Skip to content

Conversation

@MrCaedes
Copy link
Contributor

@MrCaedes MrCaedes commented Jan 9, 2026

Overview

This PR introduces a new Azure Policy definition as part of /Network.

The policy enables for CIDRs to be configured as non-usable by subnets; this can be useful in self-governing teams where a large range is allocated - but wish to earmark portions for specific purposes, such as future expansion, shared services, etc.

Problem Statement

In enterprise environments with decentralized subscription ownership, teams often receive large IP address allocations to manage independently. Without guardrails, there's a risk that subnets could inadvertently consume IP ranges earmarked for,

  • Shared Services (e.g., if the team is offering a service to others)
  • Future Growth (e.g., planned expansions of AKS, etc)

What the Policy Does

This policy uses ipRangeContains to perform bi-directional overlap detection.

The intent is for this to be used in combination with "Exemptions", to provide just-in-time provisioning ability - whilst providing a hard guardrail.

If Azure Policy becomes identity-aware in the future, there is also scope for this to be used such that only X user may leverage specific ranges - useful in platform-team scenarios.

Addition of new policy definition under /Network, which facilitates blocking the use of reserved ranges - ideal in enterprise environments where ranges have/are being reserved for specific use-cases.

Users can leverage exemptions or exclusions to facilitate subnet deployment; if Azure Policy becomes identity aware in the future, too, there is room for platform-team exclusions, etc.
From `azurepolicy.json`, addition of `Disabled` as a valid parameter.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant