Platform Engineering Best Practices: Comprehensive Guide to Standardized Landing Zones, Developer Self-Service, and Guardrails
Introduction
In today’s cloud-native world, platform engineering has emerged as a critical discipline enabling organizations to deliver developer-friendly cloud environments that balance agility, security, and operational excellence. One of the foundational elements of platform engineering is the concept of Standardized Landing Zones—reference design blueprints that provide a secure, scalable, and repeatable foundation for cloud onboarding.
This article provides a detailed, practical exploration of standardized landing zones, how they enable developer self-service, and the guardrails that ensure compliance and governance. We will draw on best practices from Oracle Cloud Infrastructure (OCI) landing zones, but these concepts apply broadly across cloud platforms.
1. Understanding Standardized Landing Zones
A Standard Landing Zone is more than just an infrastructure deployment—it’s a comprehensive, opinionated blueprint designed to onboard and run cloud workloads efficiently and securely. It encapsulates security, network topology, and operational best practices into a coherent package that can be versioned, reused, and extended.
Core Characteristics
- Complete: Integrates security, networking, and operations considerations into a unified design.
- Scalable: Designed to grow with your organization across teams, projects, and workload types.
- Runnable: Fully translatable into Infrastructure as Code (IaC) configurations.
- Configurable: Uses human-readable IaC configurations rather than opaque code.
- Versionable: All configurations are source-controlled, serving as the single source of truth.
- Reusable: Blueprints and IaC can be adapted for new scenarios.
- Extendable: Supports plug-in add-ons without disrupting core infrastructure.
- Open: Publicly available for community and enterprise use.
Why Standardization Matters
Standardized landing zones reduce the complexity of cloud adoption by providing a consistent starting point. They enable platform teams to enforce security and operational best practices upfront, reduce manual errors, and accelerate developer onboarding through self-service models.
2. Popular Landing Zone Blueprints and Their Use Cases
Several landing zone blueprints exist to cater to different organizational scopes and workload complexities. Here’s an overview of three common OCI landing zone blueprints, illustrating how they scale from small to large enterprise environments.
2.1 OCI Core Landing Zone (Quickstart)
- Size: Extra Small to Small (XS-S)
- Architecture: Hub-and-spoke topology with a general-purpose three-tier architecture
- Use Case: Ideal for teams or small projects needing a quick but robust cloud foundation
- Features: Basic network segregation, security policies, and foundational services
2.2 OCI Open Landing Zone (One or Multiple Operating Entities)
- Size: Medium to Large (M-L)
- Architecture: Supports onboarding of single or multiple Operating Entities (OEs) within one OCI tenancy
- Use Case: Organizations managing multiple business units or subsidiaries requiring isolated environments
- Features: Strong security posture, network segregation, shared central services, adaptable environments per OE
2.3 OCI Open Landing Zone (Multi-Tenancy)
- Size: Large to Extra Extra Large (L-XXL)
- Architecture: Multi-tenancy model with dedicated tenancies for organizations and shared services
- Use Case: Enterprises with complex, multi-organization cloud footprints, such as global businesses or managed service providers
- Features: Highest segregation capabilities, hub-hub models, workload environments, extensive governance controls
Visualizing the Architectures
Each blueprint uses color-coded diagrams to depict resource types, network layouts, and service boundaries, helping teams grasp the complex interdependencies.
3. Developer Self-Service Enabled by Landing Zones
A key outcome of implementing standardized landing zones is enabling developer self-service. Developers can provision, manage, and operate cloud resources within guardrails without waiting for manual intervention from platform or operations teams.
Benefits of Developer Self-Service
- Faster Time to Market: Developers deploy environments and applications on demand.
- Consistency: IaC templates ensure environments adhere to organizational standards.
- Reduced Operational Load: Platform teams focus on platform improvements rather than repetitive requests.
Implementing Developer Self-Service
- Expose Modular IaC: Provide human-readable Terraform or similar templates for common configurations.
- Use Automation Tools: Integrate with tools like Oracle Resource Manager or Terraform CLI to automate provisioning.
- Define Clear Boundaries: Use roles, policies, and quota limits to prevent resource sprawl or security risks.
Practical Example
Here is a simplified Terraform snippet to provision a network compartment with guardrails:
provider "oci" {
tenancy_ocid = var.tenancy_ocid
region = var.region
}
resource "oci_identity_compartment" "dev_compartment" {
name = "DevTeam"
description = "Compartment for Development Team Resources"
compartment_id = var.root_compartment_id
}
resource "oci_network_security_group" "dev_nsg" {
compartment_id = oci_identity_compartment.dev_compartment.id
vcn_id = var.vcn_id
display_name = "DevNSG"
}
resource "oci_identity_policy" "dev_policy" {
name = "DevTeamPolicy"
compartment_id = var.root_compartment_id
statements = [
"Allow group DevTeam to manage all-resources in compartment DevTeam"
]
}
Developers can extend and customize such modules within guardrails provided by the platform team.
4. Guardrails: Ensuring Governance and Compliance
Guardrails are the automated policies and controls embedded within landing zones that prevent misconfigurations, enforce security, and ensure compliance without hindering developer agility.
Types of Guardrails
- Security Policies: Define who can access resources and with what privileges.
- Network Segmentation: Enforce subnet and routing policies to isolate workloads.
- Resource Quotas: Limit resource consumption to control costs and prevent abuse.
- Audit and Monitoring: Integrated logging and monitoring for proactive issue detection.
Best Practices for Guardrails
- Shift Left Controls: Integrate security policies early in the IaC and CI/CD pipelines.
- Automate Enforcement: Use cloud native policy engines (e.g., OCI Policies, OPA) to automatically enforce rules.
- Version Control Policies: Treat policies as code, versioning them alongside infrastructure code.
- Educate Developers: Provide clear documentation and training to minimize friction.
Example: OCI Policy Statement
resource "oci_identity_policy" "security_policy" {
name = "DenyPublicAccess"
compartment_id = var.root_compartment_id
statements = [
"Deny group AllUsers to use virtual-network-family in tenancy where target.virtual-network.vcn.is-public = true"
]
}
This policy denies all users from creating public VCNs, enforcing network security best practices.
5. Implementing Your Landing Zone: Step-by-Step
Step 1: Select the Blueprint
Choose the landing zone blueprint that matches your organizational scope and workload size:
- Small projects: OCI Core Landing Zone
- Multiple business units: OCI Open Landing Zone (One or Multiple OEs)
- Large enterprises with multi-tenancy needs: OCI Open Landing Zone (Multi-Tenancy)
Step 2: Tailor the Design
Review the selected blueprint and adjust parameters to your unique requirements. Consider network CIDR ranges, compartment structures, security policies, and operational processes.
Step 3: Review and Customize IaC
Examine the Terraform or equivalent IaC configurations. Adapt resource types, naming conventions, and parameters. Incorporate workload-specific extensions as needed.
Step 4: Deploy Using Automation Tools
Leverage OCI Terraform CLI, Oracle Resource Manager, or your preferred automation tooling to deploy the landing zone. Keep the IaC in Git repositories for version control and audit.
Step 5: Extend and Evolve
Use workload extensions to add new capabilities without disrupting the core landing zone. Continually refine guardrails and self-service capabilities based on user feedback and operational metrics.
6. Real-World Scenario: Multi-Department Cloud Onboarding
Consider a multinational corporation with multiple departments (Finance, R&D, Marketing) needing autonomous cloud environments but centralized governance.
- Blueprint: OCI Open Landing Zone with Multi-OE blueprint
- Implementation: Each department is an Operating Entity with its own compartment and network segmentation.
- Developer Self-Service: Department teams provision resources via standardized IaC modules with pre-approved configurations.
- Guardrails: Policies enforce data residency, encryption, and restricted internet access.
This approach enables agility within departments while ensuring enterprise-grade governance and compliance.
Conclusion
Standardized landing zones are a cornerstone of effective platform engineering, enabling secure, scalable, and compliant cloud environments. By combining detailed blueprints, developer self-service, and robust guardrails, organizations can accelerate cloud adoption while maintaining control.
Adopting these best practices requires thoughtful planning, collaboration between platform and development teams, and continuous improvement. Leveraging open-source landing zone blueprints like those from OCI can significantly reduce your time-to-value.
Start your journey today by selecting the right landing zone blueprint, tailoring it to your needs, and empowering your developers with self-service within well-defined guardrails.
References
- Oracle OCI Landing Zones GitHub: https://github.com/oracle-devrel/technology-engineering/tree/main/landing-zones
- OCI Core Landing Zone Quickstart: https://github.com/oci-landing-zones/terraform-oci-core-landingzone
- OCI Open Landing Zone: https://github.com/oracle-quickstart/terraform-oci-open-lz
Copyright (c) 2025 Oracle and/or its affiliates. Licensed under the Universal Permissive License (UPL), Version 1.0.