Azure Citadel
  • Blogs

  • Azure Arc
    • Overview
    • Azure Arc-enabled Kubernetes
      • Prereqs
      • Background
      • Deploy Cluster
      • Connect to Arc
      • Enable GitOps
      • Deploy Application
      • Enable Azure AD
      • Enforce Policy
      • Enable Monitoring
      • Enable Azure Defender
      • Enable Data Services
      • Enable Application Delivery
    • Azure Arc-enabled Servers
      • Prereqs
      • Scenario
      • Hack Overview
      • Azure Landing Zone
      • Arc Pilot resource group
      • Azure Monitoring Agent
      • Additional policy assignments
      • Access your on prem VMs
      • Create onboarding scripts
      • Onboarding using scripts
      • Inventory
      • Monitoring
      • SSH
      • Windows Admin Center
      • Governance
      • Custom Script Extension
      • Key Vault Extension
      • Managed Identity
    • Useful Links
  • Azure CLI
    • Install
    • Get started
    • JMESPATH queries
    • Integrate with Bash
  • Azure landing zone
    • Overview
    • Run the ALZ Accelerator
      • Prereqs
      • Elevate
      • Bootstrap
      • Demote
      • Browse the deployed resources
    • Deploy an Azure landing zone
      • What is the Azure landing zone?
      • Create an initial ALZ config
      • Add a local override library
      • Test locally
      • Run through the CI/CD workflow
    • Understanding libraries
      • What is a library?
      • Policies, Assignments and Roles
      • Archetypes, Overrides and Architecture
      • Metadata and Policy Default Values
      • Custom libraries
    • Reference configs
      • Azure landing zone library
      • Azure landing zone library with overrides
  • Azure Lighthouse
    • Minimal Lighthouse definition
    • Using service principals
    • Privileged Identity Management
  • Azure Policy
    • Azure Policy Basics
      • Policy Basics in the Azure Portal
      • Creating Policy via the CLI
      • Deploy If Not Exists
      • Management Groups and Initiatives
    • Creating Custom Policies
      • Customer scenario
      • Policy Aliases
      • Determine the logic
      • Create the custom policy
      • Define, assign and test
  • Marketplace
    • Introduction
      • Terminology
      • Offer Types
    • Partner Center
    • Offer Type
    • Publish a VM Offer HOL
      • Getting Started
      • Create VM Image
      • Test VM Image
      • VM Offer with SIG
      • VM Offer with SAS
      • Publish Offer
      • Other VM Resources
    • Publish a Solution Template HOL
      • Getting Started
      • Create ARM Template
      • Validate ARM Template
      • Create UI Definition
      • Package Assets
      • Publish Offer
    • Publish a Managed App HOL
      • Getting Started
      • Create ARM Template
      • Validate ARM Template
      • Create UI Definition
      • Package Assets
      • Publish Offer
    • Managed Apps with AKS HOL
    • Other Managed App Resources
    • SaaS Offer HOLs
    • SaaS Offer Video Series
      • Video 1 - SaaS Offer Overview
      • Video 2 - Purchasing a SaaS Offer
      • Video 3 - Purchasing a Private SaaS Plan
      • Video 4 - Publishing a SaaS Offer
      • Video 5 - Publishing a Private SaaS Plan
      • Video 6 - SaaS Offer Technical Overview
      • Video 7 - Azure AD Application Registrations
      • Video 8 - Using the SaaS Offer REST Fulfillment API
      • Video 9 - The SaaS Client Library for .NET
      • Video 10 - Building a Simple SaaS Landing Page in .NET
      • Video 11 - Building a Simple SaaS Publisher Portal in .NET
      • Video 12 - SaaS Webhook Overview
      • Video 13 - Implementing a Simple SaaS Webhook in .NET
      • Video 14 - Securing a Simple SaaS Webhook in .NET
      • Video 15 - SaaS Metered Billing Overview
      • Video 16 - The SaaS Metered Billing API with REST
  • Microsoft Fabric
    • Theory
    • Prereqs
    • Fabric Capacity
    • Set up a Remote State
    • Create a repo from a GitHub template
    • Configure an app reg for development
    • Initial Terraform workflow
    • Expanding your config
    • Configure a workload identity
    • GitHub Actions for Microsoft Fabric
    • GitLab pipeline for Microsoft Fabric
  • Packer & Ansible
    • Packer
    • Ansible
    • Dynamic Inventories
    • Playbooks & Roles
    • Custom Roles
    • Shared Image Gallery
  • Partner Admin Link
    • Understanding PAL
    • User and guest IDs
    • Service principals with credentials
    • CI/CD pipelines & OpenID Connect
    • Using AzAPI in Terraform
    • PAL tagging with a service principal
    • Azure Lighthouse & PAL
    • PAL FAQ
  • REST API
    • REST API theory
    • Using az rest
  • Setup
  • Sovereign landing zone
    • Overview
    • Run the ALZ Accelerator
      • Prereqs
      • Elevate
      • Bootstrap
      • Demote
      • Components
    • Deploy Sovereign landing zone
      • Create an initial SLZ config
      • Add a local override library
      • Test locally
      • Run through the CI/CD workflow
    • Understanding libraries
      • What is a library?
      • Policies, Assignments and Roles
      • Archetypes, Overrides and Architecture
      • Metadata and Policy Default Values
      • Custom libraries
    • Reference configs
      • Sovereign landing zone
      • Sovereign landing zone library with overrides
      • SLZ extended with a country pack
  • Terraform
    • Fundamentals
      • Initialise
      • Format
      • Validate
      • Plan
      • Apply
      • Adding resources
      • Locals and outputs
      • Managing state
      • Importing resources
      • Destroy
    • Get set up for Terraform
      • Cloud Shell
      • macOS
      • Windows with PowerShell
      • Windows with Ubuntu in WSL2
    • Using AzAPI
      • Using the REST API
      • azapi_resource
      • Removing azapi_resource
      • azapi_update_resource
      • Data sources and outputs
      • Removing azapi_update_resource
  • Virtual Machines
    • Azure Bastion with native tools & AAD
    • Managed Identities

  • About
  • Archive
  1. Home
  2. Blog
  3. Updated Sovereign landing zone

Table of Contents

  • Introduction
  • New Local management group
  • Updated sovereign policy set naming
  • Updated architecture
  • Updating your configuration
  • Next

Updated Sovereign landing zone

Richard Cheney • 29 Apr 2026

Table of Contents

  • Introduction
  • New Local management group
  • Updated sovereign policy set naming
  • Updated architecture
  • Updating your configuration
  • Next

Introduction

The platform library has been updated to 2026.04.2. This update brings two notable changes: a new Local management group in the landing zones hierarchy, and a cleaner, layered naming convention for the sovereign policy sets.

Details from the Microsoft team are in the Tech Community blog post. Sovereign landing zone has a dependency on Azure landing zone and that has also been updated and gets the Local management group. The releases are found on the front page of the ALZ library.

Note that this update to the Azure Citadel documentation was created by GitHub Agent. I like to be explicit when I use AI to create content. I figured this was a good use case as it is an update without changing the flow of the labs and what they are trying to help you achieve in your learning. If you are interested in the issue, agent assignment, and pull request flow then I’ll blog separately about that.

New Local management group

Both ALZ and SLZ now include a Local management group under Landing zones. This provides a dedicated place for workloads that must stay within a specific geographical boundary or that have specific local compliance requirements that differ from the standard Corp and Online archetypes.

Updated sovereign policy set naming

The sovereign archetypes have been renamed to clearly reflect the layered L1 / L2 / L3 policy set model:

Old archetype New archetype Scope
sovereign_root sovereign_l1_controls Root management group only
(implicit on platform/landing zone MGs) sovereign_l2_controls Platform children + Corp, Online, Confidential MGs
(implicit on confidential MGs) sovereign_l3_controls Confidential Corp and Confidential Online only

The new naming makes the scope of each policy set immediately obvious:

  • L1 – broadest controls applied at the SLZ root
  • L2 – standard sovereign controls applied across platform and landing zone management groups
  • L3 – the most restrictive controls reserved for confidential workloads

Updated architecture

The updated SLZ architecture now looks like this:

flowchart TD slz["Sovereign landing zone (root, sovereign_l1_controls)"] slz --> decommissioned decommissioned["Decommissioned (decommissioned)"] slz --> landingzones landingzones["Landing zones (landing_zones)"] landingzones --> confidential_corp confidential_corp["Confidential Corp (corp, sovereign_l2_controls, sovereign_l3_controls)"] landingzones --> confidential_online confidential_online["Confidential Online (online, sovereign_l2_controls, sovereign_l3_controls)"] landingzones --> corp corp["Corp (corp, sovereign_l2_controls)"] landingzones --> local local["Local (local)"] landingzones --> online online["Online (online, sovereign_l2_controls)"] landingzones --> public public["Public (public)"] slz --> platform platform["Platform (platform)"] platform --> connectivity connectivity["Connectivity (connectivity, sovereign_l2_controls)"] platform --> identity identity["Identity (identity, sovereign_l2_controls)"] platform --> management management["Management (management, sovereign_l2_controls)"] platform --> security security["Security (security, sovereign_l2_controls)"] slz --> sandbox sandbox["Sandbox (sandbox)"]

Updating your configuration

Update the ref in your provider block to point to the new release:

provider "alz" {
  library_overwrite_enabled = true
  library_references = [
    {
      path = "platform/slz"
      ref  = "2026.04.2"
    }
  ]
}

If you are using a local override library, update the dependency in your lib/alz_library_metadata.json:

{
  "$schema": "https://raw.githubusercontent.com/Azure/Azure-Landing-Zones-Library/main/schemas/library_metadata.json",
  "name": "local",
  "display_name": "ALZ Accelerator - Azure Verified Modules for SLZ Platform Landing Zone",
  "description": "This library allows overriding policies, archetypes, and management group architecture in the ALZ Accelerator.",
  "dependencies": [
    {
      "path": "platform/slz",
      "ref": "2026.04.2"
    }
  ]
}

Remember to update your local architecture definition and archetype override files to include the new local management group and to rename sovereign_root_custom override files to sovereign_l1_controls_custom.

Next

The updated Sovereign landing zone examples have been refreshed to reflect the 2026.04.2 release. Head there for complete worked examples.

Source: https://www.azurecitadel.com/blog/2026-04-29-slz-2026-04-2/
Author: Richard Cheney
Published: 29 Apr 2026
Printed: