Brownfield landing zone considerations

A brownfield deployment is an existing environment that requires modification to align to the Azure landing zone target architecture and best practices. When you need to resolve a brownfield deployment scenario, consider your existing Microsoft Azure environment as the place to start. This article summarizes guidance found elsewhere in the Cloud Adoption Framework Ready documentation For more information, see Introduction to the Cloud Adoption Framework Ready methodology.

Resource organization

In a brownfield environment, you've already established your Azure environment. But it's never too late to apply proven resource organization principles now and moving forward. Consider implementing any of the following suggestions:

  • If your current environment doesn't use management groups, consider them. Management groups are key to managing policies, access, and compliance across subscriptions at scale. Management groups help guide your implementation.
  • If your current environment uses management groups, consider the guidance in management groups when evaluating your implementation.
  • If you have existing subscriptions in your current environment, consider the guidance in subscriptions to see if you're using them effectively. Subscriptions act as policy and management boundaries and are scale units.
  • If you have existing resources in your current environment, consider using the guidance in naming and tagging to influence your tagging strategy and your naming conventions going forward.
  • Azure Policy is useful in establishing and enforcing consistency regarding taxonomic tags.

Security

To refine your existing Azure environment's security posture regarding authentication, authorization, and accounting is an ongoing, iterative process. Consider implementing the following recommendations:

Governance

Like Azure security, Azure governance isn't a "one and done" proposition. Rather, it's an ever-evolving process of standardization and compliance enforcement. Consider implementing the following controls:

Networking

It's true that refactoring an already established Azure virtual network (VNet) infrastructure can be a heavy lift for many businesses. That said, consider incorporating the following guidance into your network design, implementation, and maintenance efforts:

  • Review our best practices for planning, deploying, and maintaining Azure VNet hub and spoke topologies
  • Consider Azure Virtual Network Manager (Preview) to centralize network security group (NSG) security rules across multiple VNets
  • Azure Virtual WAN unifies networking, security, and routing to help businesses build hybrid cloud architectures safer and quicker
  • Access Azure data services privately with Azure Private Link. The Private Link service ensures your users and applications communicate with key Azure services by using the Azure backbone network and private IP addresses instead of over the public Internet

Next steps

Now that you have an overview of Azure brownfield environment considerations, here are some related resources to review: