Microsoft Azure Security Technologies (AZ-500)

Disable ads (and more) with a membership for a one time $4.99 payment

Study for the Microsoft Azure Security Technologies (AZ-500) exam. Prepare with well-structured questions and detailed explanations. Enhance your understanding and improve your readiness for the certification exam!

Practice this question and more.


To secure access to Azure Key Vault, what should be established post-application registration in Azure AD?

  1. Access policies

  2. Custom roles

  3. Resource locks

  4. Management groups

The correct answer is: Access policies

To secure access to Azure Key Vault, establishing access policies is crucial after registering the application in Azure Active Directory. Access policies define the permissions that determine what operations can be performed on the Key Vault and who is allowed to perform those operations. Specifically, they control access to secrets, keys, and certificates stored within the Key Vault. By configuring access policies, you can grant specific users, applications, or groups the necessary permissions while restricting access to unauthorized entities. This ensures that only those who truly need access to sensitive information can interact with the Key Vault, thereby enhancing your security posture and protecting your critical data. Other options such as custom roles, resource locks, and management groups serve different purposes within Azure governance and security but are not directly related to securing access to Key Vault. Custom roles allow for fine-grained access control across Azure resources, resource locks prevent accidental deletion or modification of resources, and management groups help organize and manage access across multiple subscriptions in Azure. While these concepts are important for security and management, access policies are specifically designed for controlling access to Azure Key Vault.