
Enterprises treat all three as tooling problems. They buy dashboards.
They chase compliance scores.
They write more documentation. None of that stops drift—because drift is not a knowledge problem. It’s a decision-distribution problem. Azure decision-making is inherently distributed. Portals, pipelines, service principals, managed identities—all generating thousands of micro-decisions per day: regions, SKUs, exposure, identity, logging, encryption, tags. If constraints aren’t enforced, you don’t have governance. You have opinions. Even good teams create chaos at scale. People rotate. Contractors appear. Deadlines compress. Local optimization wins. The platform becomes a museum of half-enforced intent. That’s why platform teams turn into ticket queues—not due to incompetence, but because the system is asking humans to act as the authorization engine for the entire enterprise. Audit season exposes the truth. Public access is “blocked,” except where it isn’t.
Secure Score looks “fine,” because inconvenient findings were waived.
Logging exists—just not consistently.
Costs can’t be allocated because tags were optional. Incidents are worse. Post-incident reviews don’t say “we lacked policy.”
They say “we didn’t realize this path existed.” That path exists because drift created it. Autonomy does not scale without boundaries.
Exceptions are not special cases—they are permanent forks unless designed to expire. The only sustainable fix is governance by design. Not meetings.
Not documentation.
Design. Governance by Design: Deterministic Guardrails vs Probabilistic Security Governance by design means the platform enforces intent—not people. In architectural terms, Azure governance is an authorization and compliance compiler sitting on top of the Azure control plane. Every action becomes a request. The only thing that matters is whether the platform accepts it. Most organizations answer that question socially: tickets, reviews, tribal knowledge. That model collapses under scale. The alternative is determinism. Deterministic governance doesn’t mean perfect—it means predictable. The same request yields the same outcome every time, regardless of who is deploying or how urgent it feels. That’s the difference between governance and governance theater. A deterministic guardrail looks like this:
Probabilistic security looks like:
Probabilistic systems feel productive because they don’t block work. They just move friction downstream—into incidents, audits, and cost recovery with interest. The goal is not centralized control.
The goal is safe autonomy. Azure doesn’t understand org charts. It understands rules. So the real design question is simple and brutal: What must always be true, and at what scope? Scope is where determinism is won or lost. Get it wrong, and you create either gridlock or drift. Which is why governance always starts with structure. Landing Zones and Management Groups: Where Scale Either Works or Doesn’t An enterprise landing zone is not a template.
It’s the set of preconditions that make every future workload boring. Identity boundaries.
Network boundaries.
Logging destinations.
Policy inheritance.
Ownership models. Most organizations do this backwards—migrating first, governing later. That’s how you build a city and argue about roads after people move in. The hierarchy is the enforcement surface. Azure Policy inherits down it.
RBAC inherits down it. If the hierarchy is messy, governance becomes archaeological work. The mistake is ornamental depth—management groups that mirror org charts instead of intent. Depth multiplies ambiguity. Breadth enables delegation. The governing principle is separation by risk intent:
A landing zone is a contract. If a subscription lives here, it inherits these rules. That contract is what makes self-service possible. If moving a subscription doesn’t materially change the rules, the hierarchy isn’t doing work—it’s decoration. And decoration always becomes entropy. Subscriptions: The Real Boundary Subscriptions are not workload containers. They are:
The anti-patterns are predictable:
A proper subscription strategy answers four questions before creation:
If you can’t answer those, don’t create the subscription. Because you’re not adding capacity—you’re creating future incident scope. Identity & RBAC: Assign Intent, Not People Identity is the fastest way to destroy good boundaries. RBAC fails when it models humans instead of design. Humans change. Intent doesn’t. Roles must be assigned to groups, scoped deliberately, and aligned to purpose. Contributor is not “developer.”
Owner is not convenience. Owner is a breach multiplier. Separation of duties is non-negotiable:
Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-fm-modern-work-security-and-productivity-with-microsoft-365–6704921/support.