Azure landing zone Documentation
Home GitHub Issue Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Extra Policies and Information

This document describes additional ALZ custom policy definitions and initiatives that are not assigned by default in ALZ, but are provided as they may assist some consumers of ALZ in specific scenarios where they can assign these additional policies to help them meet their objectives. We also provide guidance on how to handle certain situations as some of the policies require additional considerations prior to assigning.

For the complete list of Azure Landing Zones custom policies, please use AzAdvertizer, and change type to ALZ.

Additional ALZ Custom Policies for consideration

ALZ provides several additional policies that are not assigned by default but that can be used for specific scenarios should they be required.

PolicyDescriptionNotes
Audit-Tags-MandatoryAudit for mandatory tags on resourcesAudits resources to ensure they have required tags based on tag array. Does not apply to resource groups.
Audit-Tags-Mandatory-RGAudit for mandatory tags on resource groupsAudits resource groups to ensure they have required tags based on tag array.
Deny-Appgw-Without-WafApplication Gateway should be deployed with WAF enabledUse to ensure Application Gateways are deployed with Web Application Firewall enabled
Deny-Private-Dns-ZonesDeny the creation of private DNSFor organizations that centralize core networking functions, use this policy to prevent the creation of additional Private DNS Zones under specific scopes
Deny-Subnet-Without-PenpSubnets without Private Endpoint Network Policies enabled should be deniedThis policy denies the creation of a subnet without Private Endpoint Network Policies enabled. This policy is intended for ‘workload’ subnets, not ‘central infrastructure’ (aka, ‘hub’) subnets.
Deny-Subnet-Without-UdrSubnets should have a User Defined RouteShould you require all network traffic be directed to an appliance for inspection, you can use this policy to ensure UDR is associated with a subnet
Deny-Udr-With-Specific-NexthopUser Defined Routes with ‘Next Hop Type’ set to ‘Internet’ or ‘VirtualNetworkGateway’ should be deniedRefining Deny-Subnet-Without-Udr you can ensure non-compliant UDRs are denied (e.g., bypassing a firewall)
Deny-Vnet-PeeringDeny vNet peeringUse to prevent vNet peering under specific scopes (e.g., Sandbox management group)
Deny-Vnet-Peering-To-Non-Approved-VnetsDeny vNet peering to non-approved vNetsUse to control vNet peering under specific scopes, like in the Corp management group, only allow peering to the hub vNet.
Deploy-BudgetDeploy a default budget on all subscriptions under the assigned scopeSet a default budget for a specific scope, like setting a $500 budget on all subscriptions in the Sandbox management group
Deploy-Sql-Security_20240529Deploy-SQL Database built-in SQL security configurationDeploy auditing, Alert, TDE and SQL vulnerability to SQL Databases when it not exist in the deployment
Deploy-Vnet-HubspokeDeploy Virtual Network with peering to the hubAutomatically peer a new virtual network with the hub, for example, in the Corp management group
Deploy-Windows-DomainJoinDeploy Windows Domain Join Extension with Key Vault configurationWindows Domain Join a virtual machine using domain name and password stored in Key Vault as secrets

2. ALZ, Workload Specific Compliance (WSC) and Regulated Industries

The Azure Landing Zone is designed to be a flexible and scalable solution that can be used by organizations in a variety of industries. However, organizations in regulated industries (FSI, Healthcare, etc.) may need to take additional steps to ensure compliance with industry-specific regulations. These regulations often commonly have a consistent set of controls to cover, like CMK, locking down public endpoints, TLS version enforcement, logging etc.

To support the additional control requirements of these industries, we’re providing the following additional initiatives that enhance the security and compliance posture of the Azure Landing Zone:

Please Note: These are meant to help customers across all regulated industries (FSI, Healthcare, etc.) and not be aligned to specific regulatory controls, as there are already policy initiatives available for these via Azure Policy & Microsoft Defender for Cloud

Note
The below table is scrollable. On smaller screens, please scroll horizontally to view all columns.
WSC OptionAssignment Scope (MG)IDAssignment NameDefinition NameTypeCustom/BuiltinDescriptionEffect
Customer Managed KeysVariable *Enforce-Encryption-CMK_20250218Enforce recommended guardrails for Customer Managed KeysDeny or Audit resources without Encryption with a customer-managed key (CMK)InitiativeCustomDeny or Audit resources without Encryption with a customer-managed key (CMK)Audit
AI Bot ServiceVariable *Enforce-Guardrails-BotServiceEnforce recommended guardrails for Bot ServiceEnforce recommended guardrails for Bot ServiceInitiativeCustomThis policy initiative is a group of policies that ensures Bot Service is compliant per regulated Landing Zones.Audit
AI SearchVariable *Enforce-Guardrails-CognitiveServicesEnforce recommended guardrails for Cognitive ServicesEnforce recommended guardrails for Cognitive ServicesInitiativeCustomThis policy initiative is a group of policies that ensures Cognitive Services is compliant per regulated Landing Zones.Audit
Machine LearningVariable *Enforce-Guardrails-MachineLearningEnforce recommended guardrails for Machine LearningEnforce recommended guardrails for Machine LearningInitiativeCustomThis policy initiative is a group of policies that ensures Machine Learning is compliant per regulated Landing Zones.Audit
Azure OpenAIVariable *Enforce-Guardrails-OpenAIEnforce recommended guardrails for OpenAIEnforce recommended guardrails for Open AI (Cognitive Service)InitiativeCustomThis policy initiative is a group of policies that ensures Open AI (Cognitive Service) is compliant per regulated Landing Zones.Audit
Data ExplorerVariable *Enforce-Guardrails-DataExplorerEnforce recommended guardrails for Data ExplorerEnforce recommended guardrails for Data ExplorerInitiativeCustomThis policy initiative is a group of policies that ensures Data Explorer is compliant per regulated Landing Zones.Audit
Data FactoryVariable *Enforce-Guardrails-DataFactoryEnforce recommended guardrails for Data FactoryEnforce recommended guardrails for Data FactoryInitiativeCustomThis policy initiative is a group of policies that ensures Data Factory is compliant per regulated Landing Zones.Audit
SynapseVariable *Enforce-Guardrails-SynapseEnforce recommended guardrails for SynapseEnforce recommended guardrails for Synapse workspacesInitiativeCustomThis policy initiative is a group of policies that ensures Synapse workspaces is compliant per regulated Landing Zones.Audit
ComputeVariable *Enforce-Guardrails-ComputeEnforce recommended guardrails for ComputeEnforce recommended guardrails for ComputeInitiativeCustomThis policy initiative is a group of policies that ensures Compute is compliant per regulated Landing Zones.Audit
Virtual DesktopVariable *Enforce-Guardrails-VirtualDesktopEnforce recommended guardrails for Virtual DesktopEnforce recommended guardrails for Virtual DesktopInitiativeCustomThis policy initiative is a group of policies that ensures Virtual Desktop is compliant per regulated Landing Zones.Audit
Container AppsVariable *Enforce-Guardrails-ContainerAppsEnforce recommended guardrails for Container AppsEnforce recommended guardrails for Container AppsInitiativeCustomThis policy initiative is a group of policies that ensures Container Apps is compliant per regulated Landing Zones.Audit
Container InstanceVariable *Enforce-Guardrails-ContainerInstanceEnforce recommended guardrails for Container InstanceEnforce recommended guardrails for Container InstanceInitiativeCustomThis policy initiative is a group of policies that ensures Container Apps is compliant per regulated Landing Zones.Audit
Container RegistryVariable *Enforce-Guardrails-ContainerRegistryEnforce recommended guardrails for Container RegistryEnforce recommended guardrails for Container RegistryInitiativeCustomThis policy initiative is a group of policies that ensures Container Apps is compliant per regulated Landing Zones.Audit
KubernetesVariable *Enforce-Guardrails-KubernetesEnforce recommended guardrails for KubernetesEnforce recommended guardrails for KubernetesInitiativeCustomThis policy initiative is a group of policies that ensures Kubernetes is compliant per regulated Landing Zones.Audit
Cosmos DBVariable *Enforce-Guardrails-CosmosDbEnforce recommended guardrails for Cosmos DBEnforce recommended guardrails for Cosmos DBInitiativeCustomThis policy initiative is a group of policies that ensures Cosmos DB is compliant per regulated Landing Zones.Audit
MySQLVariable *Enforce-Guardrails-MySQLEnforce recommended guardrails for MySQLEnforce recommended guardrails for MySQLInitiativeCustomThis policy initiative is a group of policies that ensures MySQL is compliant per regulated Landing Zones.Audit
PostgreSQLVariable *Enforce-Guardrails-PostgreSQLEnforce recommended guardrails for PostgreSQLEnforce recommended guardrails for PostgreSQLInitiativeCustomThis policy initiative is a group of policies that ensures PostgreSQL is compliant per regulated Landing Zones.Audit
SQLVariable *Enforce-Guardrails-SQLEnforce recommended guardrails for SQLEnforce recommended guardrails for SQL and SQL Managed InstanceInitiativeCustomThis policy initiative is a group of policies that ensures SQL and SQL Managed Instance is compliant per regulated Landing Zones.Audit
Event GridVariable *Enforce-Guardrails-EventGridEnforce recommended guardrails for Event GridEnforce recommended guardrails for Event GridInitiativeCustomThis policy initiative is a group of policies that ensures Event Grid is compliant per regulated Landing Zones.Audit
Event HubVariable *Enforce-Guardrails-EventHubEnforce recommended guardrails for Event HubEnforce recommended guardrails for Event HubInitiativeCustomThis policy initiative is a group of policies that ensures Event Hub is compliant per regulated Landing Zones.Audit
Service BusVariable *Enforce-Guardrails-ServiceBusEnforce recommended guardrails for Service BusEnforce recommended guardrails for Service BusInitiativeCustomThis policy initiative is a group of policies that ensures Service Bus is compliant per regulated Landing Zones.Audit
Automation AccountsVariable *Enforce-Guardrails-AutomationEnforce recommended guardrails for Automation AccountsEnforce recommended guardrails for Automation AccountInitiativeCustomThis policy initiative is a group of policies that ensures Automation Account is compliant per regulated Landing Zones.Audit
Key Vault - SupplementaryVariable *Enforce-Guardrails-KeyVault-SupEnforce recommended guardrails for Key Vault SupplementaryEnforce additional recommended guardrails for Key VaultInitiativeCustomThis policy initiative is a group of policies that ensures Key Vault is compliant per regulated Landing Zones.Audit
StorageVariable *Enforce-Guardrails-StorageEnforce recommended guardrails for StorageEnforce recommended guardrails for Storage AccountInitiativeCustomThis policy initiative is a group of policies that ensures Storage is compliant per regulated Landing Zones.Audit
API ManagementVariable *Enforce-Guardrails-APIMEnforce recommended guardrails for API ManagementEnforce recommended guardrails for API ManagementInitiativeCustomThis policy initiative is a group of policies that ensures API Management is compliant per regulated Landing Zones.Audit
App ServicesVariable *Enforce-Guardrails-AppServicesEnforce recommended guardrails for App ServicesEnforce recommended guardrails for App ServiceInitiativeCustomThis policy initiative is a group of policies that ensures App Service is compliant per regulated Landing Zones.Audit