What is an Azure Landing Zone?
An Azure Landing Zone is Microsoft's reference architecture for production-ready Azure subscriptions, defined inside the Cloud Adoption Framework (CAF). It covers identity and access management, network topology and connectivity, governance and policy, security baseline, and operational management. The reference implementation is published as Microsoft Enterprise-scale Landing Zones, available as Bicep and Terraform accelerators.
What does this maturity checker score?
Four domains drawn from the CAF reference: identity and access management (management groups, RBAC, PIM), network topology and connectivity (hub-spoke, firewall, private endpoints, DNS), governance and cost (Azure Policy, tagging, Cost Management, FinOps), and security baseline and operations (Defender for Cloud plans, Sentinel coverage, IaC). 12 questions, four-tier scoring per domain (Initial / Developing / Defined / Optimised).
Who should run this assessment?
Anyone running 10+ Azure subscriptions in production. Below that, you're typically running a small Azure estate that doesn't yet need the full CAF reference. Above 50 subscriptions, this assessment is the cheapest baseline before deciding on a full enterprise-scale landing zone uplift.
What's the difference between Cloud Adoption Framework and Well-Architected Framework?
Cloud Adoption Framework (CAF) is the platform layer — how the Azure estate itself is structured (subscriptions, management groups, network, governance). Well-Architected Framework (WAF) is the workload layer — how individual applications running on top of the platform are designed for reliability, security, cost, operational excellence and performance. CAF gives you the landing zone; WAF gives you the workload design pattern.
Does this apply to small Azure estates?
Partially. The principles apply at every scale but the implementation effort doesn't pay back below roughly 10 production subscriptions. For small estates, focus on the highest-leverage items: management groups (even a 2-tier hierarchy), Defender for Cloud paid plans, tagging taxonomy, and PIM on Owner/Contributor. Skip the full hub-and-spoke topology until network egress consolidation becomes an actual cost or security driver.
Where does Microsoft Sentinel fit in the landing zone?
Sentinel sits in the management subscription of the landing zone, ingesting logs from Azure Activity, Entra ID sign-ins, Defender XDR, Office 365 audit, and any workload-specific data sources. Microsoft's reference deploys Sentinel as part of the platform landing zone, not per workload. Cost typically scales with Defender XDR log volume more than with workload count.
How does Frontrow run an Azure Landing Zone uplift?
Three phases over 8–12 weeks for a typical AU mid-market estate of 50–150 subscriptions. Phase 1 (weeks 1–4): management group hierarchy, RBAC consolidation, Azure Policy baseline, tagging taxonomy. Phase 2 (weeks 4–8): hub-and-spoke network topology, central firewall, private endpoints, DNS centralisation. Phase 3 (weeks 8–12): Defender for Cloud full coverage, Sentinel deployment, IaC migration of the new landing zone. Existing workloads migrate progressively into the new structure.
How is this self-assessment validated?
Every scoring threshold cites a primary source: Microsoft Learn Cloud Adoption Framework — Enterprise-scale design areas, the Microsoft Well-Architected Framework, and the Microsoft Cloud Security Benchmark. The methodology is authored by Daniel Brown (5x Microsoft MVP), Graeme Lodge (Managing Director), and Sam Williams (Investor & Executive Consultant).