Before you touch Azure, you need a clear, shared picture of what the landing zone must enable for the merged organization.
Key questions to answer with IT, security, and business leaders:
What must be integrated in the first 90–180 days?
What is the integration model?
What is the risk posture?
What is the Azure maturity level?
Output: a short “Merger Cloud Integration Charter” that defines:
This charter steers your landing zone design decisions and prevents scope creep later.
Azure landing zones are Microsoft’s recommended blueprint for building a secure, scalable, well‑governed Azure platform. For a merger, they give you a standard, repeatable foundation that both companies can adopt.
Core concepts from the Cloud Adoption Framework:
Platform landing zone (PLZ): The shared platform (“hub”) for identity, connectivity, and management services that all application landing zones depend on.
Application landing zones: The subscriptions or environments where workloads actually live, segmented by business unit, environment (dev/test/prod), or regulatory boundary.
Design areas (high‑level):
Microsoft’s design areas guidance gives you a checklist of topics to cover before deployment. In a merger, you use those same areas but add a “dual estate” lens: how each design choice affects both legacy environments and the path to convergence.
Example: If Company A has a flat subscription model and Company B has strict segregation by business unit, your new management group design needs to support both during transition.
Microsoft defines several ways to deploy and manage the platform landing zone. Your merger context and skills determine which to use.
From the “Platform landing zone implementation options” guidance:
Infrastructure‑as‑Code (IaC) approach – recommended
Portal‑based approach
Why IaC is strongly preferred:
Use this quick decision guide:
Choose Terraform AVM + IaC accelerator if:
Choose Bicep AVM + IaC accelerator if:
Choose portal accelerator only if:
For a merger integration program, it is almost always worth investing in IaC up front because you will be iterating the platform continuously as you onboard business units and rationalize services.
Microsoft’s IaC accelerator for platform landing zones follows clear phases that map well to a merger integration roadmap.
Key planning tasks based on the implementation‑options article:
Select:
Decide CI/CD strategy:
Define environments:
Map responsibilities:
In a merger, add:
The implementation‑options article describes Phase 1 as configuring credentials and subscriptions required for deployment. Tasks typically include:
Establishing:
For mergers, you also need:
Subscription rationalization:
The accelerator uses a PowerShell module to bootstrap the Azure environment and version control system.
Bootstrapping typically:
This is where you:
In this phase, you customize the IaC to reflect your organization’s requirements and trigger pipelines to deploy the platform landing zone.
Merger-specific considerations:
For example, one org enforces private endpoints everywhere, the other has a more relaxed stance. Decide the target policy and codify it in Azure Policy initiatives assigned at the management‑group scope.
Central Log Analytics workspaces, Azure Firewall or third‑party NVA, Azure Bastion, DNS zones, Key Vaults, and identity bridges that will be used to connect hybrid estates.
Use feature branches to test new policies or network designs in a non‑prod platform subscription before promoting to prod.
Your management group structure is the backbone of governance and will heavily influence how cleanly you can integrate two IT estates.
A common CAF-aligned structure looks like:
You then assign policy sets at each level:
You can structure landing‑zones to support both orgs during transition:
Option A: Separate trees under a single Landing‑Zones group
Option B: Straight to converged by business domain
Either way, ensure:
Identity is often the most complex part of a merger, and your landing zone must accommodate hybrid identity reality.
Key decisions:
Single Entra ID tenant vs. long-term multi‑tenant coexistence.
How existing on-prem Active Directory forests from each org will connect to Azure (AD Connect, Entra Connect cloud sync, Entra Domain Services).
Standardized RBAC roles and PIM (Privileged Identity Management) for platform and workload teams across both organizations.
Platform landing zone considerations:
Platform admins, security admins, network engineers, workload owners, auditors.
For merger integration, plan transitional patterns:
Connectivity is the other critical pillar when merging IT estates. Your landing zone’s Connectivity subscription is where you standardize how both companies reach Azure and each other.
Following enterprise landing zone patterns:
Create a Connectivity subscription under the Platform management group.
Landing zone connectivity goals for mergers:
You may have:
Steps:
Azure Policy at the Platform level can enforce the use of central DNS, deny creation of public IPs, and require NSGs and private endpoints to keep things consistent as teams onboard.
Your platform landing zone should encode a unified, risk‑appropriate security and governance model so both organizations’ workloads inherit consistent controls
Use Azure Policy and initiatives:
At root:
At Platform:
At Landing‑Zones:
Merger twist:
If Org A has stricter controls, treat them as the baseline and bring Org B up to that level.
Start with policies in audit‑only mode to surface non‑compliance without breaking workloads, then switch to “Deny” in phases.
Your Management subscription (part of the Platform landing zone) hosts shared management services:
Design points:
Landing zones fail in practice when ownership is unclear. Define a clear operating model alongside your design.
Core roles:
Platform engineering:
Security and compliance:
Workload teams:
FinOps / cost management:
For a merger, you also need:
Playbooks:
This section stitches the previous pieces into a practical “do this next” sequence.
Build the Merger Cloud Integration Charter (scope, constraints, priorities).
Inventory:
Decide:
Deliverable: Landing zone target architecture and migration roadmap.
Using the IaC implementation options guidance:
Phase 0–2: Plan, prepare prerequisites, and bootstrap:
Phase 3: Run:
At this stage, you have a minimal but working platform that both orgs can begin consuming.
Connect on‑prem AD forests and Entra tenants to the new platform per your chosen model.
Establish network connectivity:
ExpressRoute or VPN from both orgs’ data centers to the new Azure hubs.
Validate:
Deliverable: Hybrid connectivity and identity foundation that can support workload migrations and shared services access.
Create application landing zones (subscriptions) for 1–2 early adopter business units.
Use the IaC modules to deploy their spokes, policies, and basic shared services configuration.
Migrate or deploy a small set of non‑critical workloads into these landing zones.
Refine:
Deliverable: Validated pattern for app landing zones that you can scale across the enterprise.
Onboard more business units and workloads in waves.
Migrate legacy subscriptions into the new management‑group structure, applying policies carefully to avoid outages.
Iterate:
Throughout these steps, continue to leverage the Azure landing zone IaC accelerator and AVMs to avoid custom one‑off code and to stay aligned with Microsoft’s best practices.
Azure Verified Modules (AVM) for platform landing zones are reusable building blocks that help you assemble a compliant landing zone architecture in a repeatable way.
Benefits in a merger:
All new regions and subscriptions use the same modules for management, connectivity, security, etc.
You track module versions rather than maintaining large custom templates.
New app landing zones can be provisioned using the same patterns, with minor configuration changes.
Typical usage pattern:
Use the accelerator to scaffold:
Use AVMs independently to:
Mergers often introduce extra complexity: sovereign cloud usage, strict regulatory domains, or existing non-Azure estates.
The implementation options include references to enterprise‑scale landing zones for Azure Government and China regions. If either org uses these:
Use separate management group branches and landing zones for regulated workloads:
This helps you integrate the estate without compromising compliance while still benefiting from shared platform services where allowed
Based on field guidance and landing zone best practices:
Do:
Don’t migrate major workloads until you have a minimum viable platform landing zone in place.
Treat portal changes as exceptions and back‑port them into code.
Especially when onboarding legacy subscriptions from both orgs.
Avoid every decision requiring a committee; use architecture guardrails and PR reviews instead.
Avoid:
This defeats the purpose of an integrated merger strategy.
You can expand to multi‑region, advanced DR, and complex network topologies later; start with a solid but simple design.
Ensure runbooks, monitoring, and on‑call processes are in place before onboarding critical workloads.
To make this concrete, here’s an illustrative sequence:
Define the charter, pick Terraform with the AVM accelerator, design the management group structure, and design the network topology.
Bootstrap the repo and pipelines and deploy the platform landing zone (Management, Connectivity, and Identity subscriptions).
Connect on-prem networks, integrate Entra/AD, and deploy basic policies in audit mode.
Onboard the first business unit from Org A and Org B into new app landing zones, migrate a few non‑critical workloads.
Wave-based migration of remaining workloads, alignment of security standards, retirement of legacy patterns, and introduction of more advanced capabilities (multi‑region DR, additional regions).
Over time, the Azure landing zone becomes the standard integration backbone for all new initiatives, not just the merger.