Skip to content
forked from Azure/missionlz

Azure landing zone for SCCA-compliant organizations.

License

Notifications You must be signed in to change notification settings

lebarbos/missionlz

 
 

Repository files navigation

Mission LZ

Mission Landing Zone is a highly opinionated template which IT oversight organizations can use to create a cloud management system to deploy Azure environments for their teams. It addresses a narrowly scoped, specific need for an SCCA compliant hub and spoke infrastructure.

Mission LZ is:

  • Designed for US Gov mission customers​
  • Implements SCCA requirements following Microsoft's SACA implementation guidance
  • Deployable in commercial, government, and air-gapped Azure clouds
  • A narrow scope for a specific common need​
  • A simple solution with low configuration​
  • Written in Terraform and Bicep

Mission Landing Zone is the right solution when:

  • A simple, secure, and scalable hub and spoke infrastructure is needed
  • Various teams need separate, secure cloud environments administered by a central IT team
  • There is a need to implement SCCA
  • Hosting any workload requiring a secure environment, for example: data warehousing, AI/ML, and containerized applications

Design goals include:

  • A simple, minimal set of code that is easy to configure
  • Good defaults that allow experimentation and testing in a single subscription
  • Deployment via command line or with a user interface
  • Uses Azure PaaS products

Our intent is to enable IT Admins to use this software to:

  • Test and evaluate the landing zone using a single Azure subscription
  • Develop a known good configuration that can be used for production with multiple Azure subscriptions
  • Optionally, customize the Terraform deployment configuration to suit specific needs
  • Deploy multiple customer workloads in production

Quickstart

To get up and running quickly execute the following code from Azure Cloud Shell, or from wherever you have Azure CLI installed.

Don't have Azure CLI? Here's how to get started with Azure Cloud Shell in your browser: https://docs.microsoft.com/en-us/azure/cloud-shell/overview

git clone https://github.com/Azure/missionlz.git
az deployment sub create \
  --name myMlzDeployment \
  --location eastus \
  --template-file ./missionlz/src/bicep/mlz.bicep

Scope

Mission LZ has the following scope:

  • Hub and spoke networking intended to comply with SCCA controls
  • Remote access
  • Shared services, i.e., services available to all workloads via the networking hub
  • Ability to create multiple workloads or team subscriptions
  • Compatibility with SCCA compliance (and other compliance frameworks)
  • Security using standard Azure tools with sensible defaults

Mission LZ Scope

Networking

Networking is set up in a hub and spoke design, separated by tiers: T0 (Identity and Authorization), T1 (Infrastructure Operations), T2 (DevSecOps and Shared Services), and multiple T3s (Workloads). Security can be configured to allow separation of duties between all tiers. Most customers will deploy each tier to a separate Azure subscription, but multiple subscriptions are not required.

Mission LZ Networking

Firewall

All network traffic is directed through the firewall residing in the Network Hub resource group in this architecture. The firewall is configured as the default route for all the T0 (Identity and Authorization) through T3(n) (Team Environments) resource groups as follows:

Name Address prefix Next hop type Next hop IP address
default_route 0.0.0.0/0 Virtual Appliance 10.0.100.4

The default firewall configured for MLZ is Azure Firewall Premium for both Azure Commercial and Azure Government to allow for enhanced security posturing.
Presently, there are two firewall rules configured to ensure access to the Azure Portal and to facilitate interactive logon via PowerShell and Azure CLI, all other traffic is restricted by default. Below are the collection of rules configured for Azure Commercial and Azure Government clouds:

Rule Collection Priority Rule Collection Name Rule name Source Port Protocol
100 AllowAzureCloud AzureCloud * * Any
110 AzureAuth msftauth * Https:443 aadcdn.msftauth.net, aadcdn.msauth.net

Getting Started using Mission LZ

See our Getting Started Guide in the docs.

Product Roadmap

See the Projects page for the release timeline and feature areas.

Here's what the repo consists of as of May 2021:

Mission LZ as of April 2021

Contributing

This project welcomes contributions and suggestions. See our Contributing Guide for details.

Feedback, Support, and How to Contact Us

Please see the Support and Feedback Guide. To report a security issue please see our security guidance.

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.

About

Azure landing zone for SCCA-compliant organizations.

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Bicep 48.0%
  • HCL 47.9%
  • Dockerfile 2.4%
  • Shell 1.7%