Multi-Cloud Landing Zone for Financial Services
Fortune 500 Financial Institution
// The Challenge
A major financial institution had grown through acquisition, inheriting three separate cloud environments—AWS, Azure, and GCP—each with its own security posture, identity system, and compliance gaps. Their auditors were threatening to halt cloud expansion until governance was unified.
// Constraints
- SOC 2 Type II and PCI-DSS compliance required
- Zero downtime migration window
- Existing applications could not be modified
- 200+ engineers needed onboarding to new patterns
// Outcome
- Passed SOC 2 audit with zero findings
- Reduced cloud spend by 34% through visibility
- Deployment velocity increased 5x
- Mean time to provision dropped from 2 weeks to 4 hours
// Solution
We designed and implemented a unified multi-cloud landing zone using a hub-and-spoke architecture. AWS Transit Gateway and Azure Virtual WAN served as regional hubs, with cross-cloud connectivity via dedicated interconnects. Identity was federated through Okta with SCIM provisioning to each cloud. Security policies were codified in Open Policy Agent and enforced through CI/CD gates.
// Sample Code
# Unified tagging policy across all clouds
resource "opa_policy" "mandatory_tags" {
name = "mandatory-resource-tags"
deny[msg] {
not input.resource.tags["cost-center"]
msg := "All resources must have a cost-center tag"
}
deny[msg] {
not input.resource.tags["data-classification"]
msg := "All resources must have data-classification"
}
}