ποΈ Designing Management Group Hierarchy
Where Governance Actually Starts
Most people think Management Groups are just:
βfolders to organize subscriptionsβ
That thinking is wrong.
π₯ What Management Groups Really Are
Management Groups define governance boundaries β not structure for convenience
They control:
- Policy inheritance
- Access control (RBAC)
- Compliance enforcement
- Operational separation
β The Wrong Way to Design MGs
1. Designing based on teams
1) Finance
2) HR
3) Retail Banking
4) etc..
π Problem:
- teams change
- org structures evolve
- governance breaks
2. Designing based on applications
App1
App2
App3
π Problem:
- not scalable
- no policy grouping
- no governance value
β The Right Way
Design based on:
Control boundaries that will remain stable over time
π§ The 3 Core Dimensions You Must Think In
Before drawing anything, answer:
1. Governance & Policy Boundaries
- Where do policies differ?
- Where do controls change?
Example:
- PCI vs Non-PCI
- Regulated vs Non-regulated
2. Platform vs Workloads
Separate:
- Platform (shared services)
- Landing Zones (applications)
π This is non-negotiable in enterprise design
3. Lifecycle & Risk Segmentation
- Production vs Non-production
- Sandbox vs Controlled environments
- Quarantine / Decommission
π¦ Realistic Enterprise Structure
Hereβs a practical starting point:
Tenant Root
β
βββ Platform
β βββ Identity
β βββ Connectivity
β βββ Management-Security
β
βββ Landing Zones
β βββ Regulated
β β βββ PCI
β β βββ GDPR
β β βββ Core-Banking
β β
β βββ Non-Regulated
β β βββ Production
β β βββ Non-Production
β β
β βββ Sandbox
β
βββ Transitional
β βββ Quarantine
β βββ Decommissioning
π Why This Structure Works
Platform is isolated
- Central ownership
- High control
- No workload noise
Landing Zones are structured by risk
- Regulated workloads inherit stricter policies
- Non-regulated get more flexibility
Sandbox is isolated
- innovation allowed
- risk contained
Transitional zones exist
- handle real-world mess
- not everything is clean
β οΈ Key Design Decisions You Must Make
Decision 1: Where do policies differ?
π This defines your MG split
Decision 2: What is centrally controlled?
π Platform vs workload separation
Decision 3: Where do you expect exceptions?
π Plan for:
- sandbox
- quarantine
- temporary states
π₯ Real-World Mistake
Most teams do this:
βLetβs copy Microsoftβs reference architecture exactlyβ
Problem:
- Itβs generic
- Your bank is not generic
- Your constraints are different
π§ Architect Thinking
You donβt ask:
βWhat is the correct MG structure?β
You ask:
βWhere do I need different control behavior?β
π Example (Important)
If PCI needs:
- no public IP
- restricted regions
- strict logging
π It must be a separate MG
If Dev vs Prod:
- same policies
- different access
π Donβt create MG β use subscription/RBAC
π‘ One-Line Rule
Create a new Management Group only when policy or governance needs to change significantly
Where Most People Go Wrong
- Too many MGs β complexity
- Too few MGs β no control
Now that MG structure is clear, the next logical step is:
π Subscription Design Strategy
Because:
MG defines governance
Subscription defines ownership, cost, and deployment boundary
| β¬ Back to Series Home | β¬ Back to: Why Landing Zones Fail | Next: Subscription Design β‘ |