Skip to content

Day 1 / Day 2 Prioritization

Related: README | All Documentation Files

Overview

This document provides a phased rollout plan for implementing the Azure Landing Zone architecture. Day 1 focuses on establishing the foundational platform with minimal viable security controls. Day 2 focuses on hardening, optimization, and advanced capabilities.

Phase Overview

gantt
    title Azure Landing Zone Implementation Timeline
    dateFormat  YYYY-MM-DD
    section Day 1 - Foundation
    EA Enrollment & Tenant           :d1-1, 2024-01-01, 3d
    Management Group Hierarchy       :d1-2, after d1-1, 2d
    Identity Baseline                :d1-3, after d1-2, 5d
    Platform Subscriptions           :d1-4, after d1-3, 3d
    Connectivity Baseline            :d1-5, after d1-4, 5d
    Management Baseline              :d1-6, after d1-4, 5d
    CI/CD Pipeline                   :d1-7, after d1-6, 3d
    First App LZ                     :d1-8, after d1-7, 5d

    section Day 2 - Hardening
    Advanced Networking              :d2-1, after d1-8, 10d
    Security Hardening               :d2-2, after d1-8, 14d
    Compliance & Governance          :d2-3, after d2-2, 10d
    Optimization                     :d2-4, after d2-3, 7d

Day 1: Foundation (Weeks 1-4)

Goals

  • Establish core platform structure
  • Enable development teams to deploy workloads
  • Implement baseline security controls
  • Cost-optimized for startup

Day 1 Checklist

Week 1: Enrollment & Identity

# Task Owner Docs Priority
1.1 Create EA enrollment / billing account Finance + Platform EA Architecture P0
1.2 Create/configure Entra ID tenant Platform Identity LZ P0
1.3 Create break-glass accounts (2) Platform Identity LZ P0
1.4 Configure emergency access procedure Platform Identity LZ P0
1.5 Create platform admin group Platform Identity LZ P0
1.6 Enable Security Defaults (temporary) Platform Identity LZ P0
1.7 Register GitHub OIDC app Platform GitHub Actions P0

Week 2: Management Groups & Platform Subscriptions

# Task Owner Docs Priority
2.1 Create management group hierarchy Platform EA Architecture P0
2.2 Create Management subscription Platform Management LZ P0
2.3 Create Connectivity subscription Platform Connectivity LZ P0
2.4 Create Identity subscription Platform Identity LZ P1
2.5 Deploy Terraform state storage Platform Terraform Guide P0
2.6 Configure OIDC federated credentials Platform GitHub Actions P0
2.7 Deploy CI/CD pipelines Platform GitHub Actions P0

Week 3: Connectivity & Management Baseline

# Task Owner Docs Priority
3.1 Deploy Hub VNet (primary region) Platform Connectivity LZ P0
3.2 Configure Azure DNS private zones Platform Connectivity LZ P0
3.3 Deploy Log Analytics workspace Platform Management LZ P0
3.4 Enable Defender for Cloud (Free tier) Platform Management LZ P0
3.5 Configure Activity Log diagnostic settings Platform Management LZ P0
3.6 Deploy baseline NSG rules Platform Connectivity LZ P0
3.7 Configure Azure Policy (audit mode) Platform Management LZ P1

Week 4: First Application Landing Zone

# Task Owner Docs Priority
4.1 Create first Landing Zone subscription Platform App LZ P0
4.2 Deploy spoke VNet Platform App LZ P0
4.3 Configure VNet peering Platform Connectivity LZ P0
4.4 Deploy baseline Key Vault Platform App LZ P0
4.5 Configure diagnostic settings Platform App LZ P0
4.6 Enable Application Insights Platform App LZ P1
4.7 Handoff to application team Platform P0

Day 1 Architecture

graph TB
    subgraph "Day 1 Scope"
        subgraph "Management Groups"
            ROOT[Company Root MG]
            PLATFORM[Platform MG]
            LZ[Landing Zones MG]
        end

        subgraph "Platform Subscriptions"
            MGMT[Management Sub]
            CONN[Connectivity Sub]
        end

        subgraph "Landing Zones"
            PROD1[Prod App 1 Sub]
        end

        subgraph "Management Sub Resources"
            LA[Log Analytics]
            MDC[Defender - Free]
        end

        subgraph "Connectivity Sub Resources"
            HUB[Hub VNet]
            DNS[Private DNS]
            NSG1[Hub NSG]
        end

        subgraph "App Sub Resources"
            SPOKE[Spoke VNet]
            KV[Key Vault]
            NSG2[App NSG]
        end
    end

    ROOT --> PLATFORM
    ROOT --> LZ
    PLATFORM --> MGMT
    PLATFORM --> CONN
    LZ --> PROD1

    MGMT --> LA
    MGMT --> MDC
    CONN --> HUB
    CONN --> DNS
    CONN --> NSG1
    PROD1 --> SPOKE
    PROD1 --> KV
    PROD1 --> NSG2

    SPOKE -.->|Peering| HUB

    style ROOT fill:#e1bee7
    style LA fill:#c8e6c9
    style HUB fill:#bbdefb
    style SPOKE fill:#fff9c4

Day 1 Cost Profile

Component SKU/Tier Est. Monthly Cost
Log Analytics Pay-as-you-go (5 GB/day free) $0 - $100
Defender for Cloud Free tier $0
Hub VNet Standard $5
Spoke VNet Standard $5
Key Vault Standard (< 10K operations) $5
Storage (Terraform state) LRS, hot $2
Day 1 Platform Total ~$20 - $120/mo

Day 2: Hardening (Weeks 5-12)

Goals

  • Implement advanced security controls
  • Enable compliance frameworks
  • Add high availability
  • Optimize costs and operations

Day 2 Checklist

Phase 2A: Advanced Identity (Weeks 5-6)

# Task Owner Docs Priority
2A.1 Disable Security Defaults Platform P0
2A.2 Deploy Conditional Access policies Platform Identity LZ P0
2A.3 Configure PIM for privileged roles Platform Identity LZ P0
2A.4 Configure PIM for Azure roles Platform Identity LZ P0
2A.5 Enable Access Reviews Platform Identity LZ P1
2A.6 Configure service principal governance Platform Identity LZ P1
2A.7 Document identity procedures Platform P1

Phase 2B: Advanced Networking (Weeks 5-7)

# Task Owner Docs Priority
2B.1 Deploy Hub VNet (secondary region) Platform Connectivity LZ P1
2B.2 Configure hub-to-hub peering Platform Connectivity LZ P1
2B.3 Deploy Azure Front Door Platform Connectivity LZ P1
2B.4 Configure WAF policies Platform Connectivity LZ P1
2B.5 Enable DDoS Protection (evaluate) Platform Connectivity LZ P2
2B.6 Deploy Azure Firewall (if required) Platform Connectivity LZ P2
2B.7 Configure Private Endpoints for PaaS Platform Connectivity LZ P1

Phase 2C: Security Hardening (Weeks 6-8)

# Task Owner Docs Priority
2C.1 Enable Defender paid plans Platform Management LZ P0
2C.2 Configure Defender auto-provisioning Platform Management LZ P1
2C.3 Deploy Microsoft Sentinel Platform Management LZ P1
2C.4 Configure Sentinel connectors Platform Management LZ P1
2C.5 Deploy Sentinel analytics rules Platform Management LZ P1
2C.6 Configure security alerts Platform Management LZ P0
2C.7 Enable vulnerability scanning Platform Management LZ P1

Phase 2D: Compliance & Governance (Weeks 8-10)

# Task Owner Docs Priority
2D.1 Enable Azure Policy Deny effects Platform Management LZ P0
2D.2 Configure SOC 2 compliance standard Platform Compliance P0
2D.3 Configure ISO 27001 compliance standard Platform Compliance P1
2D.4 Set up compliance dashboard Platform Compliance P1
2D.5 Configure evidence collection Platform Compliance P1
2D.6 Set up Cost Management budgets Platform Management LZ P0
2D.7 Configure anomaly alerts Platform Management LZ P1

Phase 2E: Optimization (Weeks 10-12)

# Task Owner Docs Priority
2E.1 Implement subscription vending automation Platform App LZ P1
2E.2 Create reusable Terraform modules Platform Terraform Guide P1
2E.3 Document onboarding process Platform App LZ P1
2E.4 Implement tagging governance Platform EA Architecture P1
2E.5 Review and right-size resources Platform P2
2E.6 Evaluate Reserved Instances Platform P2
2E.7 Document DR procedures Platform P1

Day 2 Architecture Additions

graph TB
    subgraph "Day 2 Additions"
        subgraph "Identity Hardening"
            CA[Conditional Access<br/>Policies]
            PIM[Privileged Identity<br/>Management]
            AR[Access Reviews]
        end

        subgraph "Advanced Networking"
            AFD[Azure Front Door<br/>+ WAF]
            HUB2[Hub VNet<br/>Secondary Region]
            PE[Private Endpoints]
        end

        subgraph "Security Operations"
            SENT[Microsoft Sentinel]
            MDCP[Defender Paid Plans]
            VA[Vulnerability<br/>Assessment]
        end

        subgraph "Compliance"
            SOC2[SOC 2 Dashboard]
            ISO[ISO 27001 Dashboard]
            EVID[Evidence Collection]
        end

        subgraph "Operations"
            VEND[Subscription<br/>Vending]
            COST[Cost Management<br/>+ Budgets]
        end
    end

    style CA fill:#e1bee7
    style AFD fill:#bbdefb
    style SENT fill:#ffcdd2
    style SOC2 fill:#c8e6c9

Day 2 Additional Cost Profile

Component SKU/Tier Est. Monthly Cost
Defender for Cloud Defender CSPM, Servers P2, etc. $200 - $500
Microsoft Sentinel Pay-as-you-go $100 - $300
Azure Front Door Premium + WAF $50 - $200
DDoS Protection Standard (if enabled) $2,944
Azure Firewall (if required) Standard $1,000
PIM Entra ID P2 (per user) $9/user/mo
Day 2 Platform Additions ~$400 - $5,000/mo

Note: DDoS Protection Standard has a fixed cost. Evaluate carefully vs. DDoS IP Protection per-IP model for startups.


Implementation Decision Tree

flowchart TD
    START[Start Implementation] --> Q1{MVP deadline<br/>< 4 weeks?}

    Q1 -->|Yes| D1[Day 1 Only<br/>Focus on Foundation]
    Q1 -->|No| Q2{SOC 2 / ISO 27001<br/>required for launch?}

    Q2 -->|Yes| D2A[Day 1 + Phase 2C + 2D<br/>Security & Compliance Focus]
    Q2 -->|No| Q3{Multi-region<br/>required?}

    Q3 -->|Yes| D2B[Day 1 + Phase 2B<br/>Networking Focus]
    Q3 -->|No| D1

    D1 --> LAUNCH1[Launch MVP]
    D2A --> LAUNCH2[Launch with Compliance]
    D2B --> LAUNCH3[Launch Multi-Region]

    LAUNCH1 --> ITER[Iterate with Day 2<br/>as needed]
    LAUNCH2 --> ITER
    LAUNCH3 --> ITER

Priority Definitions

Priority Definition Day 1 Expectation Day 2 Expectation
P0 Blocker for go-live Must complete Must complete
P1 Important, low risk to defer Best effort Should complete
P2 Nice to have Optional Best effort

Quick Reference: What Goes Where

Capability Day 1 Day 2
Break-glass accounts
Security Defaults (MFA) Replaced by CA
Conditional Access
PIM
Management Groups
Hub VNet (primary)
Hub VNet (secondary)
NSGs
Azure Firewall ✅ (if needed)
Azure Front Door
Private Endpoints
Log Analytics
Defender Free Upgraded
Defender Paid Plans
Microsoft Sentinel
Azure Policy (Audit)
Azure Policy (Deny)
SOC 2 / ISO 27001 Dashboard
Cost Management Budgets
Subscription Vending Manual Automated

Success Criteria

Day 1 Complete When:

  • [ ] All management groups created
  • [ ] Platform subscriptions provisioned
  • [ ] Hub VNet deployed and operational
  • [ ] CI/CD pipeline deploying infrastructure
  • [ ] First application team can deploy workloads
  • [ ] Break-glass accounts tested
  • [ ] Basic monitoring in place

Day 2 Complete When:

  • [ ] All Conditional Access policies active
  • [ ] PIM configured for all privileged roles
  • [ ] Defender paid plans enabled
  • [ ] Sentinel operational with analytics rules
  • [ ] Compliance dashboards showing status
  • [ ] Evidence collection automated
  • [ ] DR procedures documented and tested
  • [ ] Subscription vending automated

Document Index

# Document Description
00 README Architecture overview and index
01 Identity Landing Zone Entra ID, PIM, Conditional Access
02 Management Landing Zone Monitoring, security, governance
03 Connectivity Landing Zone Networking, DNS, Front Door
04 EA & Subscription Architecture Management groups, subscriptions
05 Terraform Implementation IaC modules and state management
06 GitHub Actions CI/CD OIDC and deployment pipelines
07 Application Landing Zone App team template
08 Compliance Baseline SOC 2, ISO 27001 mappings
09 Day 1/Day 2 Prioritization This document

Previous: 08 - Compliance Baseline | Home: README