Azure landing zone for SCCA-compliant organizations.
Перейти к файлу
Brooke Steele b7010237f7
MLZ VPN Gateway Addon (#1130)
* vpn gateway and connection added

* updates

* moved to solution model

* cleaned up with uidefinition

* added short readme

* readme added

* updated readme.md

* removed sh

* vnet peerings updates added

* peering property update ordering complete

* various updates

* updates

* works no firewall rules yet

* update

* update

* update

* documentation updates

* update

* final

* GitHub Action: Build Bicep to JSON

* removed solution.parameters.json

* updated mlz from main

* GitHub Action: Build Bicep to JSON

* GitHub Action: Build Bicep to JSON

---------

Co-authored-by: brsteel@microsoft.com <brsteel@microsoft.com>
Co-authored-by: github-actions <github-actions@github.com>
Co-authored-by: Jason Masten <jamasten@microsoft.com>
2024-11-19 12:10:11 -05:00
.azure-devops Removed terraform (#1081) 2024-08-28 17:32:57 -04:00
.github Bump github/super-linter from 6 to 7 (#1084) 2024-08-30 08:50:36 -04:00
.vscode Removed terraform (#1081) 2024-08-28 17:32:57 -04:00
docs Fixed conditions in AVD Add-On & missing params in Tier3 for storage (#1123) 2024-11-06 13:09:44 -05:00
src/bicep MLZ VPN Gateway Addon (#1130) 2024-11-19 12:10:11 -05:00
.gitattributes
.gitignore Removed terraform (#1081) 2024-08-28 17:32:57 -04:00
CODE_OF_CONDUCT.md
CONTRIBUTING.md
LICENSE
NOTICE
README.md Updated deployment guides (#1107) 2024-10-15 14:35:44 -04:00
SECURITY.md
SUPPORT.md

README.md

Mission Landing Zone

Home | Design | Add-Ons | Resources

Mission Landing Zone is a highly opinionated infrastructure as code (IaC) template. IT oversight organizations can use the template to create a cloud management system to deploy Azure environments for their workloads and teams. The solution addresses a narrowly scoped, specific need for a Secure Cloud Computing Architecture (SCCA) compliant hub and spoke infrastructure.

  • Designed for US Government mission customers
  • Implements controls following Microsoft's SACA and zero trust guidance
  • Deployable in Azure Commercial, Azure Government, Azure Government Secret, and Azure Government Top Secret clouds
  • A simple solution with low configuration and narrow scope
  • Written as Bicep templates

Mission Landing Zone is the right solution when:

  • A simple, secure, and scalable hub and spoke infrastructure is needed.
  • A central IT team is administering cloud resources on behalf of other teams and workloads.
  • There is a need to implement SCCA with zero trust.
  • Hosting any workload requiring a secure environment, for example: data warehousing, AI/ML, and containerized applications.

Design goals include:

  • A simple, minimal set of code that is easy to configure
  • Good defaults that allow experimentation and testing in a single subscription
  • Deployment via command line or with a user interface

Our intent is to enable IT Admins to use this software to:

  • Test and evaluate the landing zone using a single Azure subscription
  • Develop a known good configuration that can be used for production with multiple Azure subscriptions
  • Customize the deployment configuration to suit specific needs
  • Deploy multiple customer workloads in production.

Deployment Options

Mission Landing Zone can be deployed from the Azure Portal, or with Azure command line tools. Choose the desired option below for detailed deployment documentation.

Method Supported Clouds
Azure Portal Azure Commercial, Azure Government
Template Spec Azure Commercial, Azure Government, Azure Government Secret, & Azure Government Top Secret
Command Line Tools Azure Commercial, Azure Government, Azure Government Secret, & Azure Government Top Secret

[!NOTE]
Be sure to check out our add-ons to accelerate workload deployments.