Skip to main content

SC-500 skills coverage matrix

This matrix maps every official exam skill to a specific challenge. Use it to verify you've practiced all testable skills.

Domain 1: Manage identity, access, and governance (20–25%)

Design and implement privileged access

SkillChallengeStatus
Design and implement Privileged Identity Management (PIM) for Azure resources and Microsoft Entra rolesChallenge 01Covered
Configure role activation requirements (approval, justification, MFA)Challenge 01Covered
Implement just-in-time access for administrative rolesChallenge 01Covered
Monitor and audit privileged access using PIM alerts and access reviewsChallenge 02Covered
Design emergency access (break-glass) accountsChallenge 02Covered

Design and implement Conditional Access

SkillChallengeStatus
Design Conditional Access policies for zero-trust scenariosChallenge 03Covered
Configure Conditional Access grant and session controlsChallenge 03Covered
Implement Conditional Access authentication contextChallenge 03Covered
Configure authentication strengths and MFA methodsChallenge 04Covered
Troubleshoot and evaluate Conditional Access policy evaluationChallenge 04Covered

Manage identity protection and risk

SkillChallengeStatus
Configure sign-in risk and user risk policiesChallenge 05Covered
Implement risk-based Conditional Access policiesChallenge 05Covered
Investigate and remediate risky users and sign-insChallenge 05Covered
Configure external identities and cross-tenant access settingsChallenge 06Covered
Implement B2B collaboration and entitlement managementChallenge 06Covered

Design and implement governance

SkillChallengeStatus
Design and implement custom RBAC roles for least-privilege accessChallenge 07Covered
Configure role assignments at management group, subscription, and resource scopeChallenge 07Covered
Design and implement Azure Policy for security complianceChallenge 08Covered
Configure policy enforcement modes (audit, deny, deploy-if-not-exists)Challenge 08Covered
Implement resource locks and governance hierarchiesChallenge 09Covered
Configure and manage access reviews for groups, apps, and rolesChallenge 10Covered
Design entitlement management with access packages and catalogsChallenge 11Covered
Implement administrative units for delegated administrationChallenge 12Covered

Domain 2: Secure storage, databases, and networking (25–30%)

Plan and implement security for storage

SkillChallengeStatus
Configure storage account encryption (Microsoft-managed and customer-managed keys)Challenge 13Covered
Configure storage account network access (firewalls and virtual network rules)Challenge 13Covered
Configure shared access signatures (SAS) and stored access policiesChallenge 14Covered
Manage storage account access keys and key rotationChallenge 14Covered
Configure Azure Storage lifecycle management for securityChallenge 14Covered
Implement infrastructure encryption (double encryption) for storageChallenge 13Covered

Plan and implement security for databases

SkillChallengeStatus
Configure Azure SQL Database firewall rules and virtual network rulesChallenge 15Covered
Configure Azure SQL transparent data encryption (TDE) with CMKChallenge 15Covered
Implement Always Encrypted for column-level encryptionChallenge 16Covered
Configure dynamic data masking and row-level securityChallenge 16Covered
Implement Azure SQL auditing and threat detectionChallenge 17Covered
Configure Cosmos DB security (RBAC, network restrictions, encryption)Challenge 17Covered

Plan and implement security for Azure Key Vault

SkillChallengeStatus
Configure Key Vault access control (RBAC vs access policies)Challenge 18Covered
Configure Key Vault networking (private endpoint, firewall)Challenge 18Covered
Implement key, secret, and certificate management and rotationChallenge 19Covered
Configure Key Vault backup, soft-delete, and purge protectionChallenge 19Covered

Design and implement network security

SkillChallengeStatus
Design and implement network security groups (NSGs) and application security groups (ASGs)Challenge 20Covered
Configure NSG flow logs and traffic analyticsChallenge 20Covered
Design and implement Azure Firewall (rules, threat intelligence, IDPS)Challenge 21Covered
Configure Azure Firewall Manager and firewall policiesChallenge 21Covered
Implement private endpoints and Private Link servicesChallenge 22Covered
Configure private DNS zones for private endpoint resolutionChallenge 22Covered
Configure Web Application Firewall (WAF) on Application Gateway and Front DoorChallenge 23Covered
Implement DDoS Protection plans and configure mitigation policiesChallenge 24Covered
Configure Azure Bastion for secure remote accessChallenge 25Covered
Implement network segmentation and micro-segmentation strategiesChallenge 25Covered

Domain 3: Secure compute (20–25%)

Secure AI workloads

SkillChallengeStatus
Identify and mitigate data overexposure risks before deploying AI workloadsChallenge 26Covered
Configure Microsoft Purview Data Security Posture Management (DSPM) for AIChallenge 26Covered
Assess SharePoint site permissions for oversharing (Copilot readiness)Challenge 27Covered
Implement sensitivity labels to protect data surfaced by CopilotChallenge 27Covered
Configure Azure AI content safety and content filtering policiesChallenge 28Covered
Implement security controls for Azure OpenAI deploymentsChallenge 28Covered
Design and implement prompt injection detection and mitigationChallenge 29Covered
Monitor AI workload security using Defender for CloudChallenge 30Covered

Plan and implement security for virtual machines

SkillChallengeStatus
Configure Microsoft Defender for Servers (Plan 1 and Plan 2)Challenge 31Covered
Implement just-in-time (JIT) VM accessChallenge 31Covered
Configure adaptive application controlsChallenge 32Covered
Implement endpoint protection and antimalware policiesChallenge 32Covered
Configure disk encryption (Azure Disk Encryption, server-side encryption with CMK)Challenge 33Covered
Implement vulnerability assessment and remediation for VMsChallenge 34Covered
Configure update management and patch complianceChallenge 34Covered

Plan and implement security for containers and app services

SkillChallengeStatus
Configure Microsoft Defender for Containers (registry scanning, runtime protection)Challenge 35Covered
Implement Azure Policy for Kubernetes admission controlChallenge 35Covered
Configure container image scanning and vulnerability managementChallenge 36Covered
Implement secure container registry access (ACR with private endpoint, content trust)Challenge 36Covered
Configure Azure App Service security (TLS, access restrictions, managed identity)Challenge 37Covered
Implement Defender for App Service and configure security alertsChallenge 37Covered
Configure Azure Functions security (authentication, network restrictions)Challenge 38Covered
Implement API Management security policies (JWT validation, rate limiting)Challenge 38Covered

Domain 4: Manage and monitor security posture (20–25%)

Configure and manage Microsoft Defender for Cloud

SkillChallengeStatus
Configure environment settings in Microsoft Defender for CloudChallenge 39Covered
Evaluate security posture by using Cloud Security Posture Management (CSPM)Challenge 39Covered
Identify and remediate risks by using attack path analysisChallenge 39Covered
Configure Secure Score and implement security recommendationsChallenge 40Covered
Configure regulatory compliance dashboards and assessmentsChallenge 40Covered
Configure Defender for Cloud security alerts and incidentsChallenge 41Covered
Implement alert suppression rules for false positivesChallenge 41Covered
Configure workflow automation for security responsesChallenge 42Covered
Integrate Defender for Cloud with Microsoft SentinelChallenge 42Covered

Configure and manage Microsoft Sentinel

SkillChallengeStatus
Configure data connectors for Azure and non-Azure sourcesChallenge 43Covered
Configure data collection rules (DCR) for custom log ingestionChallenge 43Covered
Design and implement Sentinel analytics rules (scheduled, NRT, Microsoft Security)Challenge 44Covered
Configure Fusion detection for advanced multi-stage attacksChallenge 44Covered
Implement automation rules and playbooks using Logic AppsChallenge 45Covered
Configure SOAR (Security Orchestration, Automation, and Response) workflowsChallenge 45Covered
Design and configure Sentinel workbooks for security monitoringChallenge 46Covered
Implement threat intelligence indicators and feedsChallenge 47Covered
Configure threat hunting queries and bookmarksChallenge 47Covered

Monitor security by using KQL and diagnostic settings

SkillChallengeStatus
Write KQL queries for security investigation (SecurityEvent, SigninLogs, AzureActivity)Challenge 48Covered
Configure diagnostic settings to route security logs to Log AnalyticsChallenge 48Covered
Implement log retention policies and archive strategiesChallenge 49Covered
Configure alerts based on KQL queries and metric thresholdsChallenge 49Covered
Implement Azure Monitor security baseline assessmentsChallenge 50Covered
Design and implement incident response procedures using Sentinel incidentsChallenge 51Covered
Configure entity behavior analytics (UEBA) for anomaly detectionChallenge 51Covered

Total skills covered: 89/89 (100%)