Skip to main content
Version: Next

Phase 01: Azure Landing Zones

Runbook Azure

DOCUMENT CATEGORY: Runbook
SCOPE: Landing zone deployment
PURPOSE: Deploy management groups, subscriptions, and resource groups
MASTER REFERENCE: Azure Landing Zones — Conceptual Architecture

Status: Active


Overview

Deploy an Azure Landing Zone architecture for Azure Local — the governance foundation that organizes your management groups, subscriptions, and resource groups following Microsoft's Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) best practices.

Azure Landing Zones provide a proven, scalable architecture pattern that ensures your Azure Local deployment starts with proper governance, security, and operational controls from day one. Whether you're deploying a single cluster or scaling to an enterprise fleet, the landing zone is the first thing you build in Azure.

All examples on this page use Infinite azurelocal Corp (IIC). Replace names with values from your variables.yml.

Why Azure Landing Zones for Azure Local?

Azure Local clusters are hybrid by nature — they run on-premises but are managed through Azure Arc and the Azure control plane. This means your Azure governance structure directly impacts:

  • Arc registration — every Azure Local node registers as an Arc-enabled server in a resource group
  • Resource provider access — Azure Local requires specific resource providers registered on the subscription
  • Hybrid identity — Entra ID integration flows through your tenant's management group hierarchy
  • Policy enforcement — Azure Policy applied at management group scope governs all clusters beneath it
  • Network connectivity — hub-spoke or direct connectivity patterns depend on your subscription topology
Azure Landing Zone Accelerator

Microsoft provides an Azure Landing Zone accelerator that can automate much of this setup. The tasks in this phase walk through the manual approach so you understand each component. You can also use the accelerator and then verify the results against these tasks.

What This Accomplishes

  • Management group hierarchy — CAF-aligned governance structure for policy inheritance and RBAC
  • Subscription organization — dedicated or shared subscriptions with proper billing and access boundaries
  • Resource group structure — organized containers for Azure Local cluster resources and supporting infrastructure

Prerequisites

Azure Authentication Required

Before running any scripts in this phase, ensure you have an authenticated Azure session. See Authentication for options including Azure PowerShell, Azure CLI, and service principal authentication.

RequirementDetail
Entra ID TenantYour organization's Entra ID tenant — you must have Global Administrator or Privileged Role Administrator access
Tenant Root AccessOwner or User Access Administrator role at the tenant root management group scope
Billing AccessEA enrollment account owner, MCA billing profile owner, or ability to create subscriptions via Azure portal
variables.ymlConfigured with management group, subscription, and resource group values

Choose Your Deployment Model

Decision Required

Select a deployment model before proceeding. The model determines the management group hierarchy, subscription count, and resource group structure. Review the comparison table and the Azure Landing Zone design areas to inform your decision.

Deployment Model Comparison

AspectFull CAF/WAF DeploymentSingle Subscription Deployment
Management GroupsComplete hierarchy per CAF Enterprise-Scale (10+)Root MG + Landing Zone MG (2)
SubscriptionsDedicated subscription per function (5+)Single subscription for all resources
Resource GroupsMultiple RGs per subscriptionSingle RG per cluster
GovernanceMG-level policies with inheritanceSubscription-level policies
RBACMG-level role assignments with subscription boundariesResource group-level access control
Cost TrackingSubscription-based isolationTag-based allocation
Best ForEnterprise, regulated, multi-cluster, productionPoC, labs, single cluster, quick-start
ComplexityHigher — more components to deploy and maintainLower — operational in under an hour
Growth PathReady for multi-cluster and multi-environment scaleCan migrate to full CAF/WAF later

Which Model Should You Choose?

Choose Full CAF/WAF if your organization:

  • Deploys multiple Azure Local clusters across sites
  • Has strict compliance or regulatory requirements (healthcare, finance, government)
  • Needs separation of duties between platform, identity, connectivity, and workload teams
  • Plans to scale Azure Local alongside other Azure workloads

Choose Single Subscription if your organization:

  • Is deploying a single Azure Local cluster
  • Is running a proof of concept or lab
  • Wants the fastest path to a working deployment
  • Plans to migrate to full CAF/WAF architecture later

Full CAF/WAF Deployment

Deploy the complete Azure Landing Zone conceptual architecture — enterprise-scale management group hierarchy, dedicated subscriptions per function, and multi-resource-group organization.

Architecture Overview

Tenant Root Group
└── cmp-iic-root # Organization Root MG
├── cmp-platform-iic # Platform Services
│ ├── cmp-platform-management-iic # Monitoring, Log Analytics, Automation
│ ├── cmp-platform-connectivity-iic# Hub VNet, VPN, ExpressRoute
│ └── cmp-platform-identity-iic # Entra ID Connect, identity services
├── cmp-landing-zones-iic # Landing Zones
│ ├── cmp-lz-corp-iic # Corporate / Azure Local workloads
│ └── cmp-lz-online-iic # Internet-facing workloads
├── cmp-sandbox-iic # Non-production experimentation
└── cmp-decommissioned-iic # Resources pending deletion

Tasks

TaskDescriptionDocumentation
Task 01Configure complete management group hierarchyConfigure Management Groups
Task 02Create dedicated subscriptions per functionCreate Subscriptions
Task 03Create resource groups in each subscriptionCreate Resource Groups

➡️ Begin Full CAF/WAF Deployment


Single Subscription Deployment

Deploy a streamlined landing zone — root management group, landing zone management group, a single subscription, and a single resource group per cluster. This follows the same CAF principles but scoped for smaller deployments.

Architecture Overview

Tenant Root Group
└── cmp-iic-root # Organization Root MG
└── cmp-landing-zones-iic # Landing Zone MG
└── iic-lz-azurelocal-001 # Subscription
└── rg-c01-azl-eus-01 # Single resource group
├── Azure Local cluster resources
├── Arc-enabled servers
├── Key Vault
└── Storage accounts

Tasks

TaskDescriptionDocumentation
Task 01Configure root and landing zone management groupsConfigure Management Group
Task 02Create or assign a subscriptionCreate Subscription
Task 03Create resource group for cluster resourcesCreate Resource Groups

➡️ Begin Single Subscription Deployment


Azure Local–Specific Considerations

Regardless of which deployment model you choose, keep these Azure Local requirements in mind:

ConsiderationDetail
Arc registrationEvery Azure Local node registers as an Arc-enabled server — the resource group must exist before cluster deployment
Resource providersThe subscription must have Microsoft.AzureStackHCI, Microsoft.HybridCompute, and other providers registered (covered in Phase 02)
Region selectionChoose an Azure region that supports Azure Local metadata — this does not need to match your physical location
Naming conventionsUse consistent naming per CAF naming conventions — names flow into Arc registrations and cannot be easily changed
TagsApply tags at resource group creation — they propagate to cost tracking, policy evaluation, and operational dashboards

Deliverables

Regardless of deployment model, the following deliverables are expected at the end of this phase:

  • Management group hierarchy deployed and verified in Azure Portal
  • Subscriptions provisioned and associated with correct management groups
  • Resource groups created following naming conventions from variables.yml
  • Governance structure ready for policy assignment (Phase 03) and resource provider registration (Phase 02)

Security Considerations

  • Least privilege — assign roles at the narrowest scope possible (MG for platform teams, subscription for workload teams, RG for operators)
  • Policy governance — apply Azure Policy at management group scope for consistent enforcement across all subscriptions
  • Subscription isolation — in the full model, subscription boundaries provide hard RBAC and quota separation
  • Resource organization — logical separation supports audit trails, cost tracking, and blast-radius containment

Next Steps

After landing zones are deployed, proceed to Phase 02: Resource Providers to register the required Azure resource providers on your subscriptions.

References


PreviousUpNext
Azure FoundationPhase 02 — Resource Providers

Version Control

  • Created: 2026-01-15 by Hybrid Cloud Solutions
  • Last Updated: 2026-03-19 by Hybrid Cloud Solutions
  • Version: 3.0.0