Architecture Diagrams
Visual diagrams of the landing zone architecture
Landing Zone Overview
Entra ID Tenant
sub-nonprod
rg-<co>-nonprod-monitoring
rg-<co>-nonprod-networking
vnet-<co>-nonprod
10.1.0.0/16
snet-aks /20
snet-app /22
snet-data /22
snet-shared /24
sub-prod
rg-<co>-prod-monitoring
rg-<co>-prod-networking
vnet-<co>-prod
10.0.0.0/16
snet-aks /20
snet-app /22
snet-data /22
snet-shared /24
Azure Policies
MCSB (audit) + Tags + Locations
Budget Alerts
50% / 80% / 100% thresholds
Monitoring
Log Analytics + Defender for Cloud
Graduation Path
✓
Starter
1 MG, 2 Subs
No Hub
1
MG Hierarchy
Multi-level groups
2
Hub + Firewall
Centralized egress
3
Management Sub
Dedicated ops
4
Policy Hardening
Deny-mode policies
5
Identity Hardening
PIM, Access Reviews
★
Full ALZ
Enterprise-ready
↗ Trigger: 50+ engineers, multi-region, or regulatory compliance requirements
Networking Architecture
☁ Internet
HTTPS (443)
NSG: snet-aks
Deny all inbound (default)
Allow AzureLoadBalancer
Allow VNet internal
NSG: snet-app
Deny all inbound (default)
NSG: snet-data
Deny all inbound (default)
Allow snet-aks, snet-app only
vnet-<co>-prod
10.0.0.0/16snet-shared
251 IPs
10.0.24.0/24
Azure Bastion
VPN Gateway (if needed)
snet-aks
4,091 IPs
10.0.0.0/20
AKS Nodes + Pods
Azure CNI assigns pod IPs here
snet-app
1,019 IPs
10.0.16.0/22
App Services
Container Apps (VNet-integrated)
snet-data
1,019 IPs
10.0.20.0/22
SQL, Cosmos, Redis
Storage, Key Vault
Note: All subnets have a default deny-all-inbound NSG rule. The
/20AKS subnet is intentionally large because Azure CNI allocates one IP per pod.
Security Model
👤 Identity
Global Admin
Break-glass account
MFA enforced, no PIM
Emergency only
sg-azure-admins
Owner on mg-yourcompany
sg-azure-developers
Contributor on sub-nonprod
Reader on sub-prod
↓
🛡 Security Tooling
CSPM
Free (always)
Servers
P2 (prod) / Free
Databases
On (prod)
Containers
On (if AKS)
Key Vault
On
ARM
On (always)
↓
⚖ Governance
MCSB Baseline
Audit mode
Required Tags
environment, team
Allowed Locations
eastus2, centralus
↓
🔒 Access Control
Managed Identities
App → Key Vault Secrets User
AKS → AcrPull
No passwords
Key Vault
RBAC authorization
No access policies