Process Overview
A.L.I.G.N.
Cover
About
Overview
Assess
Leverage
Implement
Govern
Navigate
Close
Process Overview
A.L.I.G.N.
A structured process for delivering tailored Microsoft 365, Azure, and cloud platform solutions - across organizations of any size or sector.
Click any letter to jump to that phase →
Daniel Lepel
Principal Microsoft Cloud Architect
A
Assess
L
Leverage
I
Implement
G
Govern
N
Navigate
About
Daniel Lepel
20+ years designing, securing, and operating Microsoft cloud environments
Microsoft Cloud
Covers Microsoft 365 (email, Teams, SharePoint), Azure cloud infrastructure, and the security and compliance tools built across both platforms.
- from 64,000-user enterprise deployments to complex multi-tenant managed service platforms.
  • Microsoft 365 & Azure platform architecture
  • Microsoft Entra ID
    Microsoft Entra ID
    Microsoft's cloud identity platform (formerly Azure Active Directory) - manages who can sign in, what they can access, and under what conditions.
    , Zero Trust
    Zero Trust
    A security model that assumes no user or device is trusted by default - every access request is verified regardless of network location.
    , and identity governance
  • Endpoint management - Intune
    Microsoft Intune
    Microsoft's endpoint management platform - controls device configuration, app deployment, and compliance policies across Windows, iOS, Android, and Mac.
    , Autopilot
    Windows Autopilot
    Microsoft's zero-touch device provisioning service - new devices configure themselves automatically when first powered on, without IT needing to manually image them.
    , Defender
  • Microsoft Purview
    Microsoft Purview
    Microsoft's compliance and data governance platform - handles data classification, retention policies, eDiscovery, and audit logging.
    , compliance, and E5 capability enablement
  • PowerShell automation and infrastructure as code
01
Architect
Designs cloud platforms built to last
02
Strategist
Aligns technology decisions to business goals
03
Optimizer
Eliminates waste, improves operational efficiency
04
Innovator
Applies AI and emerging capabilities where they add real value
The Framework
The A.L.I.G.N. Process
A.L.I.G.N. is a structured, repeatable process for delivering cloud architecture that fits the organization, not a generic template applied regardless of context.
Each phase builds on the last. The result is a platform that is secure, well-governed, and built to support the people who depend on it every day.
Click any phase on the right to jump directly to it.
A
Assess
Understand the environment, identify gaps, define goals
L
Leverage
Select the right tools, apply best practices, build the plan
I
Implement
Deploy, configure, test, and enable with minimal disruption
G
Govern
Enforce policy, maintain security posture, maintain compliance
N
Navigate
Measure, optimize, and evolve as needs and technology change
A·L·I·G·N
Phase One
Assess
Problem & Need
  • Conduct discovery sessions to understand the current environment
    In Practice
    No two environments match their documentation. I map what's actually deployed before touching a single configuration - including shadow IT, licensing gaps, and undocumented dependencies.
  • Identify business objectives, pain points, and technical gaps
    In Practice
    The first question I ask every stakeholder: "What's the one thing that keeps your IT team up at night?" The answers usually tell me more than a formal requirements document.
  • Audit existing systems, processes, and tools for inefficiencies
    In Practice
    I use a structured checklist covering identity, endpoint management, security policies, and licensing utilization. Gaps in licensing overlap are one of the most common - and most overlooked - findings.
  • Map Azure subscription
    Azure Subscription
    A logical container for Azure resources. Subscriptions provide a billing boundary and access control boundary - the building block of landing zone design.
    and management group
    Management Groups
    Containers that sit above subscriptions in the Azure hierarchy. Policy and RBAC assignments at this level cascade down to every subscription and resource beneath them.
    structure to identify architectural debt and governance gaps
    In Practice
    Organizations that deployed Azure under time pressure often have everything in a single subscription - no management group hierarchy, no policy inheritance, no workload or environment separation. The assessment maps the gap between that flat structure and a properly governed landing zone, and sequences the remediation work so governance can be applied without disrupting running workloads.
  • Collaborate with stakeholders to prioritize goals and outcomes
    In Practice
    Priorities set by IT alone rarely match what the business actually needs. Getting both sides in the room early prevents costly rework later in the process.
  • Document findings to establish a verified baseline for planning
    In Practice
    A findings report isn't bureaucracy - it's the contract between what exists today and what we're building toward. Every subsequent decision references back to it.
A
"What is actually here,
and what actually matters?"
1
Environment audit - configuration, identity, and security posture verified against actual state, not documentation
2
Stakeholder alignment - what success looks like from both IT and business perspectives
3
Prioritized findings - not everything can be fixed at once; sequence matters as much as content
L·I·G·N
Phase Two
Leverage
Tools & Expertise
  • Recommend solutions tailored to the organization's needs and existing investments
    In Practice
    At Latham Pool Products, I replaced Mimecast entirely with M365 E5 native capabilities - eliminating the third-party licensing cost while improving coverage. The capability was already paid for.
  • Integrate existing systems with cloud platforms for consistent functionality
    In Practice
    Hybrid identity is the most common integration challenge. Entra Connect Sync
    Entra Connect Sync
    Synchronizes on-premises Active Directory accounts to Microsoft Entra ID, enabling a single identity to work seamlessly across both environments.
    handles most scenarios; the key is knowing which approach fits the environment.
  • Apply Azure landing zone
    Azure Landing Zone
    A pre-configured Azure environment based on Microsoft's Cloud Adoption Framework - includes management group hierarchy, policy assignments, subscription design, and network topology as a validated starting point.
    architecture and Cloud Adoption Framework
    Cloud Adoption Framework (CAF)
    Microsoft's structured guidance for cloud adoption - covers strategy, planning, governance, and platform design across the full lifecycle of Azure environments.
    principles as the structural foundation
    In Practice
    Microsoft's landing zone framework provides a validated starting point: management group hierarchy, policy assignments at the right level, subscription design aligned to workload and environment type. The question isn't whether to follow the framework - it's how to adapt it to the organization's specific compliance requirements, workload mix, and operational model.
  • Apply PowerShell and infrastructure automation to reduce manual overhead
    In Practice
    I use PowerShell for bulk user management, compliance reporting, tenant configuration exports, and Conditional Access
    Conditional Access
    A policy engine that evaluates sign-in risk, device health, and user context to decide whether to allow, block, or require additional verification for each access request.
    policy deployment - reducing hours of manual work to minutes.
  • Apply security, compliance, and scalability best practices throughout
    In Practice
    Best practices aren't a checklist applied in parallel - they're applied in order of risk. Identity controls first, then endpoint posture, then data protection. Sequencing matters.
  • Adapt solutions to fit industry-specific requirements and constraints
    In Practice
    Government environments need FedRAMP-aligned controls. Healthcare maps to HIPAA. Financial services require audit-ready logging. The platform adapts to the regulatory context - not the other way around.
L
"Use what works.
Build only what's missing."
1
Investment review - identify what's already licensed and underused before recommending new tools
2
Tool selection - Microsoft-native first; third-party only where it fills a real, defined gap
3
Automation strategy - PowerShell, policy, and AI-assisted operations applied where they reduce risk and overhead
A·L·I·G·N
Phase Three
Implement
Solutions That Hold Up
  • Develop detailed implementation plans with clear timelines and milestones
    In Practice
    Every plan includes a pilot group, defined success criteria, and a rollback path before any production change is made. The rollback plan is not optional.
  • Deploy management group hierarchy, subscription structure, and hub-and-spoke
    Hub-and-Spoke Network Topology
    An Azure network architecture where a central hub VNet hosts shared services (firewall, DNS, connectivity) and spoke VNets per workload or environment connect through it - providing centralized control with workload isolation.
    network topology in the correct sequence
    In Practice
    Management groups first, then Azure Policy assignments at the right level, then network topology - hub VNet with shared services, spoke VNets per workload or environment. Building in the wrong order means retroactively applying governance to resources that were created before the guardrails existed. That remediation is harder than building it right the first time.
  • Configure systems including Microsoft Entra ID
    Microsoft Entra ID
    Microsoft's cloud identity platform - manages authentication, authorization, and risk-based access decisions across all cloud services.
    , Intune, and Microsoft Defender
    In Practice
    These three together cover identity, endpoint, and threat protection - the core of a Zero Trust posture. They're configured as an integrated system, not independently.
  • Perform thorough testing to confirm solutions meet requirements before broad deployment
    In Practice
    Every configuration change is tested in a non-production environment first, then validated with a pilot group before expanding. No big-bang rollouts when a phased approach is possible.
  • Provide hands-on training and documentation for operations teams
    In Practice
    I write runbooks the ops team can actually follow - not architecture documents that sit on a SharePoint no one visits. If the team can't operate what was built, the project isn't finished.
  • Manage phased rollouts to minimize disruption to daily operations
    In Practice
    Pilot → validate → expand. Stakeholders get visibility into each phase before the next begins. Surprises in production are a planning failure, not a technical one.
I
"Deploy with precision.
Validate at every step."
1
Phased deployment - pilot, validate, expand; surprises in production are a planning failure
2
Configuration validation - automated checks against defined baselines before and after each change
3
Knowledge transfer - operations teams can support what was built; documentation reflects actual state
A·L·I·G·N
Phase Four
Govern
Governance & Security
  • Establish and enforce policy baselines using Azure Policy
    Azure Policy
    A governance service that enforces organizational rules on Azure resources - can audit, deny, or automatically remediate non-compliant configurations.
    and Defender for Cloud
    In Practice
    Azure Policy prevents non-compliant resources from being created in the first place. Defender for Cloud scores posture continuously and surfaces drift before it becomes an incident.
  • Apply Azure Policy
    Azure Policy
    A governance service that enforces organizational rules on Azure resources at any scope - can audit, deny, or automatically remediate non-compliant configurations.
    and RBAC
    Azure Role-Based Access Control (RBAC)
    Controls who can do what with Azure resources. Assignments made at management group level cascade to every subscription and resource group beneath, ensuring consistent access control without manual replication.
    at management group level to enforce governance across all subscriptions through inheritance
    In Practice
    Policy applied at the management group level cascades to every subscription and resource group below it. That inheritance model is the architectural difference between governance that holds at scale and governance that gets worked around. RBAC design at the same level ensures role assignments are consistent without being manually replicated across every subscription.
  • Apply Conditional Access
    Conditional Access
    A policy engine that evaluates sign-in risk, device health, and user context to decide whether to allow, block, or require MFA - the enforcement point of Zero Trust.
    policies aligned to Zero Trust principles
    In Practice
    A well-designed Conditional Access policy set is one of the highest-ROI security investments in any M365 environment. Most organizations have it partially configured; few have it fully and correctly applied.
  • Define and govern administrative role boundaries through Entra ID PIM
    Privileged Identity Management (PIM)
    Grants admin access only when needed, for a defined time window, with optional approval - then removes it automatically. Eliminates standing privileged access.
    In Practice
    Standing Global Administrator access is one of the most common findings in any security audit. PIM eliminates it with just-in-time elevation and approval workflows.
  • Monitor for configuration drift and remediate deviations from baseline
    In Practice
    I configure monitoring that alerts when a setting deviates from the approved baseline - before it becomes a vulnerability or a compliance finding. Drift is inevitable; undetected drift is the problem.
  • Maintain compliance posture through Microsoft Purview
    Microsoft Purview
    Microsoft's compliance and data governance platform - handles data classification, retention policies, eDiscovery, and audit logging across M365 and Azure.
    and audit logging
    In Practice
    Purview handles data classification, retention, and eDiscovery. At Latham Pool Products, I worked directly with Legal to build hold policies that held up in practice - not just on paper.
G
"What isn't governed
eventually breaks."
1
Policy enforcement - Azure Policy, Conditional Access, and Defender for Cloud working as an integrated system
2
Identity governance - least privilege enforced through PIM, access reviews on a defined cycle
3
Compliance visibility - Purview, audit logging, and retention aligned to regulatory requirements
A·L·I·G·N
Phase Five
Navigate
Continuous Improvement
  • Use analytics and operational feedback to measure platform performance
    In Practice
    I track Microsoft 365 admin center reporting, Defender Secure Score trends, and Azure Monitor over time - not just at project close. A platform that looked healthy at launch can degrade quietly.
  • Track cost attribution, subscription growth, and landing zone
    Azure Landing Zone
    A pre-configured, governed Azure environment. Landing zones are designed to evolve - new workloads land in new spokes, new subscriptions are vended into the existing hierarchy without architectural rework.
    evolution as workloads and organizational needs change
    In Practice
    A well-structured landing zone makes cost attribution possible from day one - cost centers map to subscriptions, tags enforce through policy, and Azure Cost Management surfaces variance by workload. Environments built without that structure spend months trying to retroactively untangle ownership. Navigate is where the investment in proper structure pays back.
  • Identify opportunities for optimization, cost efficiency, and capability expansion
    In Practice
    License utilization reviews frequently uncover significant waste - unused E5 licenses, duplicate tools, or underused capabilities that could replace paid third-party products entirely.
  • Track Microsoft and vendor roadmap changes and evaluate impact proactively
    In Practice
    Microsoft announces major changes at Ignite and Build. I track the roadmap and evaluate what's coming before the organization asks - so they're positioned to take advantage of new capabilities, not caught off guard by deprecations.
  • Provide ongoing support and regular operational reviews
    In Practice
    Regular check-ins prevent the "set it and forget it" problem - environments that look good at launch but degrade quietly as configurations drift and new capabilities go undeployed.
  • Anticipate future needs and adapt the architecture accordingly
    In Practice
    The organizations that stay ahead of the curve treat architecture as a living practice, not a project with an end date. Navigate is what keeps the platform aligned to where the organization is going - not just where it was.
N
"The finish line
is a moving target."
1
Performance measurement - operational health, security posture, and cost efficiency tracked over time
2
Roadmap awareness - ongoing evaluation of new Microsoft capabilities before they become urgent
3
Continuous alignment - the architecture evolves as the organization's needs and the platform do
Closing Thought
A.L.I.G.N.
This framework reflects how I approach every engagement: structured process, honest assessment, and a focus on building something that holds up after the project closes.
  • Assess - understand before designing
  • Leverage - use what fits, build only what's missing
  • Implement - deploy carefully, validate at every step
  • Govern - enforce and maintain what was built
  • Navigate - evolve as needs and technology change
Good architecture isn't about the technology - it's about whether the people relying on it can do their jobs without thinking about it.