🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 2
Domain 2 — Module 7 of 8 88%
11 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 2: Microsoft Entra Capabilities Premium ⏱ ~11 min read

Identity Governance: Entitlements and Access Reviews

Managing the identity lifecycle — who gets access, how long they keep it, and what happens when they leave. Entitlement management, access reviews, and terms of use.

What is identity governance?

☕ Simple explanation

It is like managing gym memberships — sign people up, check they still use it, and cancel when they leave.

When someone joins your company, they need access to apps, files, and groups. When they move teams, their access should change. When they leave, ALL access should be revoked immediately.

Without governance, access piles up. People keep permissions from old teams. Former employees still have active accounts. Contractors who finished six months ago can still log in.

Identity governance automates this lifecycle: join, move, leave. Grant access when needed, verify it is still needed, and remove it the moment it is not.

Microsoft Entra ID Governance provides capabilities to manage the full identity lifecycle — ensuring the right people have the right access to the right resources for the right amount of time.

It addresses a critical security challenge: access sprawl. Over time, users accumulate permissions they no longer need. Stale access from previous roles, expired projects, or departed employees creates attack surfaces. Governance capabilities automate access requests, reviews, and removal to keep permissions current.

Key governance capabilities include entitlement management, access reviews, and terms of use — each addressing a different part of the lifecycle.

Why does stale access matter?

RiskWhat HappensReal Example
Former employeesAn account with active permissions remains after someone leavesA departed contractor can still access the finance SharePoint site
Role changesA user who moved teams keeps their old permissions plus new onesA person who moved from HR to Marketing still has access to salary data
Over-provisioned accountsUsers accumulate access over time without any being removedAfter 5 years, a user has access to 40 apps but only uses 6
Compliance violationsAuditors find users with access they should not haveAn external auditor flags that interns can access production databases

Key exam concept: Stale access is one of the biggest security risks in any organisation. Identity governance exists to solve it systematically, not one user at a time.

Entitlement management

Entitlement management lets you create access packages — bundles of resources and policies that users can request through a self-service portal.

ConceptWhat It IsExample
Access packageA bundle of group memberships, app access, and SharePoint sites”Marketing Team Package” includes the Marketing M365 group, the Brand Assets SharePoint site, and the Canva enterprise app
CatalogueA container that groups related access packages”Faculty Resources” catalogue at Lakewood
PolicyRules for who can request, who approves, and when access expiresRequests require manager approval. Access expires after 180 days.
RequestA user asks for access through the self-service portalA new marketing hire requests the Marketing Team Package
AssignmentThe approved access grant — can be time-limitedThe user gets the package for 180 days, then it expires automatically
💡 Scenario: Raj sets up access packages at Lakewood

Every September, hundreds of new staff and teaching assistants join Lakewood. Each faculty needs different apps, groups, and SharePoint sites. Raj used to set up each person manually — it took weeks.

Now he creates access packages:

  • “Engineering Faculty Staff” — includes the Engineering M365 group, lab booking app, and faculty SharePoint
  • “Teaching Assistant” — includes the TA group, grading portal, and student records (read-only)

New staff go to the self-service portal, request their package, and their faculty head approves. Access is granted automatically. Teaching assistant access expires at the end of the academic year.

“I went from manually adding hundreds of people to approving a few clicks,” says Professor Chen, who now handles her own faculty approvals.

Access reviews

Access reviews are periodic checks where a reviewer verifies that users still need their current access. Think of it as a regular clean-up.

QuestionAnswer
What gets reviewed?Group memberships, app assignments, role assignments, access package assignments
Who creates reviews?Administrators or access package owners
Who reviews?Managers, resource owners, self-review by users, or specific reviewers
How often?Weekly, monthly, quarterly, or annually — admin decides
What happens to denied access?Access is removed automatically (or flagged for manual removal, depending on settings)

How access reviews work

  1. An admin creates an access review (e.g., “Quarterly review of Finance group membership”)
  2. Reviewers receive an email or notification
  3. Each reviewer checks their list: “Does this person still need access?”
  4. For each user, the reviewer approves (keep access) or denies (remove access)
  5. When the review period ends, denied access is automatically removed
Proactive reviews vs reactive cleanup
FeatureWithout Access ReviewsWith Access Reviews
Who checks?Nobody — permissions accumulate foreverDesignated reviewers check every quarter
Stale accessGrows silently until an audit or breachCaught and removed at each review cycle
Audit readinessScramble to pull access reports when auditors arriveReview history is logged — ready for any audit
EffortMassive cleanup every few yearsSmall, regular effort each cycle
💡 Scenario: Alex runs quarterly access reviews at SecureBank

Director Reyes (CISO at SecureBank) requires quarterly access reviews for all privileged groups.

Alex, the security analyst, sets up a review for the “Trading Platform Admins” group:

  • Reviewers: The trading platform team lead
  • Frequency: Every 90 days
  • If no response: Access is automatically removed (secure default)

In the first review, the team lead discovers three former contractors still in the group. Their access is removed immediately.

“We had three people who could modify trading configurations and nobody knew,” Alex reports to Director Reyes. “Now we catch this every quarter.”

Terms of use

Terms of use policies require users to accept specific terms before accessing an application or resource. They are presented during sign-in and enforced through Conditional Access.

FeatureWhat It Does
Custom documentsUpload a PDF with your terms — legal, acceptable use, privacy policy
Per-app termsDifferent terms for different applications
Expiring acceptanceRequire users to re-accept terms on a schedule (e.g., annually)
TrackingFull audit trail of who accepted, when, and which version
Conditional Access integrationEnforce terms as a grant control — no acceptance, no access

Key exam concept: Terms of use are enforced through Conditional Access. They appear during sign-in when a CA policy requires them.

The identity lifecycle

Everything in governance maps to three stages:

StageWhat HappensGovernance Tool
JoinNew employee or guest needs accessEntitlement management — user requests an access package, gets approved, receives resources
MoveEmployee changes teams or rolesAccess reviews catch stale permissions from the old role. New access package requested for the new role.
LeaveEmployee or contractor departsAccess packages expire. Access reviews remove lingering access. Accounts are disabled or deleted.

🎬 Video walkthrough

🎬 Video coming soon

Identity Governance — SC-900 Module 7

Identity Governance — SC-900 Module 7

~10 min

Flashcards

Question

What problem does identity governance solve?

Click or press Enter to reveal answer

Answer

Access sprawl — users accumulating permissions they no longer need. Former employees with active accounts, role-change leftovers, over-provisioned users. Governance automates the join-move-leave lifecycle to keep permissions current.

Click to flip back

Question

What is an access package in entitlement management?

Click or press Enter to reveal answer

Answer

A bundle of resources (group memberships, app access, SharePoint sites) with policies for who can request access, who approves, and when it expires. Users request packages through a self-service portal.

Click to flip back

Question

What happens during an access review?

Click or press Enter to reveal answer

Answer

A reviewer checks whether users still need their current access. They approve or deny each user. Denied access is removed automatically. Reviews run on a schedule (weekly, monthly, quarterly) and create an audit trail.

Click to flip back

Question

How are terms of use enforced?

Click or press Enter to reveal answer

Answer

Through Conditional Access. An admin uploads a terms document and creates a CA policy that requires acceptance. Users see the terms during sign-in and must accept them before accessing the app. Re-acceptance can be required on a schedule.

Click to flip back

Knowledge Check

Knowledge Check

Raj discovers that three former contractors still have access to Lakewood's student records system — they left six months ago. Which governance capability would have prevented this?

Knowledge Check

New staff at Lakewood need different sets of apps, groups, and SharePoint sites depending on their faculty. Raj wants to streamline onboarding so staff can request the right access themselves. Which feature should he use?

Knowledge Check

SecureBank's quarterly access review for the 'Trading Platform Admins' group is configured with the setting: 'If reviewers do not respond, remove access.' Why is this the recommended default?

← Previous

Entra Roles and RBAC

Next →

PIM and Identity Protection

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.