🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-100 Domain 3
Domain 3 — Module 1 of 7 14%
20 of 32 overall

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads

SC-100 Study Guide

Domain 1: Design Solutions That Align with Security Best Practices and Priorities

  • Zero Trust: The Architect's Lens Free
  • Zero Trust: The Architect's Lens Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • CAF and WAF: Designing Secure Azure Foundations Free
  • MCRA and Cloud Security Benchmark Free
  • MCRA and Cloud Security Benchmark Free
  • Ransomware Resiliency by Design Free
  • Ransomware Resiliency by Design Free
  • Backup, Recovery, and Business Continuity
  • Backup, Recovery, and Business Continuity
  • Evaluating Security Architecture Decisions
  • Evaluating Security Architecture Decisions

Domain 2: Design Security Operations, Identity, and Compliance Capabilities

  • SOC Architecture and SecOps Workflows
  • Defender XDR: Detection and Response at Scale
  • Microsoft Sentinel and SOAR Automation
  • Identity and Access Architecture
  • Conditional Access and Identity Governance
  • Privileged Access Design
  • Regulatory Compliance and Data Sovereignty

Domain 3: Design Security Solutions for Infrastructure

  • Security Posture Management and Exposure Management
  • Hybrid and Multicloud Security
  • Endpoint Protection Strategy
  • IoT, OT, and Industrial Security
  • Network Security Architecture
  • Security Service Edge: Internet and Private Access
  • Infrastructure Security Decisions

Domain 4: Design Security Solutions for Applications and Data

  • Microsoft 365 Security Design
  • Application Security Architecture
  • DevSecOps and Secure Development
  • Securing AI Workloads
  • Data Classification and Loss Prevention
  • Data Security in Azure Workloads
Domain 3: Design Security Solutions for Infrastructure Premium ⏱ ~13 min read

Security Posture Management and Exposure Management

Design a cloud security posture management strategy using Microsoft Defender for Cloud, Secure Score, security baselines, and exposure management.

Security Posture Management and Exposure Management

☕ Simple explanation

Why Posture Management Matters at the Architecture Level

Most security breaches don’t exploit exotic zero-day vulnerabilities — they exploit misconfigured resources. A storage account left open to the internet, a management port exposed without restrictions, a database with no encryption at rest. These are configuration mistakes that already have known solutions.

A security architect’s job isn’t to fix these one by one. It’s to design a system that continuously finds, prioritises, and drives remediation of misconfigurations — before an attacker finds them first.

That system is Cloud Security Posture Management (CSPM), and in Microsoft’s ecosystem, it centres on Microsoft Defender for Cloud.

Microsoft Defender for Cloud: The Architecture

Defender for Cloud is actually two capabilities bundled under one name, and understanding this distinction is critical for the SC-100 exam:

Foundational CSPM (free) is enabled automatically for every Azure subscription. It provides:

  • Secure Score — a numerical measure of your security posture
  • Security recommendations based on the Microsoft Cloud Security Benchmark (MCSB)
  • Basic asset inventory

Defender CSPM (paid) adds advanced capabilities:

  • Attack path analysis — graph-based visualisation of how an attacker could move through your environment
  • Cloud security explorer — query your security graph to find risky resource combinations
  • Agentless scanning for vulnerabilities
  • Governance rules to assign recommendation owners and deadlines
  • Data-aware security posture — discovers sensitive data and factors that into risk

Then there are the Defender plans (Cloud Workload Protection), which provide runtime threat detection for specific resource types: Defender for Servers, Defender for Storage, Defender for Databases, Defender for Containers, Defender for App Service, Defender for Key Vault, and others.

Foundational CSPM vs Defender CSPM vs Defender Plans
CapabilityFoundational CSPM (Free)Defender CSPM (Paid)Defender Plans (CWP)
Core functionConfiguration assessmentAdvanced posture analysisRuntime threat detection
Secure Score✅ Included✅ Enhanced insightsContributes to score
Security recommendations✅ MCSB-based✅ Plus governance rulesPlan-specific recommendations
Attack path analysis❌✅ Graph-based❌ (data feeds into CSPM)
Cloud security explorer❌✅ Custom queries❌
Agentless scanning❌✅ VMs, containersSome plans include agent-based
Threat alerts❌❌✅ Real-time detection
Pricing modelFree with AzurePer-subscription/serverPer-resource or per-unit
Architect decisionAlways enableEnable for critical subscriptionsEnable per workload type

The Architect’s Decision Framework

As a security architect, you’re not just enabling all the toggles. You’re designing a strategy:

  1. Which subscriptions get Defender CSPM? — Production and any subscription with sensitive data. Dev/test might only need foundational CSPM to control costs.
  2. Which Defender plans to enable? — Based on workload types. Containers in production? Enable Defender for Containers. SQL databases with customer data? Enable Defender for Databases.
  3. How will recommendations be triaged? — Governance rules assign owners and deadlines. Not every recommendation needs immediate action.
  4. What Secure Score target? — Set a realistic target (e.g., 70% in 90 days) rather than chasing 100%.

Secure Score: Measuring Posture

Secure Score is a percentage that measures how many security recommendations you’ve addressed out of the total available. But the number itself isn’t the point — the trend is.

A Secure Score of 55% isn’t alarming if it was 30% three months ago. A score of 80% is concerning if it was 90% last month. Architects design for continuous improvement, not a specific number.

How Secure Score works:

  • Each recommendation has a maximum score (weighted by severity)
  • Implementing the recommendation earns points
  • Some recommendations are partially implementable (e.g., 8 of 10 VMs patched earns 80% of the points)
  • Score is calculated per-subscription and aggregated

Key architect decisions around Secure Score:

  • Exempt recommendations that don’t apply — A recommendation to enable DDoS protection on a VNet that only hosts internal dev workloads might be a valid exemption. Exempting it removes it from the denominator, giving a more accurate score.
  • Use governance rules to assign recommendation owners with SLA deadlines
  • Report Secure Score to leadership as a KPI — this creates organisational accountability

Security Baselines and MCSB

The Microsoft Cloud Security Benchmark (MCSB) is a set of security best practices mapped to common compliance frameworks (CIS, NIST, PCI DSS). It’s the foundation of Defender for Cloud’s recommendations.

Security baselines are MCSB controls applied to specific Azure services. For example, the security baseline for Azure Storage includes:

  • Enforce HTTPS transfer
  • Disable public blob access
  • Enable soft delete for data protection
  • Use managed keys or customer-managed keys for encryption

As an architect, you don’t memorise every baseline. You design the process:

  1. Azure Policy enforces baselines at scale — deny non-compliant configurations at deployment time
  2. Defender for Cloud detects drift from baselines post-deployment
  3. Governance rules ensure someone is accountable for remediation

Microsoft Security Exposure Management

Security Exposure Management is a newer capability that goes beyond individual recommendations to understand attack paths and blast radius.

Traditional CSPM asks: “Is this resource configured securely?” Exposure Management asks: “If this resource is compromised, what can the attacker reach next?”

Attack Path Analysis

Attack path analysis uses a graph model of your environment. It connects:

  • Entry points — internet-facing resources, vulnerable VMs, exposed credentials
  • Lateral movement — network connectivity, shared credentials, permission chains
  • Critical assets — databases, key vaults, identity systems

The result is a visual map showing: “An attacker can reach your production database by first compromising this internet-facing VM (which has a known vulnerability), then using its managed identity (which has Key Vault access) to retrieve database credentials.”

This is extraordinarily powerful for prioritisation. Instead of remediating 200 medium-severity recommendations, you fix the 3 that sit on active attack paths to critical assets.

Designing an Exposure Management Strategy

An architect plans:

  1. Define critical assets — What are the crown jewels? Production databases, identity infrastructure, financial systems
  2. Enable Defender CSPM — Required for attack path analysis
  3. Review attack paths weekly — Not just the number, but the blast radius of each path
  4. Integrate with remediation workflows — Attack paths should create tickets in your ITSM tool

🌐 Scenario: Elena’s Posture Management Strategy

Dr. Elena Vasquez stands in Meridian Global Industries’ boardroom. Marcus Chen, the board chair, has asked a deceptively simple question: “How secure are we, and how do you know?”

Elena’s answer is Defender for Cloud. She’s designed a tiered CSPM strategy across Meridian’s 23 Azure subscriptions:

Tier 1 — Production subscriptions (8): Defender CSPM enabled. All relevant Defender plans active. Governance rules assign recommendation owners with 14-day SLAs for high severity, 30 days for medium. Weekly attack path analysis review with Li Wei’s IT Ops team.

Tier 2 — Staging/QA (6): Defender CSPM enabled. Limited Defender plans (Servers and Containers only). 30-day SLA for all severities.

Tier 3 — Dev/sandbox (9): Foundational CSPM only. Monthly review of Secure Score trends. No Defender plans — cost isn’t justified for ephemeral dev workloads.

“Our Secure Score across production is 72%, up from 48% when we started six months ago,” Elena tells Marcus. “More importantly, we’ve eliminated all critical attack paths to our manufacturing data. Last quarter, attack path analysis found that a developer’s VM had a managed identity with contributor access to three production subscriptions. That single finding was worth more than the 40 medium-severity recommendations we’d been working through.”

☁️ Scenario: Rajan’s Exposure Management Presentation

Rajan Krishnamurthy is presenting to Deepak Malhotra, CTO of a healthcare company that’s been breached twice in the past year. Deepak is sceptical of yet another security tool.

“Let me show you something specific,” Rajan says, pulling up the attack path analysis dashboard. “Your patient records database is reachable via four distinct attack paths. The shortest one goes through an internet-facing API server that hasn’t been patched in 90 days, uses a service principal with database admin rights, and the database itself has no network restrictions.”

Deepak leans forward. “We have 800 security recommendations in our backlog. Which ones matter?”

“These three,” Rajan points. “Patch that API server, scope that service principal to least privilege, and add a private endpoint to the database. Three changes eliminate all four attack paths to your most sensitive data.”

Rajan has designed the strategy: use attack path analysis to cut through recommendation noise and focus remediation on paths that actually lead to critical assets.

Exam Strategy: Posture Management Questions

SC-100 questions on posture management test your ability to design strategy, not configure tools. You’ll see scenarios like: “A company has 50 Azure subscriptions and wants to improve security posture. What should the architect recommend?” The answer isn’t “enable Defender for Cloud” — it’s how to enable it (tiered approach, governance rules, Secure Score targets).

Key patterns:

  • If the question asks about prioritisation → attack path analysis (not just Secure Score)
  • If the question asks about accountability → governance rules with owners and deadlines
  • If the question mentions cost concerns → tiered CSPM approach (free for dev, paid for prod)
  • If the question asks about multicloud → Defender for Cloud extends to AWS/GCP (covered next module)
  • “Continuous assessment” in a question almost always points to CSPM, not periodic audits
Question

What is the fundamental difference between CSPM and CWP in Defender for Cloud?

Click or press Enter to reveal answer

Answer

CSPM (Cloud Security Posture Management) assesses configuration and compliance — it tells you 'this storage account is misconfigured.' CWP (Cloud Workload Protection) via Defender plans provides runtime threat detection — it tells you 'this server is being attacked right now.' CSPM is preventive; CWP is detective.

Click to flip back

Question

When should an architect recommend Defender CSPM (paid) over foundational CSPM (free)?

Click or press Enter to reveal answer

Answer

Enable Defender CSPM when you need: attack path analysis, cloud security explorer, agentless scanning, governance rules with ownership and deadlines, or data-aware security posture. Typically recommended for production subscriptions and any environment hosting sensitive data. Dev/sandbox environments often only need the free tier.

Click to flip back

Question

How does attack path analysis change remediation prioritisation?

Click or press Enter to reveal answer

Answer

Instead of working through recommendations by severity alone, attack path analysis identifies which misconfigurations sit on actual paths to critical assets. A medium-severity recommendation on an active attack path to a production database is far more urgent than a high-severity recommendation on an isolated dev VM with no path to sensitive data.

Click to flip back

Question

What is the Microsoft Cloud Security Benchmark (MCSB) and how does it relate to security baselines?

Click or press Enter to reveal answer

Answer

MCSB is a set of security best practices mapped to industry frameworks (CIS, NIST, PCI DSS). Security baselines are MCSB controls applied to specific Azure services. Defender for Cloud's recommendations are derived from MCSB. Azure Policy enforces baselines at deployment time; Defender for Cloud detects drift from baselines post-deployment.

Click to flip back

Knowledge Check

A company has 30 Azure subscriptions across production, staging, and development. The CISO wants to improve security posture while controlling costs. Some subscriptions host sensitive customer data while others are developer sandboxes. What approach should the security architect recommend?

Knowledge Check

A security architect reviews the organisation's Defender for Cloud dashboard and sees 340 active recommendations with a Secure Score of 62%. The CISO asks which recommendations to address first. What approach provides the most effective prioritisation?

Knowledge Check

An organisation wants to ensure that all new Azure resources deployed by development teams meet security baselines. Some developers have complained that security reviews slow down their deployment pipeline. What architecture should the security architect design?

🎬 Video coming soon


Next up: Hybrid and Multicloud Security — extend everything you’ve learned about posture management to AWS, GCP, and on-premises environments using Azure Arc.

← Previous

Regulatory Compliance and Data Sovereignty

Next →

Hybrid and Multicloud Security

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.