SaaS, but legacy apps bypass Entra)
  • Infrastructure: Weak (flat network, minimal segmentation in Azure)
  • Network: Weak (traditional VPN, no microsegmentation)

Elena now has a prioritised roadmap. She starts with data classification and network segmentation — the weakest pillars with the highest business risk. Marcus Chen, the board chair, wants a single KPI: “What percentage of our environment is Zero Trust?” Elena explains that maturity is measured per pillar — and shows a radar chart with six spokes. The board immediately sees the gaps.

Thinking like a cybersecurity architect

The SC-100 exam doesn’t ask you to configure products. It asks you to design solutions and evaluate trade-offs. That’s a fundamentally different skill.

The architect’s decision framework

When you face a “Design a solution for…” question, run through this mental model:

  1. What’s the business requirement? — Compliance, cost, performance, user experience, risk tolerance
  2. Which Zero Trust pillars are involved? — Usually 2-3 pillars overlap
  3. What Microsoft capabilities align? — Map to specific products and features
  4. What are the trade-offs? — Cost vs security, usability vs protection, complexity vs coverage
  5. Which framework validates the choice? — MCRA, MCSB, CAF, WAF (covered in later modules)
SC-100 tests architect-level thinking, not engineer-level configuration
Thinking StyleSecurity EngineerCybersecurity Architect
Typical questionHow do I configure Conditional Access?Should we use Conditional Access, network segmentation, or both — and why?
ScopeSingle product or featureMultiple products across pillars
Decision driverTechnical capabilityBusiness risk and trade-offs
Success metricFeature works as configuredOrganisation's security posture improves
StakeholdersIT operations teamCISO, board, compliance, business units
Exam languageConfigure, implement, deployDesign, recommend, evaluate, justify

Zero Trust maturity model

Microsoft defines three maturity stages for each pillar. The architect’s job is to assess where the organisation is and design the path forward:

StageWhat It Looks LikeArchitect’s Role
TraditionalPerimeter-based, on-prem focused, manual processes, limited visibilityAssess gaps, build the business case for transformation
AdvancedCloud identity, device management, some automation, partial segmentationOptimise coverage, close gaps between pillars, automate responses
OptimalFully integrated, real-time signals, automated response, microsegmentationMaintain posture, adapt to new threats, extend to new workloads (AI, IoT)

Most organisations sit at Advanced for some pillars and Traditional for others. The architect designs the journey from current state to target state — and this is exactly what SC-100 tests.

💡 Real-world insight: Why 'optimal' isn't always the goal

Not every organisation needs every pillar at Optimal maturity. A small startup with no on-premises infrastructure might skip network segmentation entirely and focus on identity and data. A manufacturing company with OT systems might accept Traditional maturity for IoT while pushing Identity and Data to Optimal.

The architect’s job is to match security investment to business risk — not to chase a perfect score on every pillar.

💡 ☁️ Scenario: Rajan advises a startup vs an enterprise

Rajan Krishnamurthy from Skyline Security Consulting works with two very different clients in the same week.

Client A — a 50-person SaaS startup (cloud-native):

  • No on-premises footprint, everything is SaaS or PaaS
  • Rajan recommends focusing on Identity (Optimal) and Data (Advanced) — these are the pillars where their risk lives
  • Network pillar? Barely relevant — there’s no corporate network to segment
  • Priya Anand, his junior architect, asks “Shouldn’t we get all pillars to Optimal?” Rajan explains: “You match security investment to where the risk actually is.”

Client B — a 10,000-person manufacturer:

  • Large on-prem footprint, OT/SCADA systems, legacy apps
  • Every pillar matters. Network segmentation is critical for OT isolation
  • Rajan designs a 2-year roadmap: Identity and Endpoints first (biggest quick wins), then Data and Network (biggest risk), then Infrastructure and Applications (hardest to change)

Zero Trust and the rest of SC-100

Every domain in this exam builds on Zero Trust:

DomainHow Zero Trust Applies
D1: Best PracticesZero Trust IS the best practice. MCRA, MCSB, CAF, WAF all reference Zero Trust as foundational
D2: Operations & IdentitySOC detects breaches (assume breach). Identity is the primary control plane (verify explicitly). PIM enforces least privilege
D3: InfrastructureNetwork segmentation (assume breach), endpoint verification (verify explicitly), posture management (continuous assessment)
D4: Apps & DataApplication access control (verify explicitly), data classification (least privilege on data), AI workload governance (new pillar)

This is why Zero Trust is Module 1 — everything that follows is an application of these principles.

🎬 Video coming soon

Key takeaways

Question

What are the three core principles of Zero Trust?

Click or press Enter to reveal answer

Answer

1. Verify explicitly — authenticate using all available signals (identity, device, location, risk). 2. Use least privilege access — JIT/JEA, risk-based adaptive policies. 3. Assume breach — minimise blast radius, segment access, verify encryption, use analytics.

Click to flip back

Question

Name the six technology pillars of Zero Trust.

Click or press Enter to reveal answer

Answer

Identity, Endpoints, Data, Applications, Infrastructure, and Network. All six must be addressed — Zero Trust is not just about identity.

Click to flip back

Question

How does a cybersecurity architect's role differ from a security engineer's?

Click or press Enter to reveal answer

Answer

An architect designs solutions across multiple pillars, evaluates trade-offs, and justifies decisions to business stakeholders. An engineer configures and implements within a single product or feature. SC-100 tests architect thinking.

Click to flip back

Question

What are the three Zero Trust maturity stages?

Click or press Enter to reveal answer

Answer

Traditional (perimeter-based, manual), Advanced (cloud identity, partial automation), and Optimal (fully integrated, real-time, automated). Most organisations are a mix across pillars — and that's normal.

Click to flip back

Knowledge check

Knowledge Check

Dr. Elena Vasquez assesses Meridian Global's Zero Trust maturity and finds that Identity is Advanced, but Network and Data are Traditional. She has budget for one improvement. Following Zero Trust principles, which should she prioritise?

Knowledge Check

A security architect is reviewing two proposed designs for remote access. Design A uses a traditional VPN with network-level access to all internal resources. Design B uses Conditional Access with per-app access, device compliance checks, and session controls. Which Zero Trust principles does Design B address that Design A does not?

Knowledge Check

Which of the following is NOT one of the six technology pillars of Microsoft's Zero Trust model?


Next up: CAF and WAF: Designing Secure Azure Foundations — the frameworks that turn Zero Trust principles into structured architecture decisions.

Next →

Zero Trust: The Architect's Lens

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.