Azure · AZ-500

Near-Right Architecture — Azure Security Engineer (AZ-500)

Two options were architecturally valid — you picked the one that violates a constraint buried in the scenario. Read constraints before evaluating answers.

The Security Feature Exists but Does Not Solve This Problem

Candidates see a network isolation requirement and reach for Network Security Groups because that is the most familiar network control. The scenario, however, specifies that the storage account must have no public endpoint at all. NSGs filter traffic on subnets and NICs; they do not disable a storage account's public endpoint. Private Endpoints with public access disabled is a different control at a different layer. The exam tests whether you can match the control to the actual threat surface, not just the general category.

28%of exam questions affected (56 of 200)

The Scenario

The question asks you to design a globally distributed web application with real-time bidirectional communication via WebSockets. Two options: Azure Front Door with backend pools, or Traffic Manager with regional Application Gateways. Both achieve global distribution. But Front Door operates at Layer 7 with HTTP/HTTPS — it supports WebSocket connections. Traffic Manager is DNS-based and does not proxy traffic at all, so it cannot maintain WebSocket connections across failovers. The trap is that Traffic Manager sounds like the "global load balancer" answer, but it only does DNS resolution, not connection proxying.

How to Spot It

  • Azure Front Door vs. Traffic Manager is a Layer 7 vs. DNS-level distinction. If the scenario needs connection proxying, SSL offloading, or WebSocket support, Traffic Manager is eliminated. If it only needs DNS-based routing with health probes, Front Door may be over-engineering.
  • Pay attention to "real-time," "bidirectional," or "persistent connections." These require a proxy-based load balancer (Front Door, Application Gateway), not DNS-only routing (Traffic Manager).
  • When both architectures distribute traffic globally, the tiebreaker is always in the connection semantics — HTTP request-response vs. persistent connections vs. raw TCP.

Decision Rules

Whether the selected architecture provides built-in transitive routing through a central inspection point for spoke-to-spoke flows, or merely establishes peering adjacency that a learner mistakenly assumes is transitive.

Azure Virtual WANAzure Virtual Network Manager

Whether Azure Virtual WAN with a secured virtual hub — which natively enforces transitive routing and directs all spoke-to-spoke flows through the hub inspection tier — or Azure Virtual Network Manager connected groups — which achieve reachability at scale but delegate inspection-path enforcement to operator-managed UDR overlays — satisfies the unconditional requirement that inter-spoke traffic cannot bypass the central inspection point.

Azure Virtual WANAzure Virtual Network Manager

Whether to grant a standing built-in Contributor role at subscription scope (near-right: functional but violates least privilege on both permission breadth and scope width) versus configuring a PIM eligible assignment of a narrowly scoped role at resource-group scope with approval-gated, time-limited activation (correct: satisfies least privilege on both dimensions and enforces just-in-time access).

Microsoft Entra Privileged Identity ManagementAzure Role-Based Access Control (RBAC)

Whether to apply a Conditional Access policy scoped to the PIM role activation action with a device-compliance condition and named-location filter (satisfying all three constraints: no standing access, compliant device, IP-range gate) versus applying a general-purpose MFA policy on All Cloud Apps that enforces at sign-in but does not enforce device compliance, does not gate by named location, and does not target the activation event as the control surface.

Microsoft Entra Privileged Identity ManagementMicrosoft Entra Conditional Access

Choose between Service Endpoints and Private Endpoints when the stated constraint is zero public endpoint exposure: Service Endpoints apply a VNet-scoped ACL to a still-publicly-routable endpoint, while Private Endpoints inject a private NIC into the VNet and permit disabling the public endpoint entirely.

Private EndpointsService Endpoints

Whether to protect a public web application against OWASP-class application-layer threats (SQL injection, XSS) using L7 WAF inspection on Application Gateway, or to rely on Azure Firewall which operates at L3/L4 and cannot inspect HTTP payloads.

Azure Application GatewayAzure Web Application Firewall (WAF)

Determine whether Service Endpoints with a VNet-scoped firewall rule or Private Endpoints satisfy a zero-public-endpoint mandate on a PaaS backend service connected to a VNet-integrated Azure Functions app.

Azure FunctionsPrivate EndpointsService Endpoints

Whether to place Azure Firewall (L3/L4 network perimeter) or Application Gateway with WAF Policy (L7 OWASP CRS enforcement) in front of a regional public API endpoint when the threat class is HTTP application-layer attacks requiring payload inspection.

Azure Application GatewayAzure Web Application Firewall (WAF)

When the stated requirement is that temp-disk and cache data must be encrypted at the physical-host boundary before leaving the host, encryption-at-host satisfies that scope boundary while ADE alone does not, making host-level encryption the disqualifying dimension.

Azure Disk Encryption (ADE)

When a named WORM-compliance regulation requires tamper-proof retention, select a locked time-based retention policy on an immutable-storage-enabled Azure Blob Storage container; disqualify soft delete and versioning because they restore deleted or prior versions but do not block modification or deletion during the active retention window.

Azure Blob StorageAzure Key Vault

Choose Always Encrypted (with column master key stored in Azure Key Vault) over Transparent Data Encryption when the constraint is column-level in-use protection that keeps plaintext invisible to the database engine and privileged database users — not merely at-rest disk-level encryption.

Azure SQL DatabaseAzure Key Vault

Select the Azure SQL encryption layer that keeps column ciphertext opaque to the database engine and DBAs at query time — Always Encrypted with client-side key custody versus Transparent Data Encryption, which decrypts data at the storage engine before any query result is returned.

Azure SQL DatabaseAzure Key Vault

When the requirement is continuous posture assessment with regulatory-compliance mapping and Secure Score aggregation across Azure and non-Azure clouds, Defender for Cloud (CSPM plan with multi-cloud connector) is the correct boundary; Azure Policy alone satisfies Azure-scoped enforcement but cannot aggregate cross-cloud posture or calculate the risk-prioritised score that maps to a named compliance framework.

Microsoft Defender for CloudAzure Policy

Choose Defender for Servers Plan 2 — not Plan 1 — because Plan 2 is the plan tier that includes integrated Microsoft Defender Vulnerability Management with agentless scanning, which is the only configuration that satisfies a no-agent, continuous vulnerability assessment requirement.

Microsoft Defender for ServersAzure Virtual Machines

Domain Coverage

Secure Identity and AccessSecure NetworkingSecure Compute, Storage, and DatabasesSecure Azure Using Microsoft Defender for Cloud and Microsoft Sentinel

Difficulty Breakdown

Easy: 28Hard: 8Medium: 20

Related Patterns