🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 3
Domain 3 — Module 2 of 9 22%
14 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 3: Microsoft Security Solutions Premium ⏱ ~12 min read

Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault

How Azure isolates networks, filters traffic, provides secure remote access, and protects secrets — the building blocks of a secure cloud environment.

Why infrastructure security matters

☕ Simple explanation

Imagine your Azure environment is an office building.

Virtual networks (VNets) are the floors of the building — each floor is isolated from the others. The accounting floor cannot see the engineering floor’s rooms unless you build a connecting staircase.

NSGs are the door locks on each room. You set rules: “Only people from HR can enter Room 301. Everyone else, turn around.”

Azure Bastion is a secure visitor entrance. Instead of giving maintenance workers a master key (a public IP), they walk through a monitored, locked corridor that connects directly to the room they need — and nothing else.

Key Vault is the office safe. Passwords, encryption keys, and certificates are stored inside. Only authorised people (and apps) can open it, and every access is logged.

Azure infrastructure security combines network isolation, traffic filtering, secure access, and secrets management to protect cloud resources using a defence-in-depth approach.

Virtual networks provide logical isolation for Azure resources. NSGs enforce traffic rules at the subnet and NIC level. Azure Bastion eliminates the need for public IPs on VMs by providing secure, browser-based RDP/SSH access. Azure Key Vault centrally manages secrets, keys, and certificates with hardware-backed security and full audit logging.

Azure Virtual Networks (VNets)

An Azure Virtual Network (VNet) is a logically isolated network in Azure. Resources inside a VNet can communicate with each other, but resources in different VNets cannot — unless you explicitly connect them.

Key VNet concepts

ConceptWhat it means
Address spaceThe range of private IP addresses available in the VNet (for example, 10.0.0.0/16)
SubnetsDivisions within a VNet that group related resources (for example, a “web” subnet and a “database” subnet)
Network segmentationSeparating workloads into different subnets or VNets so a compromise in one area does not spread to others
VNet peeringConnecting two VNets so resources can communicate across them (traffic stays on Microsoft’s backbone network)

Why segmentation matters

Without segmentation, all resources in a flat network can communicate with everything else. If an attacker compromises one server, they can move laterally to every other server.

With segmentation: Alex places SecureBank’s web servers in one subnet, application servers in a second, and databases in a third. NSG rules ensure the web servers can only talk to the application tier, and only the application tier can reach the databases. If the web server is compromised, the attacker cannot jump directly to the database.

Network Security Groups (NSGs)

An NSG contains a list of security rules that allow or deny network traffic to resources connected to Azure VNets. You can attach an NSG to a subnet or to an individual network interface (NIC).

How NSG rules work

Each rule has these properties:

PropertyDescription
PriorityA number from 100 to 4096. Lower numbers are processed first.
Source/DestinationIP address, range, service tag, or application security group
PortSpecific port or range (for example, 443 for HTTPS)
ProtocolTCP, UDP, ICMP, or Any
ActionAllow or Deny
DirectionInbound or Outbound

Default NSG rules

Every NSG includes three default inbound and three default outbound rules that you cannot delete:

Default inbound rules:

  • Allow traffic from within the same VNet (VNet-to-VNet)
  • Allow traffic from Azure Load Balancer
  • Deny all other inbound traffic (catch-all deny)

Default outbound rules:

  • Allow traffic to the same VNet
  • Allow outbound internet traffic
  • Deny all other outbound traffic
💡 Exam tip: NSG rule processing

Rules are evaluated in priority order (lowest number first). Once a matching rule is found, processing stops.

This means a “Deny” rule at priority 100 will override an “Allow” rule at priority 200 for the same traffic. The exam often tests this concept with a scenario where someone creates an Allow rule but traffic is still blocked by a higher-priority Deny rule.

Comparing network security layers

Each layer adds different protection — they are complementary, not competing
FeatureNSGsAzure FirewallWAF
Operates atSubnet or NIC levelVirtual network level (centralised hub)Application level (HTTP/HTTPS)
Filtering basisIP, port, protocolIP, port, protocol, FQDN, threat intelligenceHTTP request patterns (OWASP rules)
CostFreePaidPaid (via Application Gateway or Front Door)
Best forBasic per-resource traffic controlCentralised enterprise network policyProtecting web applications from exploits
AnalogyRoom door locksBuilding security deskBulletproof teller window

Azure Bastion

Azure Bastion provides secure, browser-based RDP and SSH connectivity to your virtual machines — directly from the Azure portal, over TLS, without exposing any public IP addresses.

Why Bastion exists

Traditional remote access to VMs requires a public IP address on the VM. That public IP becomes an attack surface — scanners constantly probe public RDP (port 3389) and SSH (port 22) endpoints.

Azure Bastion eliminates this risk entirely:

Without BastionWith Bastion
VM needs a public IP addressNo public IP needed on the VM
RDP/SSH ports exposed to the internetPorts are only open to the Bastion service
Need VPN or jump box for secure accessBrowser-based access from Azure portal over TLS
Vulnerable to port-scanning attacksAttack surface removed completely

How Bastion works

  1. Alex opens the Azure portal and selects a VM
  2. Clicks “Connect via Bastion”
  3. The Azure portal opens a browser-based RDP/SSH session
  4. Traffic flows: Alex’s browser —TLS—> Azure Bastion —private network—> the VM
  5. The VM never has a public IP. The connection is fully managed by Azure.
💡 Exam tip: Bastion keywords

When the exam describes a scenario with “secure remote access without public IPs” or “browser-based RDP/SSH from the Azure portal” — the answer is Azure Bastion.

Remember: Bastion is a fully managed PaaS — Alex does not need to patch, update, or manage it. Azure handles the infrastructure. Bastion is available in four SKUs: Developer (free, for testing), Basic, Standard, and Premium — each adding features like scaling, native client support, and session recording.

Azure Key Vault

Azure Key Vault is a cloud service for securely storing and managing three types of sensitive objects:

Object typeWhat it storesExample
SecretsPasswords, connection strings, API keysDatabase password, third-party API token
KeysEncryption keys (for encrypting/decrypting data)Keys used by Azure Storage or Azure SQL encryption
CertificatesTLS/SSL certificatesHTTPS certificate for SecureBank’s web application

Why not just store secrets in code or config files?

  • Hardcoded secrets get committed to source control — anyone with repository access can see them
  • Secrets in config files can be leaked through error messages, logs, or backups
  • Rotation becomes a nightmare — you must find and update every copy manually

Key Vault solves all of this: secrets are stored centrally, accessed via API, protected by access policies, and every access is logged in an audit trail.

For higher security requirements, Azure Key Vault also supports Managed HSM — hardware security modules that meet FIPS 140-2 Level 3 validation for organisations with strict regulatory requirements.

Key Vault and managed identities

Managed identities let Azure resources (like a web app or VM) authenticate to Key Vault without storing any credentials in code. Azure manages the identity automatically.

Flow: Web app needs a database password —> Web app uses its managed identity to request the secret from Key Vault —> Key Vault verifies the identity and returns the secret —> No password is ever stored in code.

💡 Scenario: Alex secures SecureBank's application secrets

SecureBank’s development team has been storing database connection strings in application config files. After a security review, Alex moves all secrets to Azure Key Vault.

  1. All connection strings, API keys, and certificates are moved to Key Vault
  2. Each application gets a managed identity
  3. Key Vault access policies grant each app access only to the secrets it needs (least privilege)
  4. The old config files are cleaned of all secrets
  5. Key Vault audit logs show exactly which app accessed which secret, and when

Director Reyes reviews the audit log: “I can see that only the banking app accessed the database credentials, and it happened at expected times. This is exactly the visibility we needed.”

🎬 Video walkthrough

🎬 Video coming soon

Azure Infrastructure Security — VNets, NSGs, Bastion & Key Vault (SC-900)

Azure Infrastructure Security — VNets, NSGs, Bastion & Key Vault (SC-900)

~10 min

Flashcards

Question

What is network segmentation and why does it matter?

Click or press Enter to reveal answer

Answer

Network segmentation divides a network into isolated segments (subnets or VNets) so resources in one segment cannot freely communicate with another. It limits lateral movement — if an attacker compromises one subnet, they cannot automatically reach resources in other subnets.

Click to flip back

Question

How are NSG rules processed?

Click or press Enter to reveal answer

Answer

NSG rules are evaluated in priority order — lowest number first (100 before 200). Once a matching rule is found, processing stops. Default rules (which cannot be deleted) deny all inbound traffic and allow all outbound VNet and internet traffic.

Click to flip back

Question

What does Azure Bastion do?

Click or press Enter to reveal answer

Answer

Azure Bastion provides secure, browser-based RDP/SSH access to VMs from the Azure portal over TLS — without needing a public IP on the VM. It eliminates the attack surface of exposed RDP/SSH ports. It is a fully managed PaaS service.

Click to flip back

Question

What three types of objects does Azure Key Vault store?

Click or press Enter to reveal answer

Answer

1) Secrets — passwords, connection strings, API keys. 2) Keys — encryption keys for data protection. 3) Certificates — TLS/SSL certificates. All access is controlled by policies and logged for auditing.

Click to flip back

Question

How do managed identities work with Key Vault?

Click or press Enter to reveal answer

Answer

A managed identity is an Azure-managed credential assigned to a resource (like a web app). The app uses this identity to authenticate to Key Vault and retrieve secrets — no passwords or keys are stored in code. Azure handles the identity lifecycle automatically.

Click to flip back

Knowledge check

Knowledge Check

SecureBank's web application currently stores its database password in a configuration file. Alex wants to move to a more secure approach where the password is stored centrally, access is audited, and the application does not hold any credentials in its code. What combination should Alex implement?

Knowledge Check

Alex needs to allow SecureBank's IT team to manage virtual machines remotely. The VMs are in a private subnet with no public IP addresses. The solution must not require a VPN or expose any ports to the internet. What should Alex use?

Knowledge Check

SecureBank has a VNet with three subnets: Web, Application, and Database. Alex wants to ensure that only the Application subnet can communicate with the Database subnet. Web servers should reach the Application subnet but never the Database directly. What should Alex configure?

← Previous

Azure Network Defence: DDoS, Firewall & WAF

Next →

Microsoft Defender for Cloud

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.