Skip to main content

Zero Trust Azure Landing Zone

Elkana Lang'at
Author
Elkana Lang’at
Specializing in cloud infrastructure security, compliance frameworks, and secure DevOps practices. Passionate about building resilient systems and automating security at scale.

Overview
#

Architected and implemented a Zero Trust network model for an Azure enterprise landing zone, replacing traditional perimeter-based security. The solution enforces “never trust, always verify” principles with identity-centric access controls, microsegmentation, and continuous monitoring across all Azure workloads.

Problem
#

Legacy security model created significant vulnerabilities:

  • Implicit Trust: Once inside the network, lateral movement was unrestricted
  • Broad Network Access: Flat network design allowed east-west traffic between all resources
  • Static Credentials: Long-lived service principal secrets with excessive permissions
  • No Visibility: Limited logging of internal network flows
  • Compliance Risk: Unable to demonstrate data segmentation for PCI-DSS requirements

Attack surface was unacceptably large, with potential for complete environment compromise from a single breach.

Solution
#

Implemented a comprehensive Zero Trust architecture across five layers:

Architecture
#

Network Segmentation:

  • Hub-and-spoke topology with Azure Virtual WAN
  • Dedicated spoke VNets per workload tier (web, app, data)
  • Private endpoints for all PaaS services (Storage, SQL, Key Vault)
  • Azure Firewall in hub for centralized policy enforcement
  • Network Security Groups (NSGs) with explicit deny-by-default rules

Identity & Access:

  • Azure AD Conditional Access policies requiring MFA + compliant devices
  • Privileged Identity Management (PIM) for just-in-time admin access
  • Managed identities replacing all service principal secrets
  • Application Gateway with Azure AD authentication
  • API Management with OAuth 2.0/OIDC for inter-service communication

Data Protection:

  • Azure Information Protection labels and encryption
  • Customer-managed keys in Azure Key Vault
  • SQL Transparent Data Encryption (TDE) with HSM backing
  • Storage accounts with private endpoints only
  • DLP policies preventing data exfiltration

Threat Detection:

  • Azure Sentinel SIEM with custom analytics rules
  • Microsoft Defender for Cloud (all workload types)
  • Network flow logs to Log Analytics
  • Anomaly detection for unusual access patterns
  • Automated playbooks for incident response

Data Flow:

  1. User authenticates via Azure AD with MFA
  2. Conditional Access evaluates device compliance + risk score
  3. Application Gateway validates OAuth token
  4. Request routed through Azure Firewall with L7 inspection
  5. NSGs enforce microsegmentation at subnet level
  6. Application uses managed identity to access PaaS services
  7. All traffic logged to Sentinel for analysis
  8. Automated alerts trigger for policy violations

Security Controls
#

IAM & Access:

  • Zero standing admin privileges (PIM time-bound activation)
  • Azure AD identity governance with access reviews
  • Service principal elimination (100% managed identities)
  • Break-glass emergency accounts in secure vault
  • Network Contributor role removed from all users

Logging & Monitoring:

  • All NSG flow logs to Log Analytics (90-day retention)
  • Azure Firewall logs with threat intelligence
  • Sentinel ingesting 20+ data sources
  • Watchlists for known malicious IPs/domains
  • Custom workbooks showing Zero Trust posture

Network:

  • Hub-spoke with forced tunneling to firewall
  • No public IPs on application VMs
  • Private Link for all egress to Azure services
  • Application Gateway with WAF (OWASP 3.2)
  • DDoS Protection Standard on all public IPs

Secrets:

  • Key Vault with RBAC + private endpoint
  • Soft delete + purge protection enabled
  • Automated secret rotation for certificates
  • HSM-backed keys for production workloads

CI/CD:

  • Azure DevOps with branch policies
  • Terraform scanning with Checkov
  • NSG rule validation before deployment
  • Blue-green deployments for zero downtime

Monitoring:

  • Real-time alerts for lateral movement attempts
  • Dashboard showing traffic flows by trust zone
  • Compliance score tracked in Defender for Cloud
  • Monthly reports on policy enforcement effectiveness

Results
#

Security Improvements:

  • Zero lateral movement incidents (previously 3-5/month)
  • 100% of traffic now explicitly authorized (example metric)
  • 85% reduction in attack surface from network segmentation
  • 15-minute average PIM activation time (down from permanent admin rights)
  • PCI-DSS certification achieved with zero findings on network isolation
  • ✅ 99.9% uptime maintained during migration

Operational Metrics:

  • 2,500+ NSG rules deployed across environment
  • 300+ managed identities created (zero service principals)
  • 50+ TB of logs analyzed monthly by Sentinel
  • 12-second average authentication time (including MFA)

Lessons Learned
#

What Worked Well:

  • Phased rollout per application tier reduced risk
  • Early stakeholder engagement secured executive support
  • Managed identities simplified operations dramatically
  • Automated testing caught misconfigurations before production

Challenges:

  • Legacy applications required proxy layer for modern authentication
  • NSG rule explosion needed automation for maintainability
  • Initial Sentinel tuning generated false positive alerts
  • Cost optimization required for Log Analytics ingestion

Would Do Differently:

  • Implement network topology earlier to avoid refactoring
  • Build cost monitoring dashboard from day one
  • Create more comprehensive runbooks for operations team
  • Start smaller with pilot application before full rollout

Tech Stack
#

  • Cloud: Microsoft Azure (Virtual Network, Firewall, Application Gateway, AD, Key Vault, Sentinel, Defender)
  • IaC: Terraform, Azure Bicep
  • Identity: Azure AD, Conditional Access, PIM, Managed Identities
  • Monitoring: Azure Monitor, Log Analytics, Workbooks, Sentinel
  • Security: Azure Policy, NSGs, Private Link, DDoS Protection
  • Automation: Azure DevOps, PowerShell, Azure CLI

Links#