2 IT Departments split in Azure

%3CLINGO-SUB%20id%3D%22lingo-sub-686579%22%20slang%3D%22en-US%22%3E2%20IT%20Departments%20split%20in%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-686579%22%20slang%3D%22en-US%22%3E%3CP%3EGood%20Day%20All%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20do%20hope%20someone%20here%20could%20point%20me%20in%20the%20correct%20direction%20in%20finding%20an%20answer.%20I%20am%20a%20noob%20on%20the%20Azure%20platform%20so%20please%20go%20easy%20hahaha.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20work%20for%20a%20large%20corporate%2C%20within%20this%20organization%20we%20have%202%20IT%20departments.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3COL%3E%3CLI%3E%26nbsp%3B%3CSTRONG%3EIT%20Department%201%3A%3C%2FSTRONG%3E%3CBR%20%2F%3EServices%20%3CEM%3Einternal%3C%2FEM%3E%20organizational%20IT%20needs%20only.%20Purely%20on%20prem%20solutions%2C%20hosted%20on%20physical%20servers%2C%20using%20Hyper-V%20as%20a%20the%20only%20hypervisor.%20All%20solutions%20hosted%20in%20this%20department%20is%20accessed%20by%20internal%20staff%20ONLY.%26nbsp%3B%3C%2FLI%3E%3CLI%3E%3CSTRONG%3EIT%20Department%202%3A%3C%2FSTRONG%3E%20(Which%20I%20am%20part%20of)%3CBR%20%2F%3EThis%20department%20is%20tasked%20with%20cloud%20based%20solutions%2C%20predominantly%20making%20use%20of%20IaaS%2C%20which%20is%20hosted%20on%20a%20non-popular%20cloud%20vendor%20platform.%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSTRONG%3ELet's%20break%20it%20down%20to%20properly%20understand%20this%3A%3C%2FSTRONG%3E%3CBR%20%2F%3EServices%20internal%20departments%20solutions%20which%20are%20sold%20to%20external%20clients%20%3CEM%3E(So%20in%20Laymans%20terms%2C%20Our%20internal%20departments%20develop%20some%20super%20application%2C%20they%20sell%20it%20to%20external%20clients%2C%20and%20%3CSTRONG%3EIT%20Department%202%3C%2FSTRONG%3E%20is%20now%20responsible%20for%20hosting%20this%20solution)%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FEM%3EThe%20reason%20for%20this%20%2C%20is%20due%20to%20the%20need%20for%20external%20client%20access%2C%20we%20have%20to%20segregate%20internal%20and%20external%20access.%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSTRONG%3EDilema%3A%26nbsp%3B%3CBR%20%2F%3E%3C%2FSTRONG%3EI%3CEM%3ET%20Department%202%3C%2FEM%3E%2C%20now%20needs%20to%20move%20all%20the%20servers%20from%20the%20%22non%20Popular%22%20cloud%2C%20to%20Azure.%20Which%20is%20easy%20enough.%20The%20problem%20is%20that%20%3CEM%3EIT%20Department%201%3C%2FEM%3E%2C%20will%20at%20some%20stage%20start%20moving%20workloads%20to%20Azure%20as%20well.%20BUT%20we%20need%20to%20ensure%20that%20%3CEM%3EIT%20department%202%3C%2FEM%3E%20which%20is%20the%20main%20Azure%20account%20holder%2C%20has%20the%20highest%20control%20of%20the%20Azure%20portal%2C%20and%20when%20%3CEM%3EIT%20Department%201%3C%2FEM%3E%20comes%20on%20board%20at%20some%20stage%2C%20that%20there%20is%20limited%20access%2C%20and%20IT%20department%201%20will%20not%20be%20able%20to%20see%20what%20%3CEM%3EIT%20Department%202%3C%2FEM%3E%20has%20and%20does%20in%20Azure.%3CBR%20%2F%3E%3CBR%20%2F%3EWe%20are%202%20completely%20different%20departments%26nbsp%3B%3C%2FLI%3E%3C%2FOL%3E%3CP%3ESo%20i%20have%20done%20my%20research%20and%20I%20understand%20that%20this%20can%20be%20split%20using%202%20different%20subscriptions%2C%20and%20things%20like%20RBAC.%20But%20how%20and%20what%20would%20be%20the%20best%20way%20to%20do%20this%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPlease%20advise%20if%20possible%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-686579%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%20%26amp%3B%20Compliance%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-692995%22%20slang%3D%22en-US%22%3ERe%3A%202%20IT%20Departments%20split%20in%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-692995%22%20slang%3D%22en-US%22%3E%3CP%3EYou%20are%20on%20the%20right%20track!%20This%20can%20be%20accomplished%20technically%20within%20one%20subscription%20and%20using%20Role%20Based%20Access%20Control.%20One%20item%20to%20consider%20is%20if%20you%20want%20detailed%20breakdown%20of%20billing%20you%20may%20want%20to%20split%20resources%20across%20two%20subscriptions.%20If%20you%20don't%20you%20will%20have%20to%20tag%20resources%20to%20disseminate%20costs.%20RBAC%20is%20the%20preferred%20and%20best%20method%20to%20accomplish%20this.%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F358756%22%20target%3D%22_blank%22%3E%40Chavoos%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-705977%22%20slang%3D%22en-US%22%3ERe%3A%202%20IT%20Departments%20split%20in%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-705977%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F183000%22%20target%3D%22_blank%22%3E%40Bryan%20Haslip%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3EThanks%20Bryan%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThat%20being%20said%2C%20we%20would%20prefer%20to%20separate%20the%20billing%20for%20external%20and%20internal.%20BUT%20at%20the%20same%20time%20use%20tagging%20as%20for%20example%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFor%20both%20Subscriptions%3C%2FP%3E%3CP%3EMultiple%20Resource%20groups%2C%20as%20each%20client%20will%20need%20its%20own%20resource%20group%20and%20under%20each%20resource%20group%2C%20tags%20will%20need%20to%20be%20associated%20with%20certain%20resources.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHowever%20the%202%20departments%20should%20not%20be%20able%20to%20see%20each%20others%20billing.%20(I'm%20of%20the%20assumption%20that%20this%20too%20will%20be%20done%20using%20RBAC)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20hope%20this%20makes%20sense%3F%3C%2FP%3E%3CP%3E%3CBR%20%2F%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-707114%22%20slang%3D%22en-US%22%3ERe%3A%202%20IT%20Departments%20split%20in%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-707114%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F358756%22%20target%3D%22_blank%22%3E%40Chavoos%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThat%20makes%20perfect%20sense!%20Hopefully%20I%20did%20not%20convey%20that%20it%20was%20one%20or%20the%20other%20with%20the%20split%20subscription%20and%20tagging.%20You%20can%20certainly%20use%20both%20and%20I%20would%20suggest%20it.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20for%20limiting%20the%20view%20into%20the%20billing%20information%20you%20can%20certainly%20do%20this%20by%20using%20some%20of%20the%20predefined%20roles%20within%20Azure%20RBAC.%20The%20other%20option%20is%20you%20can%20create%20your%20own%20role%20with%20very%20specific%20privileges%20tailored%20to%20your%20exact%20need.%20Same%20rules%20apply%20that%20these%20are%20inherited%20to%20any%20nested%20resources.%20Example%20would%20be%20if%20they%20have%20that%20role%20on%20a%20resource%20group%20it%20would%20be%20automatically%20inherited%20to%20the%20resources%20contained%20within.%20One%20of%20the%20awesome%20features%20of%20RBAC%20is%20it%20can%20be%20applied%20to%20individual%20resources.%20One%20other%20suggestion%20is%20to%20create%20groups%20and%20assign%20the%20roles%20to%20those.%20This%20will%20help%20as%20things%20grow%20to%20keep%20track%20of%20permissions!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHopefully%20you%20find%20this%20helpful!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-708194%22%20slang%3D%22en-US%22%3ERe%3A%202%20IT%20Departments%20split%20in%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-708194%22%20slang%3D%22en-US%22%3EThe%20best%20means%20for%20permission%20in%20Azure%20is%20RBAC%20with%20Roles%20already%20defined%2C%20however%20you%20may%20have%20to%20customize%20these%20permissions%20where%20I%20advise%3A%3CBR%20%2F%3E%3CBR%20%2F%3ECustom%20roles%20for%20Azure%20resources%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fbs-cyrl-ba%2Fazure%2Frole-based-access-control%2Fcustom-roles%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fbs-cyrl-ba%2Fazure%2Frole-based-access-control%2Fcustom-roles%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3ETutorial%3A%20Create%20a%20custom%20role%20for%20Azure%20resources%20using%20Azure%20PowerShell%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Frole-based-access-control%2Ftutorial-custom-role-powershell%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Frole-based-access-control%2Ftutorial-custom-role-powershell%3C%2FA%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-731361%22%20slang%3D%22en-US%22%3ERe%3A%202%20IT%20Departments%20split%20in%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-731361%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20all%20for%20the%20advice%2C%20we%20are%20currently%20busy%20looking%20at%20the%20options%20as%20well%20as%20the%20best%20practices%20and%20will%20try%20to%20incorporate%20this.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIt%20seems%20that%20the%20RBAC%20way%20is%20where%20we%20will%20do%20the%20split%20as%20this%20is%20how%20our%20%22mothership%22%20does%20it%20on%20that%20side%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Ethank%20you%20all%20once%20again%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-733645%22%20slang%3D%22en-US%22%3ERe%3A%202%20IT%20Departments%20split%20in%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-733645%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F358756%22%20target%3D%22_blank%22%3E%40Chavoos%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHi%2C%20sounds%20like%20a%20scenario%20i%20heard%20about%20some%20times.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETo%20go%20ahead%20with%202%20Subscriptions%20for%20the%20Cost%20separation%20sounds%20like%20a%20good%20way%20and%20also%20pairing%20this%20with%20tagging%20of%20ressources%20to%20maybe%20split%20those%20costs%20a%20bit%20more%20visual%20afterwards%20is%20a%20common%20and%20well%20known%20way.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhile%20using%20two%20Subscriptions%20you%20can%20use%20Azure%20Management%20Groups%20for%20the%20global%20Management%20of%20those%20Subscriptions%2C%20when%20it%20is%20wanted.%20A%20Management%20Layer%20above%20pure%20RBAC%20if%20you%20want.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fgovernance%2Fmanagement-groups%2Findex%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fgovernance%2Fmanagement-groups%2Findex%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20don't%20know%20how%20your%20Azure%20Resources%20will%20be%20managed%2C%20maybe%20Dept.%201%20will%20manage%20only%20their%20Stuff%20and%20Dept.%202%20may%20manage%20only%20their%20Stuff%2C%20but%20maybe%20there%20will%20be%20Admins%20working%20in%20both%20Subscriptions%20as%20they%20are%20responsible%20for%20Network%20or%20Monitoring.%20Then%20for%20those%20Admins%20those%20Management%20Groups%20might%20be%20more%20useful%20instead%20of%20give%20them%20RBAC%20rights%20on%20each%20single%20Resource.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EEspecially%20Network%20should%20always%20be%20well%20documented%20and%20communicated%20between%20those%20two%20Depts%20as%20they%20otherwise%20might%20ran%20in%20big%20Problems.%20Also%20with%20the%20linking%20of%20OnPremise%20components.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHope%20i%20could%20have%20been%20a%20bit%20helpful.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EKind%20Regards%2C%20Peter%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-733654%22%20slang%3D%22en-US%22%3ERe%3A%202%20IT%20Departments%20split%20in%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-733654%22%20slang%3D%22en-US%22%3E%22I%20don't%20know%20how%20your%20Azure%20Resources%20will%20be%20managed%2C%20maybe%20Dept.%201%20will%20manage%20only%20their%20Stuff%20and%20Dept.%202%20may%20manage%20only%20their%20Stuff%2C%20but%20maybe%20there%20will%20be%20Admins%20working%20in%20both%20Subscriptions%20as%20they%20are%20responsible%20for%20Network%20or%20Monitoring.%20Then%20for%20those%20Admins%20those%20Management%20Groups%20might%20be%20more%20useful%20instead%20of%20give%20them%20RBAC%20rights%20on%20each%20single%20Resource.%22%3CBR%20%2F%3E%3CBR%20%2F%3EI%20see%20each%20department%20working%20on%20their%20own%20stuff.%20That%20being%20everything%20segregated%20for%20now%2C%20however%2C%20the%20networking%20part%20is%20a%20bit%20different%20as%20we%20will%20receive%20a%20%22super-net%22%20which%20we%20will%20need%20to%20split%20between%20internal%20and%20external%2C%20so%20indeed%2C%20we%20will%20need%20to%20design%20the%20network%20layer%20extremely%20well%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-733658%22%20slang%3D%22en-US%22%3ERe%3A%202%20IT%20Departments%20split%20in%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-733658%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F358756%22%20target%3D%22_blank%22%3E%40Chavoos%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOk%2C%20understood.%3C%2FP%3E%3CP%3EI%20strongly%20recommend%20that%20there%20is%20a%20platform%2C%20whatever%20(Wiki%2C%20Teams%20Channel%2C%20...)%20where%20the%20Admins%20of%20both%20Subscriptions%20can%20communicate%20and%20discuss%20about%20experience%2C%20new%20Features%2C%20Problems%20and%20grab%20some%20KnowHow%20from%20each%20other%20Team.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
New Contributor

Good Day All,

 

I do hope someone here could point me in the correct direction in finding an answer. I am a noob on the Azure platform so please go easy hahaha.

 

I work for a large corporate, within this organization we have 2 IT departments.

 

  1.  IT Department 1:
    Services internal organizational IT needs only. Purely on prem solutions, hosted on physical servers, using Hyper-V as a the only hypervisor. All solutions hosted in this department is accessed by internal staff ONLY. 
  2. IT Department 2: (Which I am part of)
    This department is tasked with cloud based solutions, predominantly making use of IaaS, which is hosted on a non-popular cloud vendor platform. 

    Let's break it down to properly understand this:
    Services internal departments solutions which are sold to external clients (So in Laymans terms, Our internal departments develop some super application, they sell it to external clients, and IT Department 2 is now responsible for hosting this solution)

    The reason for this , is due to the need for external client access, we have to segregate internal and external access. 

    Dilema: 
    IT Department 2, now needs to move all the servers from the "non Popular" cloud, to Azure. Which is easy enough. The problem is that IT Department 1, will at some stage start moving workloads to Azure as well. BUT we need to ensure that IT department 2 which is the main Azure account holder, has the highest control of the Azure portal, and when IT Department 1 comes on board at some stage, that there is limited access, and IT department 1 will not be able to see what IT Department 2 has and does in Azure.

    We are 2 completely different departments 

So i have done my research and I understand that this can be split using 2 different subscriptions, and things like RBAC. But how and what would be the best way to do this?

 

Please advise if possible

8 Replies
Highlighted

You are on the right track! This can be accomplished technically within one subscription and using Role Based Access Control. One item to consider is if you want detailed breakdown of billing you may want to split resources across two subscriptions. If you don't you will have to tag resources to disseminate costs. RBAC is the preferred and best method to accomplish this.  @Chavoos 

Highlighted

@Bryan Haslip

Thanks Bryan,

 

That being said, we would prefer to separate the billing for external and internal. BUT at the same time use tagging as for example:

 

For both Subscriptions

Multiple Resource groups, as each client will need its own resource group and under each resource group, tags will need to be associated with certain resources. 

 

However the 2 departments should not be able to see each others billing. (I'm of the assumption that this too will be done using RBAC)

 

I hope this makes sense?


 

Highlighted

@Chavoos

 

That makes perfect sense! Hopefully I did not convey that it was one or the other with the split subscription and tagging. You can certainly use both and I would suggest it.

 

As for limiting the view into the billing information you can certainly do this by using some of the predefined roles within Azure RBAC. The other option is you can create your own role with very specific privileges tailored to your exact need. Same rules apply that these are inherited to any nested resources. Example would be if they have that role on a resource group it would be automatically inherited to the resources contained within. One of the awesome features of RBAC is it can be applied to individual resources. One other suggestion is to create groups and assign the roles to those. This will help as things grow to keep track of permissions!

 

Hopefully you find this helpful!

Highlighted
The best means for permission in Azure is RBAC with Roles already defined, however you may have to customize these permissions where I advise:

Custom roles for Azure resources
https://docs.microsoft.com/bs-cyrl-ba/azure/role-based-access-control/custom-roles

Tutorial: Create a custom role for Azure resources using Azure PowerShell
https://docs.microsoft.com/en-us/azure/role-based-access-control/tutorial-custom-role-powershell
Highlighted

Thank you all for the advice, we are currently busy looking at the options as well as the best practices and will try to incorporate this.

 

It seems that the RBAC way is where we will do the split as this is how our "mothership" does it on that side

 

thank you all once again

Highlighted

@Chavoos 

 

Hi, sounds like a scenario i heard about some times.

 

To go ahead with 2 Subscriptions for the Cost separation sounds like a good way and also pairing this with tagging of ressources to maybe split those costs a bit more visual afterwards is a common and well known way.

 

While using two Subscriptions you can use Azure Management Groups for the global Management of those Subscriptions, when it is wanted. A Management Layer above pure RBAC if you want.

 

https://docs.microsoft.com/en-us/azure/governance/management-groups/index

 

I don't know how your Azure Resources will be managed, maybe Dept. 1 will manage only their Stuff and Dept. 2 may manage only their Stuff, but maybe there will be Admins working in both Subscriptions as they are responsible for Network or Monitoring. Then for those Admins those Management Groups might be more useful instead of give them RBAC rights on each single Resource.

 

Especially Network should always be well documented and communicated between those two Depts as they otherwise might ran in big Problems. Also with the linking of OnPremise components.

 

Hope i could have been a bit helpful.

 

Kind Regards, Peter

Highlighted
"I don't know how your Azure Resources will be managed, maybe Dept. 1 will manage only their Stuff and Dept. 2 may manage only their Stuff, but maybe there will be Admins working in both Subscriptions as they are responsible for Network or Monitoring. Then for those Admins those Management Groups might be more useful instead of give them RBAC rights on each single Resource."

I see each department working on their own stuff. That being everything segregated for now, however, the networking part is a bit different as we will receive a "super-net" which we will need to split between internal and external, so indeed, we will need to design the network layer extremely well
Highlighted

@Chavoos 

 

Ok, understood.

I strongly recommend that there is a platform, whatever (Wiki, Teams Channel, ...) where the Admins of both Subscriptions can communicate and discuss about experience, new Features, Problems and grab some KnowHow from each other Team.