SlideShare a Scribd company logo
1 of 10
Download to read offline
Microsoft Certified: Azure Solutions Architect Expert –
Skills Measured
This document contains the skills measured on the exams associated with this
certification. It does not include any upcoming or recent changes that have been made to
those skills. For more information about upcoming or recent changes, see the associated
exam details page(s).
Deploy and configure infrastructure
Analyze resource utilization and consumption
• configure diagnostic settings on resources
• create baseline for resources
• create and test alerts
• analyze alerts across subscription
• analyze metrics across subscription
• create action groups
• monitor for unused resources
• monitor spend
• report on spend
• utilize Log Search query functions
• view alerts in Azure Monitor logs
• visualize diagnostics data using Azure Monitor Workbooks
Create and configure storage accounts
• configure network access to the storage account
• create and configure storage account
• generate shared access signature
• implement Azure AD authentication for storage
• install and use Azure Storage Explorer
• manage access keys
• monitor activity log by using Azure Monitor logs
• implement Azure storage replication
• implement Azure storage account failover
Create and configure a VM for Windows and Linux
• configure high availability
• configure monitoring
• configure networking
• configure storage
• configure virtual machine size
• implement dedicated hosts
• deploy and configure scale sets
Automate deployment of VMs
• modify Azure Resource Manager template
• configure location of new VMs
• configure VHD template
• deploy from template
• save a deployment as an Azure Resource Manager template
• deploy Windows and Linux VMs
Create connectivity between virtual networks
• create and configure Vnet peering
• create and configure Vnet to Vnet connections
• verify virtual network connectivity
• create virtual network gateway
Implement and manage virtual networking
• configure private IP addressing
• configure public IP addresses
• create and configure network routes
• create and configure network interface
• create and configure subnets
• create and configure virtual network
• create and configure Network Security Groups and Application Security Groups
Manage Azure Active Directory
• add custom domains
• configure Azure AD Identity Protection
• configure Azure AD Join
• configure self-service password reset
• implement conditional access policies
• manage multiple directories
• perform an access review
Implement and manage hybrid identities
• install and configure Azure AD Connect
• configure federation
• configure single sign-on
• manage and troubleshoot Azure AD Connect
• troubleshoot password sync and writeback
Implement solutions that use virtual machines (VM)
• provision VMs
• create Azure Resource Manager templates
• configure Azure Disk Encryption for VMs
• implement Azure Backup for VMs
Implement workloads and security
Migrate servers to Azure
• migrate servers using Azure Migrate
Configure serverless computing
• create and manage objects
• manage a Logic App resource
• manage Azure Function app settings
• manage Event Grid
• manage Service Bus
Implement application load balancing
• configure application gateway
• configure Azure Front Door service
• configure Azure Traffic Manager
Integrate on premises network with Azure virtual network
• create and configure Azure VPN Gateway
• create and configure site to site VPN
• configure ExpressRoute
• configure Virtual WAN
• verify on premises connectivity
• troubleshoot on premises connectivity with Azure
Implement multi factor authentication
• configure user accounts for MFA
• configure fraud alerts
• configure bypass options
• configure trusted IPs
• configure verification methods
Manage role-based access control
• create a custom role
• configure access to Azure resources by assigning roles
• configure management access to Azure
• troubleshoot RBAC
• implement Azure Policies
• assign RBAC Roles
Create and deploy apps
Create web apps by using PaaS
• create an Azure app service Web App
• create documentation for the API
• create an App Service Web App for Containers
• create an App Service background task by using WebJobs
• enable diagnostics logging
Design and develop apps that run in containers
• configure diagnostic settings on resources
• create a container image by using a Dockerfile
• create an Azure Kubernetes Service
• publish an image to the Azure Container Registry
• implement an application that runs on an Azure Container Instance
• manage container settings by using code
Implement authentication and secure data
Implement authentication
• implement authentication by using certificates, forms-based authentication, tokens, or
Windows-integrated authentication
• implement multi-factor authentication by using Azure AD
• implement OAuth2 authentication
• implement Managed Identities for Azure resources Service Principal authentication
Implement secure data solutions
• encrypt and decrypt data at rest and in transit
• encrypt data with Always Encrypted
• implement Azure Confidential Compute
• implement SSL/TLS communications
• create, read, update, and delete keys, secrets, and certificates by using the KeyVault API
Develop for the cloud and for Azure storage
Configure a message-based integration architecture
• configure an app or service to send emails
• configure Event Grid
• configure the Azure Relay service
• create and configure a Notification Hub
• create and configure an Event Hub
• create and configure a Service Bus
• configure queries across multiple products
Develop for autoscaling
• implement autoscaling rules and patterns (schedule, operational/system metrics)
• implement code that addresses singleton application instances
• implement code that addresses transient state
Develop solutions that use Cosmos DB storage
• create, read, update, and delete data by using appropriate APIs
• implement partitioning schemes
• set the appropriate consistency level for operations
Develop solutions that use a relational database
• provision and configure relational databases
• configure elastic pools for Azure SQL Database
• implement Azure SQL Database managed instances
• create, read, update, and delete data tables by using code
Determine workload requirements
Gather information and requirements
• identify compliance requirements
• identify identity and access management infrastructure
• identify service-oriented architectures
• identify accessibility requirements
• identify availability requirements
• identify capacity planning and scalability requirements
• identify deployability requirements
• identify configurability
• identify governance requirements
• identify maintainability requirements
• identify security requirements
• identify sizing requirements
• recommend changes during project execution
• evaluate products and services to align with solution
• create testing scenarios
Optimize consumption strategy
• optimize app service costs
• optimize compute costs
• optimize identity costs
• optimize network costs
• optimize storage costs
Design an auditing and monitoring strategy
• define logical groupings for resources to be monitored
• determine levels and storage locations for logs
• plan for integration with monitoring tools
• recommend appropriate monitoring tools for a solution
• specify mechanism for event routing and escalation
• design auditing for compliance requirements
• design auditing policies and traceability requirements
Design for identity and security
Design identity management
• choose an identity management approach
• design an identity delegation strategy
• design an identity repository
• design self-service identity management
• design user and persona provisioning
• define personas
• define roles
• recommend appropriate access control strategy
Design authentication
• choose an authentication approach
• design a single sign on approach
• design for IPSec authentication
• design for logon authentication
• design for multi-factor authentication
• design for network access authentication
• design for remote authentication
Design authorization
• choose an authorization approach
• define access permissions and privileges
• design secure delegated access
• recommend when and how to use API Keys
Design for risk prevention for identity
• design a risk assessment strategy
• evaluate agreements involving services or products from vendors and contractors
• update solution design to address and mitigate changes to existing security policies,
standards, guidelines and procedures
Design a monitoring strategy for identity and security
• design for alert notifications
• design an alert and metrics strategy
• recommend authentication monitors
Design a data platform solution
Design a data management strategy
• choose between managed and unmanaged data store
• choose between relational and non-relational databases
• design a data auditing strategy
• design a data caching strategy
• identify data attributes
• recommend database service tier sizing
• design a data retention policy
• design for data availability
• design for data consistency
• design for data durability
• design a data warehouse strategy
Design a data protection strategy
• recommend geographic data storage
• design an encryption strategy for data at rest
• design an encryption strategy for data in transmission
• design an encryption strategy for data in use
• design a scalability strategy for data
• design secure access to data
• design a data loss prevention (DLP) policy
Design and document data flows
• identify data flow requirements
• create a data flow diagram
• design a data flow to meet business requirements
• design data flow solutions
• design a data import and export strategy
Design a monitoring strategy for the data platform
• design for alert notifications
• design an alert and metrics strategy
• monitor Azure Data Factory pipelines
Design a business continuity strategy
Design a site recovery strategy
• design a recovery solution
• design a site recovery replication policy
• design for site recovery capacity
• design for storage replication
• design site failover and failback
• design the site recovery network
• recommend recovery objectives
• identify resources that require site recovery
• identify supported and unsupported workloads
• recommend a geographical distribution strategy
Design for high availability
• design for application redundancy
• design for autoscaling
• design for data center and fault domain redundancy
• design for network redundancy
• identify resources that require high availability
• identify storage types for high availability
• design a disaster recovery strategy for individual workloads
• design failover/failback scenarios
• document recovery requirements
• identify resources that require backup
• recommend a geographic availability strategy
Design a data archiving strategy
• recommend storage types and methodology for data archiving
• identify business compliance requirements for data archiving
• identify requirements for data archiving
• identify SLA(s) for data archiving
Design for deployment, migration, and integration
Design deployments
• design a compute deployment strategy
• design a container deployment strategy
• design a data platform deployment strategy
• design a messaging solution deployment strategy
• design a storage deployment strategy
• design a web app and service deployment strategy
Design migrations
• recommend a migration strategy
• design data import/export strategies during migration
• determine the appropriate application migration method
• determine the appropriate data transfer method
• determine the appropriate network connectivity method
• determine migration scope, including redundant, related, trivial, and outdated data
• determine application and data compatibility
Design an API integration strategy
• design an API gateway strategy
• determine policies for internal and external consumption of APIs
• recommend a hosting structure for API management
Design an infrastructure strategy
Design a storage strategy
• design a storage provisioning strategy
• design storage access strategy
• identify storage requirements
• recommend a storage solution
• recommend storage management tools
Design a compute strategy
• design a compute provisioning strategy
• design a secure compute strategy
• determine appropriate compute technologies
• design an Azure HPC environment
• identify compute requirements
• recommend management tools for compute
Design a networking strategy
• design a network provisioning strategy
• design a network security strategy
• determine appropriate network connectivity technologies
• identify networking requirements
• recommend network management tools
• recommend network security solutions
Design a monitoring strategy for infrastructure
• design for alert notifications
• design an alert and metrics strategy

More Related Content

What's hot

PaaSport to Paradise: Lifting & Shifting with Azure SQL Database/Managed Inst...
PaaSport to Paradise: Lifting & Shifting with Azure SQL Database/Managed Inst...PaaSport to Paradise: Lifting & Shifting with Azure SQL Database/Managed Inst...
PaaSport to Paradise: Lifting & Shifting with Azure SQL Database/Managed Inst...Sandy Winarko
 
Data saturday Oslo Azure Purview Erwin de Kreuk
Data saturday Oslo Azure Purview Erwin de KreukData saturday Oslo Azure Purview Erwin de Kreuk
Data saturday Oslo Azure Purview Erwin de KreukErwin de Kreuk
 
8 cloud design patterns you ought to know - Update Conference 2018
8 cloud design patterns you ought to know - Update Conference 20188 cloud design patterns you ought to know - Update Conference 2018
8 cloud design patterns you ought to know - Update Conference 2018Taswar Bhatti
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon Web Services
 
Webinar Slides: MySQL HA/DR/Geo-Scale - High Noon #4: MS Azure Database MySQL
Webinar Slides: MySQL HA/DR/Geo-Scale - High Noon #4: MS Azure Database MySQLWebinar Slides: MySQL HA/DR/Geo-Scale - High Noon #4: MS Azure Database MySQL
Webinar Slides: MySQL HA/DR/Geo-Scale - High Noon #4: MS Azure Database MySQLContinuent
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Using Windows Azure for Solving Identity Management Challenges
Using Windows Azure for Solving Identity Management ChallengesUsing Windows Azure for Solving Identity Management Challenges
Using Windows Azure for Solving Identity Management ChallengesMichael Collier
 
Azure AD connect- Deep Dive Webinar PPT
Azure AD connect- Deep Dive Webinar PPTAzure AD connect- Deep Dive Webinar PPT
Azure AD connect- Deep Dive Webinar PPTRadhakrishnan Govindan
 
AWS November Webinar Series - Introducing Config Rules
AWS November Webinar Series - Introducing Config RulesAWS November Webinar Series - Introducing Config Rules
AWS November Webinar Series - Introducing Config RulesAmazon Web Services
 
Modern Business Intelligence and Advanced Analytics
Modern Business Intelligence and Advanced AnalyticsModern Business Intelligence and Advanced Analytics
Modern Business Intelligence and Advanced AnalyticsCollective Intelligence Inc.
 
Spectrum Scale - Cognitive
Spectrum Scale - CognitiveSpectrum Scale - Cognitive
Spectrum Scale - CognitiveSmita Raut
 
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...
[RightScale Webinar] Architecting Databases in the cloud:  How RightScale Doe...[RightScale Webinar] Architecting Databases in the cloud:  How RightScale Doe...
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...RightScale
 
Azure Data Certifications and Training - Timothy McAliley
Azure Data Certifications and Training - Timothy McAlileyAzure Data Certifications and Training - Timothy McAliley
Azure Data Certifications and Training - Timothy McAlileyTimothy McAliley
 
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017StampedeCon
 
AWS Config Rules - Advanced AWS Meetup
AWS Config Rules - Advanced AWS MeetupAWS Config Rules - Advanced AWS Meetup
AWS Config Rules - Advanced AWS MeetupAriel Smoliar
 
Scottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveScottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveAlbert Hoitingh
 

What's hot (20)

Adam azure presentation
Adam   azure presentationAdam   azure presentation
Adam azure presentation
 
PaaSport to Paradise: Lifting & Shifting with Azure SQL Database/Managed Inst...
PaaSport to Paradise: Lifting & Shifting with Azure SQL Database/Managed Inst...PaaSport to Paradise: Lifting & Shifting with Azure SQL Database/Managed Inst...
PaaSport to Paradise: Lifting & Shifting with Azure SQL Database/Managed Inst...
 
Azure data platform overview
Azure data platform overviewAzure data platform overview
Azure data platform overview
 
Data saturday Oslo Azure Purview Erwin de Kreuk
Data saturday Oslo Azure Purview Erwin de KreukData saturday Oslo Azure Purview Erwin de Kreuk
Data saturday Oslo Azure Purview Erwin de Kreuk
 
8 cloud design patterns you ought to know - Update Conference 2018
8 cloud design patterns you ought to know - Update Conference 20188 cloud design patterns you ought to know - Update Conference 2018
8 cloud design patterns you ought to know - Update Conference 2018
 
AWS Governance Overview - Beach
AWS Governance Overview - BeachAWS Governance Overview - Beach
AWS Governance Overview - Beach
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
 
Webinar Slides: MySQL HA/DR/Geo-Scale - High Noon #4: MS Azure Database MySQL
Webinar Slides: MySQL HA/DR/Geo-Scale - High Noon #4: MS Azure Database MySQLWebinar Slides: MySQL HA/DR/Geo-Scale - High Noon #4: MS Azure Database MySQL
Webinar Slides: MySQL HA/DR/Geo-Scale - High Noon #4: MS Azure Database MySQL
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Using Windows Azure for Solving Identity Management Challenges
Using Windows Azure for Solving Identity Management ChallengesUsing Windows Azure for Solving Identity Management Challenges
Using Windows Azure for Solving Identity Management Challenges
 
Azure AD connect- Deep Dive Webinar PPT
Azure AD connect- Deep Dive Webinar PPTAzure AD connect- Deep Dive Webinar PPT
Azure AD connect- Deep Dive Webinar PPT
 
Azure Administrator
Azure AdministratorAzure Administrator
Azure Administrator
 
AWS November Webinar Series - Introducing Config Rules
AWS November Webinar Series - Introducing Config RulesAWS November Webinar Series - Introducing Config Rules
AWS November Webinar Series - Introducing Config Rules
 
Modern Business Intelligence and Advanced Analytics
Modern Business Intelligence and Advanced AnalyticsModern Business Intelligence and Advanced Analytics
Modern Business Intelligence and Advanced Analytics
 
Spectrum Scale - Cognitive
Spectrum Scale - CognitiveSpectrum Scale - Cognitive
Spectrum Scale - Cognitive
 
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...
[RightScale Webinar] Architecting Databases in the cloud:  How RightScale Doe...[RightScale Webinar] Architecting Databases in the cloud:  How RightScale Doe...
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...
 
Azure Data Certifications and Training - Timothy McAliley
Azure Data Certifications and Training - Timothy McAlileyAzure Data Certifications and Training - Timothy McAliley
Azure Data Certifications and Training - Timothy McAliley
 
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
Doing Big Data Using Amazon's Analogs - StampedeCon Big Data Conference 2017
 
AWS Config Rules - Advanced AWS Meetup
AWS Config Rules - Advanced AWS MeetupAWS Config Rules - Advanced AWS Meetup
AWS Config Rules - Advanced AWS Meetup
 
Scottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveScottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep dive
 

Similar to Microsoft certified-azure-solutions-architect-expert-skills-measured

Get On Top of Azure Resource Security Using Secure DevOps Kit for Azure
Get On Top of Azure Resource Security Using Secure DevOps Kit for AzureGet On Top of Azure Resource Security Using Secure DevOps Kit for Azure
Get On Top of Azure Resource Security Using Secure DevOps Kit for AzureKasun Kodagoda
 
Tokyo azure meetup #8 azure update, august
Tokyo azure meetup #8   azure update, augustTokyo azure meetup #8   azure update, august
Tokyo azure meetup #8 azure update, augustTokyo Azure Meetup
 
Tokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustTokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustKanio Dimitrov
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupCloudHesive
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupCloudHesive
 
Configuration in azure done right
Configuration in azure done rightConfiguration in azure done right
Configuration in azure done rightRick van den Bosch
 
5 minutes on security
5 minutes on security5 minutes on security
5 minutes on securityCloudHesive
 
Mastering azure devOps - Dot Net Tricks
Mastering azure devOps - Dot Net TricksMastering azure devOps - Dot Net Tricks
Mastering azure devOps - Dot Net TricksGaurav Singh
 
Migrate a successful transactional database to azure
Migrate a successful transactional database to azureMigrate a successful transactional database to azure
Migrate a successful transactional database to azureIke Ellis
 
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017Amazon Web Services
 
Data Migration - Activity slide.pptx
Data Migration - Activity slide.pptxData Migration - Activity slide.pptx
Data Migration - Activity slide.pptxsharpan
 
Certification in Microsoft Azure
Certification in Microsoft AzureCertification in Microsoft Azure
Certification in Microsoft AzureDaniel Toomey
 
Introducing “Well-Architected” For Developers - Technical 101
Introducing “Well-Architected” For Developers - Technical 101Introducing “Well-Architected” For Developers - Technical 101
Introducing “Well-Architected” For Developers - Technical 101Amazon Web Services
 
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance ConversationMicrosoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance ConversationNicholas Vossburg
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudCloudHesive
 
Certifications for Azure Developers
Certifications for Azure DevelopersCertifications for Azure Developers
Certifications for Azure DevelopersKrunal Trivedi
 
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONSDotNetCampus
 
Sambit kumar nayak resume
Sambit kumar nayak resumeSambit kumar nayak resume
Sambit kumar nayak resumeSambit Nayak
 
AWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWSAWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWSCloudHesive
 

Similar to Microsoft certified-azure-solutions-architect-expert-skills-measured (20)

Get On Top of Azure Resource Security Using Secure DevOps Kit for Azure
Get On Top of Azure Resource Security Using Secure DevOps Kit for AzureGet On Top of Azure Resource Security Using Secure DevOps Kit for Azure
Get On Top of Azure Resource Security Using Secure DevOps Kit for Azure
 
Tokyo azure meetup #8 azure update, august
Tokyo azure meetup #8   azure update, augustTokyo azure meetup #8   azure update, august
Tokyo azure meetup #8 azure update, august
 
Tokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustTokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, August
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition Meetup
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition Meetup
 
Configuration in azure done right
Configuration in azure done rightConfiguration in azure done right
Configuration in azure done right
 
Monitor Cloud Resources using Alerts & Insights
Monitor Cloud Resources using Alerts & InsightsMonitor Cloud Resources using Alerts & Insights
Monitor Cloud Resources using Alerts & Insights
 
5 minutes on security
5 minutes on security5 minutes on security
5 minutes on security
 
Mastering azure devOps - Dot Net Tricks
Mastering azure devOps - Dot Net TricksMastering azure devOps - Dot Net Tricks
Mastering azure devOps - Dot Net Tricks
 
Migrate a successful transactional database to azure
Migrate a successful transactional database to azureMigrate a successful transactional database to azure
Migrate a successful transactional database to azure
 
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017
Integrating Security into DevOps and CI / CD Environments - Pop-up Loft TLV 2017
 
Data Migration - Activity slide.pptx
Data Migration - Activity slide.pptxData Migration - Activity slide.pptx
Data Migration - Activity slide.pptx
 
Certification in Microsoft Azure
Certification in Microsoft AzureCertification in Microsoft Azure
Certification in Microsoft Azure
 
Introducing “Well-Architected” For Developers - Technical 101
Introducing “Well-Architected” For Developers - Technical 101Introducing “Well-Architected” For Developers - Technical 101
Introducing “Well-Architected” For Developers - Technical 101
 
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance ConversationMicrosoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
Certifications for Azure Developers
Certifications for Azure DevelopersCertifications for Azure Developers
Certifications for Azure Developers
 
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS
 
Sambit kumar nayak resume
Sambit kumar nayak resumeSambit kumar nayak resume
Sambit kumar nayak resume
 
AWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWSAWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWS
 

Recently uploaded

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 

Recently uploaded (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 

Microsoft certified-azure-solutions-architect-expert-skills-measured

  • 1. Microsoft Certified: Azure Solutions Architect Expert – Skills Measured This document contains the skills measured on the exams associated with this certification. It does not include any upcoming or recent changes that have been made to those skills. For more information about upcoming or recent changes, see the associated exam details page(s). Deploy and configure infrastructure Analyze resource utilization and consumption • configure diagnostic settings on resources • create baseline for resources • create and test alerts • analyze alerts across subscription • analyze metrics across subscription • create action groups • monitor for unused resources • monitor spend • report on spend • utilize Log Search query functions • view alerts in Azure Monitor logs • visualize diagnostics data using Azure Monitor Workbooks Create and configure storage accounts • configure network access to the storage account • create and configure storage account • generate shared access signature • implement Azure AD authentication for storage • install and use Azure Storage Explorer • manage access keys • monitor activity log by using Azure Monitor logs • implement Azure storage replication • implement Azure storage account failover Create and configure a VM for Windows and Linux • configure high availability • configure monitoring • configure networking
  • 2. • configure storage • configure virtual machine size • implement dedicated hosts • deploy and configure scale sets Automate deployment of VMs • modify Azure Resource Manager template • configure location of new VMs • configure VHD template • deploy from template • save a deployment as an Azure Resource Manager template • deploy Windows and Linux VMs Create connectivity between virtual networks • create and configure Vnet peering • create and configure Vnet to Vnet connections • verify virtual network connectivity • create virtual network gateway Implement and manage virtual networking • configure private IP addressing • configure public IP addresses • create and configure network routes • create and configure network interface • create and configure subnets • create and configure virtual network • create and configure Network Security Groups and Application Security Groups Manage Azure Active Directory • add custom domains • configure Azure AD Identity Protection • configure Azure AD Join • configure self-service password reset • implement conditional access policies • manage multiple directories • perform an access review Implement and manage hybrid identities
  • 3. • install and configure Azure AD Connect • configure federation • configure single sign-on • manage and troubleshoot Azure AD Connect • troubleshoot password sync and writeback Implement solutions that use virtual machines (VM) • provision VMs • create Azure Resource Manager templates • configure Azure Disk Encryption for VMs • implement Azure Backup for VMs Implement workloads and security Migrate servers to Azure • migrate servers using Azure Migrate Configure serverless computing • create and manage objects • manage a Logic App resource • manage Azure Function app settings • manage Event Grid • manage Service Bus Implement application load balancing • configure application gateway • configure Azure Front Door service • configure Azure Traffic Manager Integrate on premises network with Azure virtual network • create and configure Azure VPN Gateway • create and configure site to site VPN • configure ExpressRoute • configure Virtual WAN • verify on premises connectivity • troubleshoot on premises connectivity with Azure Implement multi factor authentication
  • 4. • configure user accounts for MFA • configure fraud alerts • configure bypass options • configure trusted IPs • configure verification methods Manage role-based access control • create a custom role • configure access to Azure resources by assigning roles • configure management access to Azure • troubleshoot RBAC • implement Azure Policies • assign RBAC Roles Create and deploy apps Create web apps by using PaaS • create an Azure app service Web App • create documentation for the API • create an App Service Web App for Containers • create an App Service background task by using WebJobs • enable diagnostics logging Design and develop apps that run in containers • configure diagnostic settings on resources • create a container image by using a Dockerfile • create an Azure Kubernetes Service • publish an image to the Azure Container Registry • implement an application that runs on an Azure Container Instance • manage container settings by using code Implement authentication and secure data Implement authentication • implement authentication by using certificates, forms-based authentication, tokens, or Windows-integrated authentication • implement multi-factor authentication by using Azure AD • implement OAuth2 authentication • implement Managed Identities for Azure resources Service Principal authentication
  • 5. Implement secure data solutions • encrypt and decrypt data at rest and in transit • encrypt data with Always Encrypted • implement Azure Confidential Compute • implement SSL/TLS communications • create, read, update, and delete keys, secrets, and certificates by using the KeyVault API Develop for the cloud and for Azure storage Configure a message-based integration architecture • configure an app or service to send emails • configure Event Grid • configure the Azure Relay service • create and configure a Notification Hub • create and configure an Event Hub • create and configure a Service Bus • configure queries across multiple products Develop for autoscaling • implement autoscaling rules and patterns (schedule, operational/system metrics) • implement code that addresses singleton application instances • implement code that addresses transient state Develop solutions that use Cosmos DB storage • create, read, update, and delete data by using appropriate APIs • implement partitioning schemes • set the appropriate consistency level for operations Develop solutions that use a relational database • provision and configure relational databases • configure elastic pools for Azure SQL Database • implement Azure SQL Database managed instances • create, read, update, and delete data tables by using code Determine workload requirements Gather information and requirements • identify compliance requirements
  • 6. • identify identity and access management infrastructure • identify service-oriented architectures • identify accessibility requirements • identify availability requirements • identify capacity planning and scalability requirements • identify deployability requirements • identify configurability • identify governance requirements • identify maintainability requirements • identify security requirements • identify sizing requirements • recommend changes during project execution • evaluate products and services to align with solution • create testing scenarios Optimize consumption strategy • optimize app service costs • optimize compute costs • optimize identity costs • optimize network costs • optimize storage costs Design an auditing and monitoring strategy • define logical groupings for resources to be monitored • determine levels and storage locations for logs • plan for integration with monitoring tools • recommend appropriate monitoring tools for a solution • specify mechanism for event routing and escalation • design auditing for compliance requirements • design auditing policies and traceability requirements Design for identity and security Design identity management • choose an identity management approach • design an identity delegation strategy • design an identity repository • design self-service identity management • design user and persona provisioning • define personas
  • 7. • define roles • recommend appropriate access control strategy Design authentication • choose an authentication approach • design a single sign on approach • design for IPSec authentication • design for logon authentication • design for multi-factor authentication • design for network access authentication • design for remote authentication Design authorization • choose an authorization approach • define access permissions and privileges • design secure delegated access • recommend when and how to use API Keys Design for risk prevention for identity • design a risk assessment strategy • evaluate agreements involving services or products from vendors and contractors • update solution design to address and mitigate changes to existing security policies, standards, guidelines and procedures Design a monitoring strategy for identity and security • design for alert notifications • design an alert and metrics strategy • recommend authentication monitors Design a data platform solution Design a data management strategy • choose between managed and unmanaged data store • choose between relational and non-relational databases • design a data auditing strategy • design a data caching strategy • identify data attributes • recommend database service tier sizing • design a data retention policy
  • 8. • design for data availability • design for data consistency • design for data durability • design a data warehouse strategy Design a data protection strategy • recommend geographic data storage • design an encryption strategy for data at rest • design an encryption strategy for data in transmission • design an encryption strategy for data in use • design a scalability strategy for data • design secure access to data • design a data loss prevention (DLP) policy Design and document data flows • identify data flow requirements • create a data flow diagram • design a data flow to meet business requirements • design data flow solutions • design a data import and export strategy Design a monitoring strategy for the data platform • design for alert notifications • design an alert and metrics strategy • monitor Azure Data Factory pipelines Design a business continuity strategy Design a site recovery strategy • design a recovery solution • design a site recovery replication policy • design for site recovery capacity • design for storage replication • design site failover and failback • design the site recovery network • recommend recovery objectives • identify resources that require site recovery • identify supported and unsupported workloads • recommend a geographical distribution strategy
  • 9. Design for high availability • design for application redundancy • design for autoscaling • design for data center and fault domain redundancy • design for network redundancy • identify resources that require high availability • identify storage types for high availability • design a disaster recovery strategy for individual workloads • design failover/failback scenarios • document recovery requirements • identify resources that require backup • recommend a geographic availability strategy Design a data archiving strategy • recommend storage types and methodology for data archiving • identify business compliance requirements for data archiving • identify requirements for data archiving • identify SLA(s) for data archiving Design for deployment, migration, and integration Design deployments • design a compute deployment strategy • design a container deployment strategy • design a data platform deployment strategy • design a messaging solution deployment strategy • design a storage deployment strategy • design a web app and service deployment strategy Design migrations • recommend a migration strategy • design data import/export strategies during migration • determine the appropriate application migration method • determine the appropriate data transfer method • determine the appropriate network connectivity method • determine migration scope, including redundant, related, trivial, and outdated data • determine application and data compatibility Design an API integration strategy
  • 10. • design an API gateway strategy • determine policies for internal and external consumption of APIs • recommend a hosting structure for API management Design an infrastructure strategy Design a storage strategy • design a storage provisioning strategy • design storage access strategy • identify storage requirements • recommend a storage solution • recommend storage management tools Design a compute strategy • design a compute provisioning strategy • design a secure compute strategy • determine appropriate compute technologies • design an Azure HPC environment • identify compute requirements • recommend management tools for compute Design a networking strategy • design a network provisioning strategy • design a network security strategy • determine appropriate network connectivity technologies • identify networking requirements • recommend network management tools • recommend network security solutions Design a monitoring strategy for infrastructure • design for alert notifications • design an alert and metrics strategy