πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 1
Domain 1 β€” Module 1 of 4 25%
1 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 1: Security, Compliance & Identity Concepts Free ⏱ ~10 min read

Security Foundations: Shared Responsibility & Defence-in-Depth

Two frameworks that change how you think about cloud security. Who's responsible for what β€” and why one lock on the front door isn't enough.

Who’s responsible for security in the cloud?

β˜• Simple explanation

Renting a flat vs owning a house.

When you own a house, everything is your problem β€” the roof, the plumbing, the locks. When you rent a flat, the landlord handles the building structure and you handle your furniture and belongings.

Cloud works the same way. Microsoft (the landlord) secures the physical data centres, the network fabric, and the host operating systems. You (the tenant) secure your data, your identities, and your access policies.

The exact split depends on which cloud model you use β€” and that’s what the shared responsibility model is all about.

The shared responsibility model defines how security obligations are divided between the cloud provider (Microsoft) and the customer. It applies to all cloud computing models β€” IaaS, PaaS, and SaaS β€” but the split changes depending on the model.

Microsoft always secures the physical infrastructure (data centres, network hardware, host OS). The customer always secures their data, identities, and access management. Everything in between shifts depending on the service model.

The shared responsibility model

The key concept: as you move from on-premises to IaaS to PaaS to SaaS, more responsibility shifts to Microsoft β€” but you always own your data and identities.

Responsibility shifts from customer to Microsoft as you move to SaaS
FeatureOn-PremisesIaaSPaaSSaaS
Physical data centreYouMicrosoftMicrosoftMicrosoft
Physical networkYouMicrosoftMicrosoftMicrosoft
Physical hostsYouMicrosoftMicrosoftMicrosoft
Operating systemYouYouMicrosoftMicrosoft
Network controlsYouYouSharedMicrosoft
ApplicationsYouYouSharedMicrosoft
Identity & accessYouYouYouYou
DataYouYouYouYou

Key exam concept: Identity and data are always the customer’s responsibility, regardless of the cloud model. Even in SaaS (like Microsoft 365), you control who can access what.

πŸ’‘ Scenario: Sam discovers shared responsibility

Sam runs BrightStar Retail and just moved from an on-premises email server to Microsoft 365 (SaaS).

What Sam no longer worries about:

  • Physical servers, cooling, power, backups
  • Operating system patches and updates
  • Email application maintenance

What Sam still owns:

  • Who has access to the email (identities and passwords)
  • What data employees share externally
  • Compliance with retail industry regulations

Sam thought β€œmoving to the cloud” meant Microsoft handles everything. The shared responsibility model shows that’s only half the story.

πŸ’‘ Exam tip: IaaS vs PaaS vs SaaS questions

The exam loves asking β€œwho is responsible for X in a Y model?”

Quick pattern:

  • If the question mentions virtual machines β†’ IaaS (you patch the OS)
  • If the question mentions Azure SQL Database or App Service β†’ PaaS (Microsoft patches the OS)
  • If the question mentions Microsoft 365 or Dynamics 365 β†’ SaaS (Microsoft handles almost everything)

The trap: students often think SaaS = zero responsibility. You always own identity, access, and data.

Defence-in-depth

Defence-in-depth uses multiple layers of security so that if one layer fails, the next one catches the threat.

Think of a medieval castle: a moat, then walls, then guards, then a locked treasury. An attacker has to get past every layer β€” not just one.

The seven layers

LayerWhat It ProtectsExample
PhysicalData centre buildingsLocked facilities, biometric access, CCTV
Identity & accessWho can sign inMFA, Conditional Access, least privilege
PerimeterNetwork edgeDDoS protection, firewalls
NetworkInternal trafficNetwork segmentation, NSGs, private endpoints
ComputeVMs and serversPatched OS, endpoint protection, secure configs
ApplicationApps and APIsSecure coding, vulnerability scanning, WAF
DataYour actual informationEncryption at rest and in transit, sensitivity labels

Key exam concept: Defence-in-depth is about layers, not a single product. No single solution protects everything. The exam tests whether you understand that each layer adds independent protection.

πŸ’‘ Scenario: BrightStar applies defence-in-depth

Sam decides to protect BrightStar’s new cloud setup with multiple layers:

  1. Physical: Microsoft handles (Azure data centres)
  2. Identity: MFA for all employees, strong passwords enforced
  3. Perimeter: Azure Firewall blocks unauthorised traffic
  4. Network: Store POS systems on a separate virtual network
  5. Compute: All devices managed with Intune, patches applied automatically
  6. Application: Web store protected by a Web Application Firewall
  7. Data: Customer credit card data encrypted, sensitivity labels on financial files

If an attacker phishes Tina’s password (identity breach), MFA stops them. If MFA is bypassed, network segmentation limits what they can reach. If they reach the data, encryption makes it unreadable.

Where does this fit? The three security pillars

SC-900 covers three product families. Here’s a preview of where everything lives:

The three pillars you'll learn across this course
FeatureWhat It DoesKey Products
Microsoft EntraIdentity & access managementEntra ID, Conditional Access, PIM
Microsoft DefenderThreat protection & detectionDefender for Cloud, Sentinel, Defender XDR
Microsoft PurviewCompliance & data governanceDLP, sensitivity labels, Compliance Manager

🎬 Video walkthrough

🎬 Video coming soon

Shared Responsibility & Defence-in-Depth β€” SC-900 Module 1

Shared Responsibility & Defence-in-Depth β€” SC-900 Module 1

~8 min

Flashcards

Question

In the shared responsibility model, what is ALWAYS the customer's responsibility?

Click or press Enter to reveal answer

Answer

Identity & access management, and data. Regardless of whether you use IaaS, PaaS, or SaaS β€” you always control who has access and what data is stored.

Click to flip back

Question

What is defence-in-depth?

Click or press Enter to reveal answer

Answer

A security strategy that uses multiple independent layers of protection. If one layer fails, the next one catches the threat. Like a castle with a moat, walls, guards, and a locked treasury.

Click to flip back

Question

Name the seven layers of defence-in-depth (outside to inside)

Click or press Enter to reveal answer

Answer

Physical β†’ Identity & access β†’ Perimeter β†’ Network β†’ Compute β†’ Application β†’ Data. Each layer protects against different attack vectors.

Click to flip back

Knowledge Check

Knowledge Check

Sam has moved BrightStar Retail's email to Microsoft 365 (SaaS). A phishing email tricks an employee into revealing their password. Who is responsible for this security breach?

Knowledge Check

BrightStar's web store is hosted on Azure App Service (PaaS). An unpatched vulnerability in the host operating system is exploited. Who is responsible?

Knowledge Check

Which defence-in-depth layer do sensitivity labels and encryption protect?

Next β†’

Zero Trust: Never Trust, Always Verify

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.