Skip to content

Overview

Abstract

The Azure Hybrid Continuum CookBook is a comprehensive, practitioner-focused guide to designing, building, and operating hybrid and sovereign cloud architectures using Microsoft Azure technologies. This guide addresses the full spectrum of deployment models — from cloud-native workloads running in Azure public cloud, through connected hybrid deployments managed by Azure Arc and Azure Local, to sovereign landing zones and fully disconnected, air-gapped environments for regulated and high-security scenarios.

Unlike traditional cloud migration guides that assume a one-way journey to the cloud, this CookBook recognizes that modern enterprises operate across a continuum of deployment models. Organizations may need to move workloads between these models in either direction — from cloud to on-premises (cloud exit), from disconnected to connected, or from public cloud to sovereign environments — based on evolving business, regulatory, and operational requirements.

This guide provides architectural patterns, decision frameworks, implementation guidance, and a concrete reference implementation that demonstrates how a representative enterprise application can be designed to operate across the entire Azure Hybrid Continuum. It is accompanied by a companion sample application — ContosoInsurances-NativeToLocal — a working .NET 8 implementation that brings the concepts in this guide to life with deployable code across three continuum stages.

Why This Guide Exists

Organizations worldwide are facing unprecedented challenges in balancing the benefits of cloud computing with increasingly stringent regulatory, security, and operational requirements. The following drivers are reshaping enterprise cloud strategies:

Data Residency and Sovereignty Requirements

Jurisdictions around the world are implementing data localization laws that mandate where data can be stored and processed. The EU's General Data Protection Regulation (GDPR), China's Cybersecurity Law, Russia's Federal Law No. 242-FZ, and India's Personal Data Protection Bill are examples of regulations requiring data to remain within national boundaries or be subject to local control. Organizations operating across multiple jurisdictions must architect solutions that can satisfy these diverse and sometimes conflicting requirements.

Regulatory Compliance and Industry Mandates

Highly regulated industries face specific compliance requirements that may restrict cloud adoption or mandate particular controls:

  • Financial Services: Basel III, PCI-DSS, and national banking regulations often require operational resilience, data sovereignty, and the ability to operate critical systems independently of third-party infrastructure.
  • Healthcare: HIPAA in the United States, NHS Digital standards in the UK, and similar regulations worldwide impose strict controls on patient data.
  • Government and Defense: Classified workloads, national security systems, and government services often require air-gapped environments with no external connectivity.
  • Critical Infrastructure: Energy, telecommunications, and utilities face regulations requiring operational continuity independent of external dependencies.

Operational Resilience and Connectivity Constraints

Not all environments have reliable, high-bandwidth connectivity to public cloud regions. Organizations operating in remote locations, on mobile platforms (ships, aircraft), or in connectivity-constrained environments (manufacturing facilities, research stations) require architectures that can function effectively with intermittent or no cloud connectivity.

Cloud Exit and Strategic Independence

While cloud adoption continues to accelerate, organizations increasingly require the ability to repatriate workloads or operate independently of cloud providers. Motivations include:

  • Cost optimization: Repatriating stable, high-volume workloads to on-premises infrastructure
  • Vendor risk management: Reducing dependence on a single cloud provider
  • Strategic autonomy: Maintaining the technical capability to operate without cloud services
  • Regulatory mandates: Government directives requiring migration away from foreign cloud providers

The Need for Consistency Across Diverse Infrastructure

Organizations want to adopt modern cloud-native practices — DevOps, GitOps, infrastructure as code, policy-driven governance — while operating across diverse infrastructure. The traditional approach of maintaining separate management tools, deployment pipelines, and operational practices for cloud and on-premises environments creates complexity, increases risk, and limits agility.

Microsoft's Hybrid Cloud Strategy

Microsoft's approach to hybrid cloud computing is built on the principle of meeting customers where they are and providing consistent experiences across diverse deployment environments. This strategy is embodied in three core technology pillars:

Azure Arc: Extending Azure Management Everywhere

Azure Arc extends the Azure Resource Manager control plane to resources outside Azure, enabling unified management of servers, Kubernetes clusters, databases, and applications regardless of where they run. Azure Arc provides:

  • Unified inventory and management: All resources — whether in Azure, on-premises, at the edge, or in other clouds — are projected into Azure Resource Manager and managed through a single pane of glass.
  • Consistent governance: Azure Policy, Azure role-based access control (RBAC), and compliance frameworks apply consistently across all environments.
  • GitOps-based configuration management: Kubernetes clusters can be configured declaratively using Git repositories as the source of truth.
  • Azure services anywhere: Run Azure data services (Azure SQL Managed Instance) and application services on any Kubernetes infrastructure.

Azure Arc is foundational to the hybrid continuum, providing the management layer that enables consistent operations across connected environments.

Azure Local: Hyperconverged Infrastructure as an Azure Service

Azure Local (formerly Azure Stack HCI) is a hyperconverged infrastructure solution that brings Azure services to on-premises and edge locations. It delivers:

  • Azure-managed infrastructure: Hardware and software are managed through Azure, with updates, monitoring, and support delivered as a service.
  • Local Azure services: Run Azure Virtual Machines, Azure Kubernetes Service (AKS), and Azure Virtual Desktop on-premises while maintaining Azure-consistent APIs and management experiences.
  • Flexible deployment models: Supports connected mode (continuous Azure connectivity), occasionally connected mode, and disconnected mode for air-gapped environments.
  • Integrated with Azure Arc: Virtual machines and Kubernetes clusters running on Azure Local are automatically projected into Azure Arc for unified management.

Azure Local enables organizations to run Azure workloads on-premises with the same operational model as public cloud, bridging the gap between traditional on-premises infrastructure and cloud computing.

Sovereign Landing Zones: Compliance-First Cloud Architecture

Sovereign Landing Zones extend the Azure landing zone architecture with additional controls and principles to address data residency, regulatory compliance, and digital sovereignty requirements. Sovereign Landing Zones provide:

  • Enhanced compliance controls: Additional Azure Policies enforcing data residency, encryption, network isolation, and access controls.
  • Management group segmentation: Dedicated management groups for public, confidential corporate, and confidential online workloads with appropriate policy assignments.
  • Sovereignty assurance: Architectural patterns ensuring data and operations remain within jurisdictional boundaries.

Sovereign Landing Zones enable organizations to operate Azure services while maintaining compliance with stringent regulatory and sovereignty requirements.

The Continuum Concept

The Azure Hybrid Continuum is not a binary choice between "cloud" and "on-premises." It is a spectrum of deployment models with varying degrees of cloud connectivity, management integration, and operational independence. Organizations may operate workloads at different points on this continuum simultaneously, and workloads may move between positions over time.

The continuum consists of four primary stages:

  1. Public Cloud (Fully Connected): Workloads running entirely in Azure public cloud regions, leveraging the full breadth of Azure PaaS and SaaS services.
  2. Connected Hybrid: On-premises infrastructure running Azure Local and Azure Arc-enabled servers and Kubernetes clusters, with continuous connectivity to Azure for management, monitoring, and control plane operations.
  3. Sovereign Cloud: Workloads running in Azure sovereign clouds or Azure public cloud with Sovereign Landing Zone controls, meeting enhanced data residency and regulatory requirements.
  4. Disconnected (Air-Gapped): Fully isolated environments with no connectivity to Azure, running Azure Local in disconnected mode or traditional on-premises infrastructure.

Each stage represents different trade-offs in terms of service availability, operational complexity, compliance posture, and cost. Chapter 2 explores this continuum in depth, defining each stage and providing guidance on when each deployment model is appropriate.

Target Audience

This guide is designed for practitioners responsible for designing, implementing, and operating enterprise cloud and hybrid infrastructure:

  • Cloud Architects: Professionals designing multi-region, hybrid, and sovereign cloud architectures who need comprehensive guidance on Azure's hybrid capabilities and architectural patterns.
  • Platform Engineers: Engineers building and operating the platforms and infrastructure services on which application teams depend.
  • Solution Designers: Technical specialists scoping and designing solutions for specific business or regulatory requirements.
  • Decision Makers: CTOs, IT directors, and enterprise architects evaluating strategic options for hybrid and sovereign cloud adoption.

The guide assumes familiarity with cloud computing concepts, Azure fundamentals, and infrastructure management. It focuses on architectural decisions, patterns, and implementation guidance rather than introductory cloud concepts.

What's In Scope

This guide covers:

  • Architectural patterns for each stage of the Azure Hybrid Continuum, including public cloud, connected hybrid, sovereign, and disconnected deployments.
  • Decision frameworks to help organizations determine where workloads should be deployed and when to move between continuum stages.
  • Azure technologies and services that enable hybrid and sovereign architectures: Azure Arc, Azure Local, Azure Kubernetes Service, Azure Policy, Sovereign Landing Zones, and related services.
  • Implementation guidance including infrastructure provisioning, application deployment, management, monitoring, and governance.
  • A reference implementation demonstrating a multi-tier application (Contoso Hypermarket) designed to operate across the full continuum, with Infrastructure as Code (Bicep, Terraform), GitOps-based deployment, and policy-driven governance.
  • Operational practices for managing workloads across hybrid environments, including disaster recovery, updates, and lifecycle management.

What's Out of Scope

This guide does not cover:

  • Azure fundamentals: Basic cloud concepts, Azure portal navigation, and introductory Azure services are not explained. Readers should have existing Azure knowledge.
  • Detailed service documentation: While we reference Azure services extensively, this guide does not replace official Microsoft Learn documentation. We provide context, architectural guidance, and patterns, then link to official documentation for detailed service information.
  • Multi-cloud architectures: While Azure Arc can manage resources in other clouds, this guide focuses on Microsoft Azure technologies. Detailed guidance for AWS, Google Cloud, or other cloud providers is out of scope.
  • Non-Azure hybrid technologies: Third-party hybrid solutions, VMware Cloud Foundation (except as an Azure Arc-managed resource), and other non-Microsoft technologies are not covered.
  • Application development: While the reference implementation includes a sample application, detailed guidance on application design, programming languages, and development frameworks is out of scope. The focus is on infrastructure and platform architecture.

How to Navigate This Guide

This CookBook is organized to support multiple reading paths depending on your role and immediate needs:

  • Sequential Reading: Chapters are designed to build on each other. Reading sequentially from Chapter 1 through Chapter 10 provides comprehensive understanding of the Azure Hybrid Continuum and how to implement it.
  • Role-Based Paths: Chapter 3 provides recommended reading paths for architects, platform engineers, and decision makers, guiding you to the chapters most relevant to your responsibilities.
  • Reference Lookup: Use the detailed table of contents and index (Chapter 11) to jump directly to specific topics, patterns, or technologies.
  • Hands-On Implementation: Readers who prefer learning by doing can proceed directly to the reference implementation chapters (Chapters 6-9) after reviewing the conceptual foundations in Chapters 1-2.

Recommended Starting Point

New readers should start with Chapter 1 (Introduction) and Chapter 2 (The Hybrid Continuum) to build foundational understanding, then proceed to Chapter 3 (Navigation Guide) to identify the most relevant path for your role and objectives.

References

This chapter is grounded in the following official Microsoft documentation:


Next: The Hybrid Continuum →