multi-cloud-landing-zone

Production-ready multi-cloud landing zone with unified identity federation across AWS, Azure, and GCP

HCL (Terraform) Infrastructure v1.0.0

Executive Summary

A comprehensive, production-ready multi-cloud landing zone reference architecture spanning AWS, Azure, and GCP. Provides Terraform modules that establish secure, compliant, and well-governed cloud foundations with unified identity federation. The AWS module configures Organizations, SCPs, Control Tower, CloudTrail, GuardDuty, and Security Hub. The Azure module provisions Management Groups, Azure Policy, Blueprints, and Defender. The GCP module establishes Organization hierarchy, Folder structures, and Org Policies. An identity federation module ties all three clouds together via SAML 2.0/OIDC with SCIM provisioning.

Overview

HCL
Language
Infrastructure
Category
4
Modules
3
Cloud Providers
SAML/OIDC
Identity Federation
MIT
License

Architecture Diagram

Enterprise IdP
Azure AD / Okta
v
SAML 2.0 / OIDC
Identity Federation
SCIM
User Provisioning
Identity Federation Layer
v          v          v
AWS Landing Zone
Organizations + Control Tower
Azure Landing Zone
Mgmt Groups + Policy
GCP Landing Zone
Folders + Org Policies
v          v          v
SCPs + GuardDuty
Security Hub + CloudTrail
Defender + Blueprints
Azure Policy
Org Policies
Project Factory
v          v          v
Account Structure
Mgmt/Log/Audit/Shared/Workload
Subscription Structure
Platform/Identity/Connectivity
Project Structure
Seed/Logging/Network/Security
v
Unified Governance
Tagging | Cost Mgmt | Compliance | Drift
v
Cross-Cloud Networking
Transit GW | Virtual WAN | NCC | VPN Mesh

Component Breakdown

ModulePathPurposeKey Resources
AWS Landing Zonemodules/aws-landing-zone/AWS Organization, SCPs, Control Tower guardrails, CloudTrail, GuardDuty, Security Hub, multi-account structureaws_organizations_organization, aws_guardduty_detector, aws_securityhub_account
Azure Landing Zonemodules/azure-landing-zone/Management Groups, Azure Policy, Blueprints, Defender, subscription structure aligned to CAFazurerm_management_group, azurerm_policy_assignment, azurerm_security_center_subscription_pricing
GCP Landing Zonemodules/gcp-landing-zone/Organization hierarchy, Folder structure, Org Policies, project factory patterngoogle_folder, google_organization_policy, google_project
Identity Federationmodules/identity-federation/Centralized SSO with SAML 2.0/OIDC federation and SCIM provisioning across all cloudsaws_iam_saml_provider, azuread_application, google_iam_workforce_pool

Data Flow / Request Flow

  1. Identity Federation -- Enterprise IdP (Azure AD/Okta) provides SAML 2.0/OIDC assertions federated to all three cloud providers via the identity-federation module.
  2. AWS Provisioning -- The AWS module creates an Organization with SCPs, enables Control Tower, configures CloudTrail, GuardDuty, and Security Hub, and provisions management/log/audit/shared/workload accounts.
  3. Azure Provisioning -- The Azure module establishes Management Groups, assigns Azure Policies, deploys Blueprints, enables Defender, and creates platform/identity/connectivity/management/landing zone subscriptions.
  4. GCP Provisioning -- The GCP module creates the Organization, folder hierarchy, Org Policies, and provisions seed/logging/network/security/workload projects.
  5. Governance -- Unified tagging standards, cost management, compliance reporting, and drift detection are enforced across all three clouds.
  6. Cross-Cloud Networking -- AWS Transit Gateway, Azure Virtual WAN, and GCP Network Connectivity Center are connected via a VPN mesh for inter-cloud connectivity.

Security Controls

ControlImplementation
Identity FederationCentralized SAML 2.0/OIDC with SCIM provisioning; no local cloud accounts
Service Control PoliciesAWS SCPs restrict regions, services, and actions at the Organization level
Azure PolicyAzure Policy assignments enforce compliance at Management Group scope
GCP Org PoliciesOrganization-level constraints restrict regions, services, and configurations
Security MonitoringGuardDuty (AWS), Defender (Azure), Security Command Center (GCP)
Audit LoggingCloudTrail (AWS), Activity Log (Azure), Audit Logs (GCP) with centralized archival
Network SegmentationSeparate accounts/subscriptions/projects per workload classification
EncryptionEncryption at rest and in transit enforced via policy across all providers

Industry Adaptation

Healthcare

HIPAA BAA-eligible regions, PHI data classification tags, 365-day log retention, Defender/GuardDuty for medical device network monitoring.

Finance

PCI-DSS Security Hub checks, SOX audit log archival, MFA-enforced federation, regulatory jurisdiction region restrictions.

Government

GovCloud/Azure Government/Assured Workloads, PIV/CAC-integrated SAML, NIST 800-53 control mapping, US-only region restrictions.

Retail

PCI scope subscription isolation, CCPA/GDPR data residency region controls, customer data breach playbooks.

Education

FERPA compliance tags, domestic region restrictions, Shibboleth/InCommon SAML federation, student data access monitoring.

Production Readiness Checklist

Configuration / Environment Variables

VariableRequiredDefaultDescription
AWS_ACCESS_KEY_IDYes--AWS access key for Organization management account
AWS_SECRET_ACCESS_KEYYes--AWS secret key
ARM_SUBSCRIPTION_IDYes--Azure management subscription ID
ARM_TENANT_IDYes--Azure AD tenant ID
ARM_CLIENT_IDYes--Azure service principal client ID
ARM_CLIENT_SECRETYes--Azure service principal secret
GOOGLE_PROJECTYes--GCP seed project ID
GOOGLE_CREDENTIALSYes--GCP service account key JSON path

Deployment

Local Development

git clone https://github.com/kogunlowo123/multi-cloud-landing-zone.git
cd multi-cloud-landing-zone
terraform init
terraform validate
terraform fmt -recursive
terraform plan

Production Deployment

# Configure remote backend
terraform init -backend-config=backend.hcl

# Deploy per-module or full stack
terraform plan -var-file=prod.tfvars
terraform apply -auto-approve

# Verify with drift detection
terraform plan -detailed-exitcode

Links

Repositorygithub.com/kogunlowo123/multi-cloud-landing-zone
READMEREADME.md
ChangelogCHANGELOG.md
Industry AdaptationINDUSTRY-ADAPTATION.md
LicenseMIT License