Back to Blog

Data Landing Zones: Building Data Mesh Without Creating a Data Swamp

Control plane vs data plane, with governance that scales.

The problem (why "data lakes" turn into swamps)

Most enterprise data platforms fail for boring reasons:

Data Mesh is a reaction to that. But Data Mesh also fails if you don't provide a strong platform with guardrails.

A Data Landing Zone (DLZ) approach is the practical middle ground. Domains get autonomy to build data products. Central teams keep control of governance, identity, networking, and standards.

Core model (what scales)

Separate your world into:

If you mix these two, you get either:

This control-plane vs data-plane split maps directly to Microsoft's Cloud Scale Analytics (CSA) guidance.

The 6 decisions that prevent platform collapse

1) Subscription boundaries (don't "share one workspace")

Create a repeatable unit of scale:

This is the simplest way to enforce policy, budgets, RBAC boundaries, and operational ownership.

2) Identity-first access (kill storage keys and "shared admin")

Standardize on Microsoft Entra ID for:

Default pattern:

3) Networking (private by default, with one DNS strategy)

If you want regulated-grade governance:

If DNS is inconsistent, the platform becomes "randomly broken" per subnet.

4) Ingestion boundary (shared SHIR, not SHIR everywhere)

On-prem connectivity is where platforms get messy.

A stable pattern:

Avoid per-domain SHIR sprawl. It multiplies patching, incident ownership, firewall rules, and drift.

5) Governance with Purview (catalog or chaos)

Purview is not "nice to have" in Data Mesh. It is the mechanism that prevents duplication, enables discovery, and enforces trust.

Minimum governance bar:

6) Cost ownership (FinOps by subscription, not by apology)

Data Mesh fails when costs are shared and nobody feels the pain.

Set:

This changes behavior fast.

Reference architecture (what the diagram is telling you)

The diagram shows domains (Finance, Sales, Marketing), each owning:

The control plane holds:

That is "federated governance with centralized guardrails".

Diagram (Azure icons)

Control plane vs data plane for Data Landing Zones (CSA style)

Architecture Diagram

Data Landing Zones architecture showing control plane and data plane separation with Purview governance

What "good" looks like (operating model)

Platform team owns (control plane)

Domain team owns (data plane)

If you cannot clearly write "who owns what", incidents will bounce between teams.

Security and access control (where most teams get it wrong)

RBAC + ACL in ADLS Gen2

Use both, intentionally:

Best practice:

Private endpoints and public access

If you want to stop data exfiltration:

Managed identities everywhere

Prefer managed identity auth for:

This reduces secrets and rotation overhead.

SHIR reliability (the "hidden single point of failure")

SHIR is a tier-0 dependency if on-prem ingestion matters.

Minimum bar:

If SHIR is unstable, the platform looks unstable.

Practical Checklists

Control plane checklist (platform team)

Domain onboarding checklist (per DLZ)

Common pitfalls (what breaks first)

References

Microsoft Learn

Microsoft Blogs

GitHub

YouTube (Microsoft)

YouTube (Community)

Back to Blog