πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-305 Domain 1
Domain 1 β€” Module 6 of 7 86%
6 of 30 overall

AZ-305 Study Guide

Domain 1: Design Identity, Governance, and Monitoring Solutions

  • Monitoring & Logging Design
  • Choosing Authentication Methods
  • Designing Identity Management
  • Authorizing Access to Resources
  • Secrets, Keys & Certificates
  • Governance at Scale
  • Compliance & Identity Governance

Domain 2: Design Data Storage Solutions

  • Relational Data: Choosing Your SQL Platform
  • Database Performance & Scalability
  • Database Security & Compliance
  • Cosmos DB & Semi-Structured Data
  • Blob, Data Lake & Azure Files
  • Data Integration & Analytics

Domain 3: Design Business Continuity Solutions

  • Recovery Objectives: RPO, RTO & SLA Free
  • Backup & Recovery for Compute Free
  • Backup for Databases & Unstructured Data Free
  • High Availability for Compute Free
  • High Availability for Data Free

Domain 4: Design Infrastructure Solutions

  • Compute Design: VMs & When to Use Them
  • Container Solutions: AKS, ACI & Container Apps
  • Serverless & Batch Processing
  • Messaging Architecture
  • Event-Driven Architecture
  • API Integration & Caching
  • App Configuration & Automated Deployment
  • Migration Strategy & Assessment
  • Executing Migrations
  • Network Connectivity: Internet & Hybrid
  • Network Security & Performance
  • Load Balancing & Routing

AZ-305 Study Guide

Domain 1: Design Identity, Governance, and Monitoring Solutions

  • Monitoring & Logging Design
  • Choosing Authentication Methods
  • Designing Identity Management
  • Authorizing Access to Resources
  • Secrets, Keys & Certificates
  • Governance at Scale
  • Compliance & Identity Governance

Domain 2: Design Data Storage Solutions

  • Relational Data: Choosing Your SQL Platform
  • Database Performance & Scalability
  • Database Security & Compliance
  • Cosmos DB & Semi-Structured Data
  • Blob, Data Lake & Azure Files
  • Data Integration & Analytics

Domain 3: Design Business Continuity Solutions

  • Recovery Objectives: RPO, RTO & SLA Free
  • Backup & Recovery for Compute Free
  • Backup for Databases & Unstructured Data Free
  • High Availability for Compute Free
  • High Availability for Data Free

Domain 4: Design Infrastructure Solutions

  • Compute Design: VMs & When to Use Them
  • Container Solutions: AKS, ACI & Container Apps
  • Serverless & Batch Processing
  • Messaging Architecture
  • Event-Driven Architecture
  • API Integration & Caching
  • App Configuration & Automated Deployment
  • Migration Strategy & Assessment
  • Executing Migrations
  • Network Connectivity: Internet & Hybrid
  • Network Security & Performance
  • Load Balancing & Routing
Domain 1: Design Identity, Governance, and Monitoring Solutions Premium ⏱ ~18 min read

Governance at Scale

Management groups, subscription design, resource groups, and tagging strategies β€” architect the organisational hierarchy that keeps thousands of Azure resources under control.

Why governance design matters

β˜• Simple explanation

Governance is like city planning. Without zoning laws, someone builds a factory next to a school. Without naming conventions, nobody can find anything. Without budgets per department, costs spiral.

In Azure, governance means designing the hierarchy (management groups β†’ subscriptions β†’ resource groups β†’ resources) and the rules (policies, tags, naming conventions) that keep everything organised as you scale.

Good governance is invisible when it works. Bad governance becomes visible when you get a surprise bill or can’t find who owns a resource.

Azure governance architecture has four layers:

  • Management groups: Organisational containers for subscriptions β€” apply policies and RBAC at scale
  • Subscriptions: Billing boundaries and scale units β€” the primary isolation boundary
  • Resource groups: Logical containers for related resources β€” the deployment and lifecycle unit
  • Tags: Metadata for cost allocation, automation, and operational management

Cloud Adoption Framework (CAF): The governance discipline is one of CAF’s five disciplines. Microsoft’s enterprise-scale landing zone architecture provides a reference governance hierarchy.

Management group hierarchy design

Management groups sit above subscriptions and let you apply policy and RBAC inheritance at scale.

CAF enterprise-scale landing zone pattern

The most common enterprise pattern follows the Cloud Adoption Framework:

Tenant Root Group
β”œβ”€β”€ Platform
β”‚   β”œβ”€β”€ Identity (Entra Connect, DNS)
β”‚   β”œβ”€β”€ Management (Log Analytics, Automation)
β”‚   └── Connectivity (Hub VNet, Firewall, VPN/ER)
β”œβ”€β”€ Landing Zones
β”‚   β”œβ”€β”€ Corp (internal workloads, hub-spoke network)
β”‚   └── Online (internet-facing workloads, public endpoints)
β”œβ”€β”€ Sandbox (experimentation, no production data)
└── Decommissioned (resources pending deletion)

πŸ›οΈ David’s CAF implementation: CloudPath Advisory always starts government clients with this hierarchy:

  • Platform subscriptions are locked down β€” only infra team has access
  • Landing Zones get pre-configured policies inherited from the management group (e.g., enforce encryption, require tags)
  • Sandbox has relaxed policies for experimentation but is isolated from production networks
  • Decommissioned is an organisational holding area for resources pending deletion β€” cleanup requires separate automation (Azure Policy + Logic App or runbook)
πŸ’‘ Exam tip: Management group depth limit

Azure supports up to 6 levels of management group depth (not counting the root). The CAF pattern typically uses 3-4 levels. Don’t over-nest β€” deep hierarchies make policy inheritance hard to trace and debug. If you need more than 4 levels, reconsider your organisational model.

Subscription design

Subscriptions are the primary isolation boundary in Azure. They’re also billing units and have service limits (quotas).

When to create a new subscription

ReasonExample
Billing isolationEach business unit gets its own subscription for cost allocation
Scale limitsApproaching subscription quotas (e.g., 250 storage accounts per region per subscription)
Environment isolationSeparate subs for dev, staging, production
Compliance boundariesDifferent regulatory requirements (EU data, government workloads)
Team autonomyTeams that need independent RBAC without affecting others
Subscription Design Patterns
PatternSingle SubscriptionPer EnvironmentPer Business UnitPer Workload
IsolationNoneEnvironment-levelDepartment-levelApp-level
Cost trackingTags onlySub-level per envSub-level per BUSub-level per app
ManagementSimplestLow (3-4 subs)Medium (10-20 subs)High (50+ subs)
Blast radiusLargestPer-environmentPer-departmentSmallest
Best forSmall orgs, POCsMost small-medium orgsLarge enterprisesVery large / regulated

πŸ—οΈ Priya’s design: GlobalTech uses per business unit + per environment:

  • sub-engineering-prod, sub-engineering-dev, sub-engineering-sandbox
  • sub-finance-prod, sub-finance-dev
  • sub-platform-connectivity, sub-platform-identity, sub-platform-management

Total: ~15 subscriptions, manageable with Azure Policy at the management group level.

Resource group design

Resource groups are logical containers. Key design principles:

PrincipleGuidance
Lifecycle alignmentResources that are created, updated, and deleted together belong in the same RG
Permission boundaryRBAC is commonly applied at RG level β€” group resources by team ownership
Region-agnosticRGs are metadata β€” they can contain resources from any region
Delete as a unitDeleting an RG deletes ALL resources inside. Design for safe deletion.

πŸš€ Marcus’s resource group pattern: NovaSaaS groups by microservice:

  • rg-api-gateway-prod β€” API Management, CDN, WAF
  • rg-user-service-prod β€” Container Apps, Cosmos DB, Redis
  • rg-batch-processor-prod β€” Functions, Queue Storage, Batch

Each team owns their resource groups. The platform team owns shared resources (rg-networking-prod, rg-monitoring-prod).

Tagging strategy

Tags are the architect’s metadata tool for governance, cost management, and automation.

Recommended tag taxonomy

TagPurposeExample ValueEnforcement
EnvironmentDev/staging/prod classificationProductionRequired β€” Azure Policy
CostCenterFinancial allocationCC-4521Required β€” Azure Policy
OwnerResponsible team or personplatform-team@globaltech.comRequired β€” Azure Policy
ApplicationWhich app/service this belongs touser-serviceRequired β€” Azure Policy
DataClassificationSensitivity levelConfidentialRecommended
CreatedByWho created the resourceterraform-pipelineAuto-tag via Policy
ExpiryDateWhen to review/delete2026-12-31Recommended for non-prod
ℹ️ Design decision: Tag enforcement with Azure Policy

Don’t rely on people to tag resources manually β€” they won’t. Use Azure Policy to:

  • Require tags on creation: Require a tag on resource groups policy (Deny effect)
  • Inherit tags from RG: Inherit a tag from the resource group policy (Modify effect) β€” resources auto-inherit tags from their parent RG
  • Append default tags: Auto-add CreatedDate or CreatedBy tags at deployment time

Well-Architected Framework (Cost Optimisation): Tags are the foundation of cost allocation. Without enforced CostCenter tags, you can’t answer β€œwhich team spent how much?” β€” and cost management becomes guesswork.

Azure Policy for tag governance

PolicyEffectWhat It Does
Require tag on resource groupsDenyBlocks RG creation without specified tags
Inherit tag from resource groupModifyAuto-copies tag from RG to resources inside
Require tag on resourcesDenyBlocks resource creation without tags
Add/replace tagModifyForce-applies tags (useful for auto-tagging)

πŸ›οΈ David’s government tagging: CloudPath Advisory enforces strict tagging for all government clients:

  • DataSovereignty: NZ (or AU, US) β€” mandatory, drives policy about where data can be stored
  • Classification: OFFICIAL / SENSITIVE / PROTECTED β€” drives encryption and access requirements
  • Agency: Ministry-of-Health β€” cost allocation back to the funding agency
  • All enforced via Azure Policy at the management group level β€” no exceptions

Knowledge check

Question

What's the recommended management group pattern from the Cloud Adoption Framework?

Click or press Enter to reveal answer

Answer

Tenant Root β†’ Platform (Identity, Management, Connectivity) + Landing Zones (Corp, Online) + Sandbox + Decommissioned. This separates platform infrastructure from workloads and provides different policy inheritance paths.

Click to flip back

Question

When should you create a new Azure subscription?

Click or press Enter to reveal answer

Answer

Five main reasons: (1) billing isolation between business units, (2) approaching subscription quotas, (3) environment isolation (dev/prod), (4) compliance boundaries (different regulations), (5) team autonomy (independent RBAC). Subscriptions are the primary isolation boundary in Azure.

Click to flip back

Question

How do you enforce tagging at scale?

Click or press Enter to reveal answer

Answer

Azure Policy with Deny effect (block creation without required tags) and Modify effect (auto-inherit tags from resource groups, auto-append default tags). Never rely on manual tagging β€” use Policy at the management group level so it applies to all subscriptions.

Click to flip back

Knowledge Check

πŸ—οΈ GlobalTech has 5 business units and needs separate billing, different RBAC permissions per team, and the ability to enforce policies centrally. They want dev and production workloads isolated. Which subscription design should Priya recommend?

Knowledge Check

πŸ›οΈ David's government client requires all Azure resources to have a DataSovereignty tag indicating the approved data residency region. The tag must be present on every resource β€” no exceptions. Which Azure Policy approach should David recommend?

🎬 Video coming soon


Next up: Hierarchy is designed β€” now let’s enforce the rules and govern identities β€” Compliance & Identity Governance.

← Previous

Secrets, Keys & Certificates

Next β†’

Compliance & Identity Governance

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.