Microsoft • SC-100
Validates expertise in designing and implementing cybersecurity solutions that protect organizational assets, business operations, and infrastructure following Zero Trust principles and security best practices.
Questions
880
Duration
120 minutes
Passing Score
700/1000
Difficulty
ExpertLast Updated
Jan 2026
The Microsoft Cybersecurity Architect Expert certification (SC-100) validates a professional's ability to translate organizational cybersecurity strategy into concrete capabilities that protect assets, business processes, and operations. Credential holders demonstrate mastery in designing, guiding implementation of, and maintaining security solutions that follow Zero Trust principles across identity, devices, data, AI, applications, network, infrastructure, and DevOps domains. The exam was most recently updated on January 22, 2026, reflecting the latest evolution of Microsoft's security portfolio and architectural best practices.
This expert-level certification sits at the top of Microsoft's Security, Compliance, and Identity credential path. Unlike associate-level certifications that focus on hands-on implementation, SC-100 tests the ability to design holistic security architectures, evaluate and compare security solutions, align technical controls with business objectives, and communicate risk to organizational leadership. Candidates are expected to have broad familiarity with Microsoft Defender for Cloud, Microsoft Sentinel, Microsoft Entra ID, Microsoft Purview, and the full range of Microsoft security tooling across hybrid and multicloud environments. The exam also emphasizes the Microsoft Cybersecurity Reference Architectures (MCRA), the Microsoft Cloud Security Benchmark (MCSB), and the Microsoft Cloud Adoption Framework (CAF).
This certification is designed for senior security professionals who function as cybersecurity architects or aspire to step into that role. Target candidates include Security Architects, Cloud Security Engineers, Security Operations Analysts, and Solution Architects who have hands-on experience implementing or administering solutions across identity and access management, platform protection, security operations, data and AI security, application security, and hybrid and multicloud infrastructures. Candidates should have expert-level skills in at least one of those domains and practical experience designing solutions using Microsoft security technologies.
The certification is ideally pursued by professionals who already hold an associate-level Microsoft security credential and are looking to advance into strategic, architecture-defining roles. It is well-suited for those moving from implementation-focused positions (such as Azure Security Engineer or Security Operations Analyst) into leadership roles that require translating business requirements into comprehensive security strategies, collaborating with executives and cross-functional stakeholders, and making high-stakes decisions about enterprise security posture.
To earn the Microsoft Certified: Cybersecurity Architect Expert designation, candidates must first hold at least one of the following associate-level certifications: Microsoft Certified: Azure Security Engineer Associate (AZ-500), Microsoft Certified: Identity and Access Administrator Associate (SC-300), or Microsoft Certified: Security Operations Analyst Associate (SC-200). This formal prerequisite ensures that SC-100 candidates arrive with verified, foundational implementation skills before attempting the architect-level exam.
Beyond the mandatory certification prerequisite, candidates are strongly encouraged to have practical, multi-year experience administering or implementing solutions across identity and access, platform protection, security operations, and hybrid or multicloud infrastructures. Familiarity with Microsoft Entra ID, Microsoft Defender XDR, Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft Purview, and Azure Policy is essential. Experience with Zero Trust frameworks, the MITRE ATT&CK framework, and regulatory compliance concepts (such as GDPR, HIPAA, or industry-specific standards) will also be directly tested. Candidates without hands-on experience across multiple security domains should expect the exam to be significantly challenging.
The SC-100 exam is administered through Pearson VUE at authorized test centers or via online proctored delivery. The total seat time is approximately 120 minutes, with roughly 100 minutes of active testing time (when no performance-based labs are included). The exam contains approximately 40–60 questions in formats that include multiple-choice, multiple-select, drag-and-drop, case studies, and scenario-based questions that require analyzing architectural decisions rather than recalling configuration steps.
A passing score of 700 out of 1000 is required. The scoring scale is not linear — Microsoft uses a scaled scoring model where each question is weighted according to difficulty and domain. The exam is available in English, Japanese, Simplified Chinese, Korean, German, French, Spanish, Portuguese (Brazil), Traditional Chinese, and Italian. The exam fee is $165 USD (pricing varies by country). The resulting certification is valid for one year and can be renewed annually at no cost by passing a free online renewal assessment on Microsoft Learn.
The SC-100 certification positions holders for senior strategic roles including Cybersecurity Architect, Cloud Security Director, CISO Advisor, and Principal Security Engineer. These positions command significantly higher compensation than associate-level roles, with cybersecurity architects in the United States typically earning between $150,000 and $200,000+ annually. Industry data places the 75th percentile for security architects in the Microsoft ecosystem above $288,000, reflecting strong employer demand for professionals who can own end-to-end security strategy in hybrid and multicloud environments.
As enterprises accelerate cloud adoption and regulatory compliance requirements intensify globally, demand for architects who understand Microsoft's security stack — particularly Defender for Cloud, Sentinel, Entra ID, and Purview — continues to outpace supply. The SC-100 differentiates candidates from those holding only implementation-focused credentials by demonstrating the ability to make architecture-level decisions, communicate with executive stakeholders, and evaluate security posture at an organizational scale. Compared to vendor-neutral alternatives such as CISSP or SABSA, SC-100 provides a more immediately applicable credential for organizations standardized on Microsoft technology, and is frequently listed as a preferred or required qualification in enterprise security architecture job postings.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 880 questions.
1. Northwind Traders wants to allow external partner companies to collaborate in Teams without allowing those guest users to invite additional guests. Which Azure AD settings should be configured?
Explanation
External collaboration settings in Azure AD control guest access and guest invitation permissions across Microsoft 365 including Teams, allowing you to enable guest collaboration while restricting guests from inviting other guests. SharePoint settings don't control Teams guest invitation capabilities. Teams guest access settings don't have granular invitation restriction options. Anonymous meeting settings only affect meeting access, not guest invitation capabilities.
2. Blue Yonder Airlines wants to build a comprehensive security strategy aligned with business outcomes. The organization needs to engage stakeholders and document how security investments support business goals before implementing technical solutions. Which framework should the architect use?
Explanation
The Business Outcome Framework provides a structured template for documenting business outcomes and key performance indicators, enabling security architects to communicate with stakeholders about how security investments support business goals before technical implementation. The MCRA provides technical architectural guidance after business alignment is established. The Cloud Adoption Framework governance stage focuses on policy implementation, not initial business alignment. Azure security baselines provide technical configurations but not business outcome alignment.
3. Contoso needs to monitor cloud application usage across the organization and prevent users from uploading company data to personal cloud storage accounts. Which Microsoft 365 Defender service provides this capability?
Explanation
Defender for Cloud Apps monitors software-as-a-service applications and can differentiate between business and personal accounts of the same service. It can restrict users from accessing personal cloud storage while allowing business accounts. Defender for Endpoint monitors endpoints but not cloud application policies. Defender for Identity tracks authentication. Data Loss Prevention prevents sharing but doesn't restrict specific cloud apps.
4. Contoso has discovered that users are receiving emails from known contacts that appear legitimate but contain suspicious links. The emails are arriving at unusual times outside normal business hours. Which combination of Zero Trust controls should Contoso implement to detect and prevent this attack? (Choose two!)
Multiple correct answersExplanation
Behavioral analytics detects when email patterns deviate from normal (unusual times, locations), triggering alerts or blocks. Advanced threat protection scans links and attachments for malicious content before users click them. Together these provide detection and prevention. Sign-in risk policies address user authentication but not email content threats. Email encryption protects data in transit but doesn't detect malicious links. DLP focuses on data classification, not threat detection. Disabling email access is impractical.
5. Solution: Tailwind Traders implements a security hygiene plan that patches all virtual machines within 30 days, deploys critical security updates to operating systems and browsers, implements unique local administrator passwords, and establishes destruction-resistant backups. Does this plan address the foundational security requirements for modern infrastructure?
Explanation
This plan implements Microsoft's recommended 30-day security hygiene baseline covering critical areas: backups for recovery, OS/browser updates to close known vulnerabilities, and unique credentials to prevent lateral movement. These foundational steps are essential before implementing advanced security measures. This approach prioritizes addressing known security gaps rather than waiting for incident response.
One-time access to this exam