Awesome-omni-skill azure-enterprise-governance
Enterprise-grade Azure governance, security, and compliance framework. Combines Microsoft Cloud Adoption Framework (CAF) naming standards with comprehensive security architecture (Zero Trust), compliance frameworks (NIST, SOC2, PCI-DSS, HIPAA), and best practices. Provides naming validation, security audits, RBAC design, and compliance checklists for production-ready Azure deployments.
git clone https://github.com/diegosouzapw/awesome-omni-skill
T=$(mktemp -d) && git clone --depth=1 https://github.com/diegosouzapw/awesome-omni-skill "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/devops/azure-enterprise-governance" ~/.claude/skills/diegosouzapw-awesome-omni-skill-azure-enterprise-governance && rm -rf "$T"
skills/devops/azure-enterprise-governance/SKILL.mdAzure Enterprise Governance Framework
Overview
Master enterprise-level Azure governance, security, and compliance. This skill combines Microsoft Cloud Adoption Framework (CAF) naming standards with comprehensive security architecture (Zero Trust principles), compliance frameworks (NIST, SOC 2, PCI-DSS, HIPAA), and operational best practices. Design secure, compliant, and scalable Azure infrastructure aligned with industry standards.
Core Capabilities
1. Naming Convention Design & Validation
Design and validate Azure resource naming strategies that are:
- Compliant: Follow Microsoft Cloud Adoption Framework (CAF) standards
- Scalable: Support hundreds of resources across multiple environments
- Auditable: Enable automated compliance checking
- Human-friendly: Clear, consistent, and easy to parse
🎯 Interactive Decision Guide:
Use
references/naming-decision-guide.md for step-by-step guidance:
- Decision flowchart - Visual guide for choosing naming patterns
- Questionnaire - Answer questions to determine your needs
- Template library - Ready-to-use naming templates for common scenarios:
- Lab/Experimental environments (for learning and POC)
- Single application deployment (simple architectures)
- Microservices architecture (distributed systems)
- Multi-tenant SaaS (platform services)
- Interactive naming generator - Auto-generate naming schemes
📚 Detailed Reference:
See
references/naming-conventions.md for:
- Microsoft-recommended naming format
- Resource type abbreviations from official CAF documentation
- Naming constraints and restrictions per resource type
- Multi-environment naming strategies
- Hierarchical resource organization patterns
Usage Pattern:
- Start with decision guide: Run
for interactive helppython scripts/generate_naming.py - Review your organization structure (org, department, project)
- Select naming template based on scenario (lab, app, microservices, multi-tenant)
- Define abbreviations for resource types and environments
- Validate naming scheme:
python scripts/validate_naming.py --resource-group <name> - Apply naming scheme consistently across all resources
2. Security & Compliance Framework
Implement security controls across Azure infrastructure using:
- Zero Trust Architecture: Assume breach, verify everything
- NIST Cybersecurity Framework: Security standards and controls
- Azure Well-Architected Framework: Security pillar best practices
- Managed Identity: Eliminate shared credentials and key management
Reference
references/security-best-practices.md for:
- Identity and access management (IAM) patterns
- Network security and isolation strategies
- Data protection and encryption requirements
- Compliance frameworks (NIST, SOC 2, PCI-DSS, HIPAA)
- Security assessment checklist
- Common security misconfigurations and fixes
Key Security Principles:
- Never use secrets in code (use Key Vault + Managed Identity)
- Implement defense in depth (network, application, data layers)
- Enable monitoring and alerting on all resources
- Enforce role-based access control (RBAC)
- Require multi-factor authentication (MFA)
- Use private endpoints for sensitive services
- Encrypt data in transit and at rest
- Regular security assessments and penetration testing
3. Automated Validation & Compliance Checking
Validate resource naming and security configurations using Python scripts in
scripts/:
validate_naming.py
- Check resource names against CAF standards
- Verify naming constraints (length, characters, uniqueness)
- Detect naming pattern violations
- Generate compliance reports
- Usage:
python scripts/validate_naming.py --resource-group mygroup --check-all
security_audit.py
- Audit Azure resources for security misconfigurations
- Check for managed identity usage
- Verify encryption settings (data, transport)
- Validate network isolation (NSGs, private endpoints)
- Identify overly permissive RBAC assignments
- Generate security assessment report
- Usage:
python scripts/security_audit.py --resource-group mygroup --severity high
compliance_checker.py
- Verify compliance with organizational policies
- Check naming convention compliance
- Validate security controls alignment
- Generate audit trail for compliance documentation
- Support multiple compliance frameworks (NIST, SOC2, etc.)
- Usage:
python scripts/compliance_checker.py --framework nist --resource-group mygroup
4. Organization Hierarchy & Governance
Structure Azure resources using hierarchies that support:
- Multi-tenant organizations: Separate by customer/tenant
- Environment management: dev, test, stg, prod isolation
- Cost allocation: Easy chargeback and cost center mapping
- Access control: Align resource hierarchy with RBAC
- Disaster recovery: Regional isolation and failover strategy
Hierarchy Template:
Subscription (billing boundary) ├── Resource Group: rg-{org}-{workload}-{env} │ ├── Compute: asp-{org}-{workload}-{env} │ ├── Storage: st{org}{env}001 │ ├── Database: sqldb-{org}-{workload}-{env} │ └── Security: kv-{org}-{env} ├── Resource Group: rg-{org}-{workload}-{env} └── Resource Group: rg-{org}-platform-{env}
Best Practices Checklist
Before Deployment
- Naming Validated: Run
against all resource namesvalidate_naming.py - Security Review: Complete
checklistsecurity-best-practices.md - RBAC Configured: Use managed identities, no shared credentials
- Encryption Enabled: Data at rest and in transit encrypted
- Monitoring Setup: Application Insights, Log Analytics configured
- Network Isolation: Private endpoints for sensitive services
- Compliance Check: Run
for your frameworkcompliance_checker.py - Documentation: Resource hierarchy and naming documented
- Access Control: Principle of least privilege applied
- Backup Strategy: Automated backups configured and tested
Post-Deployment
- Audit Baseline: Run
to establish baselinesecurity_audit.py - Monitoring Active: Alerts configured for security events
- Regular Reviews: Monthly compliance and security reviews
- Access Reviews: Quarterly RBAC access reviews
- Threat Analysis: Regular threat modeling and updates
- Incident Response: Runbooks documented and tested
- Disaster Recovery: DR procedures documented and practiced
Common Use Cases
Scenario 1: Migrate 100+ Resources to Compliant Naming
# Validate current resources python scripts/validate_naming.py --resource-group oldgroup --check-all # Identify violations python scripts/validate_naming.py --resource-group oldgroup --report violations.json # Create migration plan with new compliant names # Use references/naming-conventions.md to determine new names
Scenario 2: Implement Zero Trust Security
- Review
section on Zero Trustreferences/security-best-practices.md - Audit current state:
python scripts/security_audit.py --resource-group mygroup - Identify gaps compared to Zero Trust checklist
- Implement controls: Managed Identity, Private Endpoints, NSGs
- Re-audit and validate:
python scripts/security_audit.py --resource-group mygroup
Scenario 3: Prepare for SOC 2 / HIPAA Compliance
- Select compliance framework:
python scripts/compliance_checker.py --framework soc2 - Review required controls in
references/security-best-practices.md - Generate gap analysis report
- Implement required security controls
- Document compliance evidence and controls
- Schedule regular audits:
python scripts/compliance_checker.py --framework soc2 --schedule monthly
Scenario 4: Design Multi-Tenant Naming Strategy
- Review
section on multi-tenant patternsreferences/naming-conventions.md - Define tenant/customer identifier (e.g., tenant ID, subdomain)
- Create resource group naming pattern:
rg-{tenant}-{workload}-{env} - Map resources to resource groups by tenant
- Enforce access isolation using RBAC and subscriptions per tenant
Related Skills
- azure-expert: Comprehensive Azure service architecture and deployment
- skill-creator: Create and manage AI skills in VS Code