Skip to main content

Conceptual Overview

Understanding why Azure Landing Zones exist and what problems they solve.

The Problem: Cloud at Scale is Hard

When organizations adopt Azure without a structured approach:

Common symptoms:

  • Every team creates resources differently
  • IP address conflicts between VNets
  • No centralized logging or monitoring
  • Security policies applied inconsistently
  • Shadow IT and ungoverned resources
  • Lengthy subscription provisioning (weeks!)
  • No clear ownership model

The Solution: Azure Landing Zone

An Azure Landing Zone provides a standardized, repeatable foundation for hosting workloads:

Two Types of Landing Zones

Platform Landing Zones

Owned by: Platform/Central IT Team

Provide shared services that application landing zones consume:

Platform LZPurpose
IdentityAzure AD, domain controllers, Entra ID Connect
ConnectivityHub network, ExpressRoute, Firewall, DNS
ManagementLog Analytics, Automation, Backup vaults

Application Landing Zones

Owned by: Application/Workload Teams

Where actual business workloads run:

Application LZPurpose
CorpInternal applications (connected to hub)
OnlinePublic-facing applications (internet ingress)
SandboxDevelopment, testing, experimentation

Core Concepts

1. Management Group Hierarchy

Azure Management Groups create a governance hierarchy above subscriptions:

Tenant Root Group
├── Platform
│ ├── Identity
│ ├── Management
│ └── Connectivity
├── Landing Zones
│ ├── Corp
│ └── Online
├── Sandboxes
└── Decommissioned

Why it matters:

  • Policies applied at a management group inherit to all child subscriptions
  • RBAC assignments flow down the hierarchy
  • Enables governance at scale without per-subscription configuration

2. Subscription as Unit of Scale

In Landing Zone architecture, a subscription is:

  • The blast radius boundary
  • The billing boundary
  • The access control boundary
  • The quota boundary

Key insight: Don't put multiple unrelated workloads in one subscription. Use subscriptions liberally!

3. Policy-Driven Governance

Instead of relying on tribal knowledge or manual reviews:

Policy effects:

  • Deny - Block non-compliant deployments
  • Audit - Allow but flag for review
  • Modify - Auto-fix configuration
  • DeployIfNotExists - Auto-deploy required resources

4. Network Topology Options

Two primary patterns for enterprise connectivity:

Hub-Spoke (Traditional)

Best for:

  • Traditional hub-and-spoke networks
  • Granular traffic control with Azure Firewall
  • Smaller deployments (< 200 spokes)

Virtual WAN

Best for:

  • Many branch offices
  • Global deployments
  • Simplified connectivity management
  • 200 VNets

Design Principles

1. Subscription Democratization

Traditional ApproachLanding Zone Approach
Central team provisions everythingSelf-service with guardrails
Weeks of lead timeMinutes to provision
Manual reviewsAutomated policy checks
Bottleneck on platform teamDistributed ownership

2. Policy-Driven Governance

Shift-left compliance:

  • Policies prevent misconfigurations at deployment time
  • No more "audit and remediate" cycles
  • Developers get immediate feedback

3. Single Control Plane

All management through Azure Resource Manager:

  • Consistent APIs
  • Unified RBAC
  • Comprehensive audit logs

4. Application-Centric Migration

Design for workload independence:

  • Each application has its own landing zone (subscription)
  • Teams own their resources
  • Platform team owns shared services

Journey to Landing Zones

Real-World Example

Scenario: Contoso Corp migrating to Azure

Before:

  • 15 subscriptions created by different teams
  • No naming convention
  • VNet IP conflicts
  • No centralized logging
  • 4-week subscription provisioning

After Landing Zone Implementation:

Contoso (Tenant Root)
├── Platform
│ ├── Identity (1 sub)
│ │ └── Domain Controllers, Entra ID Connect
│ ├── Management (1 sub)
│ │ └── Log Analytics, Automation, Backup
│ └── Connectivity (1 sub)
│ └── Hub VNet, ExpressRoute, Firewall
├── Landing Zones
│ ├── Corp (10 subs)
│ │ ├── SAP Production
│ │ ├── SAP Non-Production
│ │ ├── HR System
│ │ └── ... (internal apps)
│ └── Online (5 subs)
│ ├── E-commerce Prod
│ ├── E-commerce Non-Prod
│ └── ... (public apps)
└── Sandbox (3 subs)
└── Developer experimentation

Results:

  • Subscription provisioning: 4 weeks → 15 minutes
  • Security incidents: 12/month → 1/month
  • Compliance audit: 3 weeks → 2 days
  • Network conflicts: Weekly → None

Quick Reference Card

ConceptDefinition
Landing ZonePre-configured Azure environment with governance
Platform LZShared services (network, identity, management)
Application LZWhere workloads run (corp, online, sandbox)
Management GroupGovernance container above subscriptions
Hub-SpokeTraditional network topology with central hub
Virtual WANManaged network hub for large deployments
Policy-DrivenGovernance through Azure Policy, not manual review

What Interviewers Look For

When discussing Landing Zones in interviews:

Good answers:

  • Explain the why (governance at scale)
  • Describe management group hierarchy
  • Discuss policy-driven governance
  • Compare hub-spoke vs Virtual WAN trade-offs
  • Mention subscription democratization

Red flags:

  • Treating subscriptions as "just billing containers"
  • Ignoring network topology decisions
  • No mention of Azure Policy
  • Proposing manual governance processes

Next Steps

Continue to Design Areas to understand the 8 critical decisions every Landing Zone must address.