Zero Trust Hybrid Workload Architecture

Zero Trust Hybrid Workload Architecture

Identity-First Security for Hybrid Environments — Private Exposure, Segmentation & Secure Access

Identity-First Security for Hybrid Environments — Private Exposure, Segmentation & Secure Access

Description

This case study is an independent architecture design exercise developed to demonstrate Zero Trust security architecture methodology specifically for hybrid enterprise environments integrating on-premises Active Directory with Azure cloud workloads. It was not associated with a production deployment. The scenario is based on the security and governance requirements typical of organisations operating hybrid identity infrastructure alongside cloud-hosted workloads in regulated or compliance-sensitive environments.

This case study is an independent architecture design exercise developed to demonstrate Zero Trust security architecture methodology specifically for hybrid enterprise environments integrating on-premises Active Directory with Azure cloud workloads. It was not associated with a production deployment. The scenario is based on the security and governance requirements typical of organisations operating hybrid identity infrastructure alongside cloud-hosted workloads in regulated or compliance-sensitive environments.

Key Focus Areas:

  • Hybrid Identity Architecture

  • Zero Trust Access Governance

  • Private-Only Workload Exposure

  • Three-Tier Network Segmentation

  • Azure Bastion Secure Access

  • Entra Connect Hybrid Identity

Executive Summary

Architected a Zero Trust hybrid security architecture for enterprise environments integrating on-premises Active Directory with Azure cloud workloads — establishing identity-first access governance, private-only workload exposure, three-tier network segmentation, Just-in-Time administrative access through Azure Bastion, and centralised threat monitoring through Microsoft Sentinel.

The architecture addresses the specific security challenges of hybrid environments where identity spans both on-premises and cloud domains, workloads must remain privately exposed without public IP addresses, and administrative access must be governed without exposing RDP or SSH endpoints to the network.

Unlike purely cloud-native Zero Trust models, this architecture is designed for the operational reality of organisations with existing on-premises Active Directory investments — extending Zero Trust principles consistently across both identity domains without requiring full cloud migration.

Business Drivers

Hybrid enterprise environments face a distinct set of security challenges that purely cloud-native architectures do not encounter. On-premises Active Directory identities must be extended into Azure without creating authentication gaps or inconsistent access governance across the two domains. Cloud-hosted workloads must remain accessible to on-premises users and administrators without public network exposure. Administrative access paths must be governed without relying on VPN-dependent RDP or SSH connectivity.

This architecture was designed to address the security requirements of organisations where hybrid infrastructure creates the following operational risks:

  • Inconsistent identity governance across on-premises AD and Azure cloud resources — authentication strength and access policies diverge between domains

  • Public IP exposure of cloud-hosted workloads creating unnecessary attack surface accessible to external threat actors

  • Flat or insufficiently segmented network architectures enabling lateral movement between web, application, and database tiers following initial compromise

  • Overexposed administrative access through open RDP and SSH ports creating persistent high-value attack vectors

  • Limited centralised visibility into authentication activity and infrastructure events spanning both on-premises and cloud domains

  • Difficulty enforcing least-privilege access consistently across hybrid identity environments with mixed cloud and on-premises resource ownership

  • Increasing compliance requirements demanding measurable, auditable security controls across the full hybrid estate

Operational Constraints

The architecture was designed to operate within the following constraints specific to hybrid enterprise environments:

  • On-premises Active Directory is the authoritative identity source — cloud identity governance must extend from and remain consistent with on-premises identity management

  • Hybrid identity synchronisation must preserve on-premises group memberships, UPN formats, and password hash synchronisation for seamless cloud authentication

  • Administrative access to cloud workloads must remain operational for on-premises administrators without requiring direct public network exposure of management ports

  • Workload segmentation must accommodate three-tier application architectures where web, application, and database tiers have distinct connectivity and exposure requirements

  • Security controls must not introduce excessive operational friction for administrators or end users operating across both on-premises and cloud environments

  • Centralised monitoring must aggregate telemetry from both on-premises identity infrastructure and Azure cloud services into a unified visibility platform

  • All security controls must produce auditable evidence aligned to NIST SP 800-207 and CIS Controls v8 compliance requirements

Objectives

  • Establish unified hybrid identity governance extending on-premises Active Directory authentication into Azure through Entra Connect synchronisation

  • Enforce consistent Conditional Access policies governing authentication strength and device compliance across all hybrid identities regardless of resource location

  • Eliminate public IP exposure for all cloud-hosted workloads — no direct internet-accessible management or application endpoints

  • Implement three-tier network segmentation isolating web, application, and database workload tiers through NSG-enforced traffic controls

  • Secure all administrative access through Azure Bastion — eliminating open RDP and SSH port exposure entirely

  • Enforce Just-in-Time VM access reducing management port exposure windows to approved, time-bound access periods only

  • Centralise security telemetry from both hybrid identity infrastructure and Azure workloads into a unified Sentinel SIEM platform

  • Align all implemented controls with NIST SP 800-207 Zero Trust Architecture and CIS Controls v8 compliance frameworks

Architecture Principles

  • Never trust, always verify — no implicit trust based on network location or domain membership alone

  • Identity as the primary security perimeter — authentication decisions based on verified identity, device state, and contextual risk across both on-premises and cloud domains

  • Private-only workload exposure — public IP addresses eliminated from all workload and management surfaces

  • Segmentation by design — web, application, and database tiers are architecturally isolated with explicit allow rules governing inter-tier communication

  • Least-privilege operational access enforced through RBAC and JIT workflows across all administrative functions

  • Secure-by-default administrative access — Azure Bastion as the exclusive administrative path eliminating all direct management port exposure

  • Continuous monitoring across both identity domains — on-premises authentication events and cloud activity logs unified in a single SIEM platform

  • Compliance by design — security controls mapped to NIST and CIS framework requirements from the initial architecture phase

Architecture Overview

The solution is structured as a four-layer hybrid Zero Trust architecture addressing the specific challenges of hybrid identity, private workload exposure, three-tier segmentation, and centralised monitoring across both on-premises and cloud domains.

1. Hybrid Identity Control Plane

The identity layer establishes unified authentication governance across on-premises Active Directory and Azure Entra ID — the foundational requirement for consistent Zero Trust enforcement in hybrid environments.

Entra Connect — Hybrid Identity Synchronisation

Entra Connect synchronises on-premises Active Directory identities into Microsoft Entra ID, establishing a unified identity plane across both domains.

Synchronisation Component

Configuration

Purpose

Password Hash Synchronisation

Enabled

Cloud authentication without on-premises dependency

UPN Synchronisation

Matched to routable domain

Consistent user identity across domains

Group Synchronisation

Selective group sync

Cloud RBAC assignment from on-premises groups

Device Writeback

Enabled

Hybrid Azure AD join for Conditional Access device compliance

Seamless SSO

Enabled

Transparent authentication for domain-joined devices

Password Hash Synchronisation is selected over Pass-Through Authentication for this architecture — providing cloud authentication resilience independent of on-premises AD availability, which is critical for hybrid environments where on-premises connectivity cannot be guaranteed during incidents.

Conditional Access — Unified Access Governance

Conditional Access policies govern every authentication event for hybrid identities — enforcing consistent access requirements regardless of whether the resource is on-premises or cloud-hosted.

Policy

Conditions

Grant Controls

Require MFA — All Hybrid Users

All cloud apps, all hybrid identities

Require MFA

Block Legacy Authentication

Legacy auth protocols (NTLM, Basic Auth)

Block access

Require Compliant or Hybrid-Joined Device

Azure portal and management resources

Require Hybrid Azure AD joined or Intune compliant device

Location-Based Restriction

Authentication from outside named trusted locations

Require MFA + compliant device

Risk-Based Access Response

Entra Identity Protection: Medium or High risk

Require MFA + require password change

The device compliance policy specifically leverages Hybrid Azure AD join — enabling on-premises domain-joined devices to satisfy Conditional Access device requirements without requiring full Intune management, which is a critical accommodation for hybrid environments with existing on-premises device management.

2. Network Segmentation Control Plane

The network architecture implements private-only workload exposure with three-tier segmentation enforcing strict inter-tier traffic control through NSG-based micro-segmentation.

Private-Only Workload Exposure

All workloads in this architecture are deployed without public IP addresses. There are no internet-directly-accessible endpoints for application workloads, management interfaces, or administrative services. External application access is mediated through Azure Application Gateway or Azure Front Door where required — internal workloads never receive direct public IP assignment.

This eliminates the most common attack surface in hybrid cloud environments: publicly exposed workloads that are reachable by external threat actors before authentication controls are evaluated.

Three-Tier Network Architecture

Subnet

Tier

Permitted Inbound

Permitted Outbound

WebSubnet

Presentation tier

Application Gateway / Front Door only

AppSubnet only

AppSubnet

Application tier

WebSubnet only

DBSubnet + Azure services

DBSubnet

Data tier

AppSubnet only

Deny all outbound

BastionSubnet

Administrative access

Azure Bastion service tags only

VNet (RDP/SSH to targets)

ManagementSubnet

Management infrastructure

BastionSubnet only

Restricted

NSG Rule Design Principles:

  • Default deny-all inbound and outbound rules on all subnets — explicit allow rules define all permitted traffic flows

  • Inter-tier communication restricted to the minimum required ports for application functionality

  • Database tier isolated — no direct access from web tier, only from application tier

  • No subnet-to-subnet communication permitted outside defined application tier flows

  • NSG flow logs enabled on all subnets for network traffic visibility and forensic investigation

Why Three-Tier Segmentation Matters in Hybrid Environments: On-premises networks frequently have flat or insufficiently segmented architectures that have accumulated over years of growth. Cloud workload deployments provide the opportunity to enforce segmentation from the foundation — preventing the lateral movement patterns that exploit flat network trust in hybrid environments where on-premises compromises can pivot into cloud workloads through hybrid connectivity paths.

3. Workload Access & Protection Layer

The workload protection layer governs administrative access to cloud-hosted VMs through Azure Bastion and Just-in-Time access controls — eliminating all direct management port exposure.

Azure Bastion — Exclusive Administrative Access Path

Azure Bastion provides browser-based RDP and SSH connectivity to Azure VMs through the Azure portal — without requiring public IP addresses on target VMs or open management ports in NSG rules.

Key capabilities:

  • Secure browser-based RDP and SSH sessions terminating at the Bastion host — no direct VM port exposure required

  • Integration with Entra ID authentication — administrators authenticate through the Azure portal before Bastion connectivity is established

  • Session logging and auditing — all Bastion sessions are logged with user identity, target VM, session duration, and activity

  • No public IP requirement on target VMs — VMs remain entirely private while remaining administratively accessible

  • Elimination of jump server management overhead — Bastion replaces traditional jumpbox VM models with a managed PaaS service

Why Bastion over Traditional Jumpbox VMs: Traditional jumpbox VMs require ongoing OS patching, security hardening, availability management, and public IP exposure to enable external administrative access. Azure Bastion eliminates this management overhead entirely as a Microsoft-managed PaaS service — providing equivalent administrative access with lower operational cost and no public IP exposure requirement.

Just-in-Time VM Access

JIT VM Access through Defender for Cloud enforces time-bound management port access — complementing Azure Bastion for scenarios requiring direct port-level access governance.

  • Management ports (RDP 3389, SSH 22) blocked by default through NSG rules — no standing exposure

  • JIT access requests require explicit user request, source IP specification, and defined access duration

  • Approved requests dynamically open management ports for the requesting source IP only, for the approved duration

  • Automatic port closure after access window expiry — no manual cleanup required

  • Complete audit trail of every JIT request, approval, and access event

Azure RBAC — Least-Privilege Access Governance

  • Role assignments scoped to the minimum required resource scope — subscription, resource group, or individual resource level

  • Custom role definitions for hybrid administrator personas requiring specific combinations of permissions across cloud workloads

  • Regular access reviews through Entra ID Identity Governance — periodic review and removal of stale role assignments

  • No permanent Owner or Contributor assignments at subscription scope — privileged roles eligible through PIM for time-bound activation

4. Monitoring & Detection Layer

The monitoring layer centralises security telemetry from both on-premises identity infrastructure and Azure cloud workloads — providing unified hybrid visibility that is the most significant operational challenge in hybrid security environments.

Hybrid Telemetry Sources

Source

Telemetry Type

Collection Method

On-premises Active Directory

Authentication events, privileged operations

Microsoft Defender for Identity sensor

Entra Connect

Synchronisation health, hybrid authentication events

Entra Connect Health

Microsoft Entra ID

Sign-in logs, audit logs, risky user events

Entra ID diagnostic settings → Log Analytics

Azure VMs

OS events, authentication, process activity

Azure Monitor Agent

NSG Flow Logs

Network traffic patterns, denied connections

NSG diagnostic settings → Log Analytics

Azure Bastion

Administrative session logs

Bastion diagnostic settings → Log Analytics

Defender for Cloud

Workload threat alerts, security recommendations

Defender for Cloud → Log Analytics

Microsoft Defender for Identity — On-Premises Coverage

Microsoft Defender for Identity (MDI) sensor deployment on on-premises domain controllers provides identity threat detection that extends Sentinel's visibility into the on-premises AD environment — a critical capability for hybrid architectures where on-premises identity attacks can pivot into cloud resources through Entra Connect synchronisation.

Detection capabilities include:

  • Pass-the-Hash and Pass-the-Ticket attack detection

  • Kerberoasting and AS-REP Roasting attack patterns

  • Privilege escalation through sensitive group membership changes

  • Lateral movement indicators across on-premises AD infrastructure

  • Suspicious replication requests and DC shadow attacks

Microsoft Sentinel — Unified Hybrid SIEM

Sentinel ingests telemetry from both on-premises identity infrastructure (through MDI) and Azure cloud services — providing unified incident correlation across the full hybrid estate.

Key detection scenarios specific to hybrid environments:

  • On-premises compromise pivoting to cloud — detection of on-premises credential compromise followed by suspicious Entra ID sign-in activity from the same identity

  • Hybrid identity synchronisation abuse — detection of suspicious Entra Connect synchronisation changes or rogue directory synchronisation activity

  • Lateral movement across hybrid boundary — correlation of on-premises lateral movement indicators with subsequent cloud resource access attempts

  • Privileged identity escalation — detection of on-premises privileged group membership changes correlating with elevated cloud activity

Architecture Diagram

Technologies Used


Category

Technologies

Hybrid Identity

Microsoft Entra ID, Entra Connect, Password Hash Synchronisation, Seamless SSO

Identity Governance

Conditional Access, Entra ID Identity Protection, Azure RBAC

Network Segmentation

Azure Virtual Networks, NSGs, Three-Tier Subnet Architecture

Secure Administrative Access

Azure Bastion, Just-in-Time VM Access

Workload Protection

Microsoft Defender for Cloud, Azure RBAC

On-Premises Identity Protection

Microsoft Defender for Identity

Monitoring & SIEM

Microsoft Sentinel, Azure Log Analytics, Azure Monitor

Compliance Frameworks

NIST SP 800-207, CIS Controls v8

Key Challenges Addressed

Consistent identity governance across hybrid domains — addressed through Entra Connect synchronisation establishing a unified identity plane, with Conditional Access policies applying consistent authentication requirements to hybrid identities regardless of which domain hosts the target resource.

Eliminating public infrastructure exposure without reducing operational accessibility — addressed through Azure Bastion providing browser-based administrative access without requiring public IP addresses or open management ports on any workload VM.

Preventing lateral movement between application tiers — addressed through three-tier NSG-enforced segmentation with deny-all defaults and explicit inter-tier allow rules restricting east-west traffic to required application communication flows only.

Governing on-premises-to-cloud administrative access without VPN dependency — addressed through Azure Bastion's managed PaaS model providing secure administrative sessions through the Azure portal without requiring traditional VPN-based jump server infrastructure.

Centralising security visibility across both hybrid identity domains — addressed through Microsoft Defender for Identity sensor deployment on on-premises domain controllers, extending Sentinel's detection coverage into the on-premises AD environment alongside cloud telemetry.

Detecting hybrid-specific attack patterns — addressed through Sentinel correlation rules specifically designed for hybrid attack scenarios — on-premises credential compromise pivoting to cloud resources through synchronised hybrid identities.

Design Decisions & Rationale

Password Hash Synchronisation over Pass-Through Authentication : Pass-Through Authentication routes cloud authentication requests to on-premises AD domain controllers — creating a dependency where cloud authentication fails if on-premises connectivity is disrupted. Password Hash Synchronisation enables cloud authentication to succeed independently of on-premises availability, providing resilience during on-premises incidents, network connectivity failures, or DR scenarios. For hybrid environments where business continuity during on-premises disruption is a requirement, PHS is the more resilient architectural choice.

Azure Bastion over Traditional Jumpbox VMs : Traditional jumpbox VMs require public IP exposure, ongoing OS patching, security hardening, and availability management — creating operational overhead and persistent attack surface. Azure Bastion eliminates all of these as a Microsoft-managed PaaS service. The only trade-off is cost — Bastion has an hourly availability charge regardless of usage. For environments with consistent administrative activity, this cost is justified by the elimination of jumpbox management overhead and public IP exposure.

Three-Tier Segmentation over Flat VNet Architecture : A flat VNet with no tier isolation allows lateral movement from any compromised workload to reach database systems directly. Three-tier segmentation enforces architectural boundaries that contain compromise blast radius — a web tier compromise cannot directly access database systems, requiring an attacker to pivot through the application tier first, significantly increasing the complexity and detectability of lateral movement attacks.

Hybrid Azure AD Join for Conditional Access Device Compliance : Full Intune enrollment for Conditional Access device compliance is operationally disruptive for organisations with large fleets of existing on-premises domain-joined devices. Hybrid Azure AD join satisfies Conditional Access device requirements for domain-joined Windows devices without requiring full MDM enrollment — enabling device-based access governance to be enforced immediately across existing device fleets without a large-scale device migration project.

Microsoft Defender for Identity for On-Premises Coverage : Sentinel without MDI provides excellent visibility into cloud identity events but has no visibility into on-premises AD authentication activity — creating a blind spot that attackers can exploit to compromise on-premises credentials before pivoting to cloud resources. MDI sensors on domain controllers extend threat detection into the on-premises environment and feed alerts directly into Sentinel, closing the hybrid visibility gap that represents the most common detection failure in hybrid security architectures.

Private-Only Workload Exposure as a Default : Public IP addresses on cloud workloads are an unnecessary attack surface in environments where workload access can be mediated through Azure Application Gateway, Azure Bastion, or private VNet connectivity. Eliminating public IPs as a default architectural principle — rather than a per-workload decision — removes this attack surface consistently without requiring case-by-case security review of each workload's exposure configuration.

Trade-offs & Design Constraints

Entra Connect Single Point of Failure : A single Entra Connect instance represents a synchronisation availability risk — if the Entra Connect server fails, identity synchronisation stops and password changes made on-premises will not propagate to the cloud until synchronisation is restored. Production hybrid deployments should implement Entra Connect Staging Mode with a standby server that can be promoted to active synchronisation within minutes of a primary server failure.

Password Hash Synchronisation Security Considerations : PHS synchronises a hash derivative of on-premises password hashes to Entra ID. While this hash is not usable for Pass-the-Hash attacks against on-premises resources, it does mean cloud-stored credentials are derived from on-premises passwords. Organisations with strict data sovereignty requirements for credential material may prefer Pass-Through Authentication or AD FS federation despite the availability trade-offs. The security of PHS depends heavily on the protection of the Entra Connect server itself — it must be treated as a Tier 0 asset.

Azure Bastion Cost for Large Administrative Teams : Azure Bastion Standard SKU pricing includes an hourly availability charge plus per-session data processing charges. For organisations with large administrative teams requiring frequent concurrent sessions, Bastion costs can be significant. The cost-benefit analysis must weigh Bastion's managed service value against traditional jumpbox VM costs including compute, licensing, patching overhead, and the security risk of public IP exposure.

Three-Tier NSG Complexity at Scale : As application workloads multiply across the three-tier architecture, NSG rule management complexity grows. Each new application tier communication requirement demands explicit rule additions — without Infrastructure as Code governance, NSG rule sets become difficult to audit and error-prone to manage. Bicep or Terraform-managed NSG deployments with Policy-as-Code enforcement are essential for maintaining three-tier segmentation consistency at scale.

Conditional Access Coverage for Legacy On-Premises Applications : Conditional Access governs access to Azure AD-integrated applications only. On-premises applications authenticating through Kerberos or NTLM — common in hybrid environments with legacy workloads — cannot be governed through Conditional Access policies. Legacy application modernisation or Microsoft Entra Application Proxy integration is required to extend Conditional Access coverage to on-premises application workloads not yet integrated with modern authentication.

Projected Outcomes

The architecture is designed to deliver the following operational and security outcomes in a production hybrid enterprise environment:

  • Unified hybrid identity governance providing consistent authentication requirements across on-premises AD and Azure resources through a single Conditional Access policy framework

  • Complete elimination of public IP exposure for all cloud-hosted workloads and administrative interfaces

  • Three-tier network segmentation containing lateral movement blast radius within architectural tier boundaries

  • Secure browser-based administrative access through Azure Bastion eliminating all direct RDP and SSH port exposure

  • Just-in-Time VM access reducing management port exposure to approved, time-bound access windows only

  • Centralised hybrid SIEM visibility across on-premises AD identity events and Azure cloud telemetry through unified Sentinel platform

  • Detection capability for hybrid-specific attack patterns including on-premises-to-cloud pivot scenarios

  • Alignment with NIST SP 800-207 Zero Trust Architecture and CIS Controls v8 compliance frameworks

  • Audit-ready security architecture with comprehensive logging across identity, network, and administrative access events

Future Evolution

  • Entra ID Identity Protection UEBA integration for advanced risk-based Conditional Access policy automation

  • Microsoft Entra Application Proxy deployment extending Conditional Access governance to on-premises legacy applications without public exposure

  • Azure Virtual WAN integration for scalable hybrid connectivity governance across multiple on-premises sites and Azure regions

  • Software-defined micro-segmentation through Azure Network Manager for centralised NSG policy management at scale

  • Automated compliance validation through Azure Policy continuous assessment and Defender for Cloud regulatory compliance views

  • Cross-cloud Zero Trust extension applying consistent identity governance to AWS and GCP workloads through Entra ID federation

  • Continuous compliance drift detection through Infrastructure as Code guardrails preventing manual configuration deviations

  • Advanced threat intelligence integration enriching Sentinel detections with external IOC feeds for hybrid-specific threat actor TTPs

Key Takeaways

  • Hybrid identity architecture is the foundational challenge of Zero Trust in hybrid environments — inconsistent governance across on-premises AD and Entra ID creates authentication gaps that attackers exploit

  • Password Hash Synchronisation provides greater cloud authentication resilience than Pass-Through Authentication for environments where on-premises availability during incidents cannot be guaranteed

  • Azure Bastion is the appropriate administrative access model for private-only workload architectures — it eliminates public IP and open port exposure while providing a managed, auditable administrative access service

  • Three-tier network segmentation must be enforced architecturally from the foundation — retrofitting segmentation onto flat networks is operationally complex and frequently incomplete

  • Microsoft Defender for Identity sensor deployment on on-premises domain controllers is essential for hybrid SIEM coverage — without it, Sentinel has no visibility into the on-premises identity attack surface that hybrid architectures extend into the cloud

  • Hybrid Azure AD join enables immediate device-based Conditional Access enforcement across existing domain-joined device fleets without requiring full Intune migration — a critical practical accommodation for hybrid environments

  • Private-only workload exposure should be a default architectural principle, not a per-workload decision — eliminating public IPs consistently removes an attack surface that is otherwise difficult to govern at scale

Open to discussing infrastructure architecture, cloud transformation, or high-availability system design.

Whether the objective is infrastructure modernization, operational resilience, hybrid cloud transformation, or enterprise security architecture, I am always interested in discussing complex infrastructure environments and strategic technical initiatives.

Open to discussing infrastructure architecture, cloud transformation, or high-availability system design.

Whether the objective is infrastructure modernization, operational resilience, hybrid cloud transformation, or enterprise security architecture, I am always interested in discussing complex infrastructure environments and strategic technical initiatives.

Open to discussing infrastructure architecture, cloud transformation, or high-availability system design.

Whether the objective is infrastructure modernization, operational resilience, hybrid cloud transformation, or enterprise security architecture, I am always interested in discussing complex infrastructure environments and strategic technical initiatives.

ENTERPRISE INFRASTRUCTURE ARCHITECTURE

My work focuses on ensuring service continuity, optimizing performance, and supporting large-scale infrastructure transformations across multi-site and hybrid environments.

ENTERPRISE INFRASTRUCTURE ARCHITECTURE

My work focuses on ensuring service continuity, optimizing performance, and supporting large-scale infrastructure transformations across multi-site and hybrid environments.

ENTERPRISE INFRASTRUCTURE ARCHITECTURE

My work focuses on ensuring service continuity, optimizing performance, and supporting large-scale infrastructure transformations across multi-site and hybrid environments.