In a recent YouTube video, John Savill's [MVP] explains Microsoft’s new Azure Service Groups, a tenant-level construct designed to give teams flexible, logical views of cloud assets. The video walks viewers through the concept, how the feature works, and practical scenarios where it can simplify monitoring and organization. Importantly, Savill frames the feature as an overlay for visibility rather than a replacement for existing management constructs. As a result, organizations can experiment with new ways to group resources without rearchitecting their subscriptions or resource groups.
Savill describes Azure Service Groups as virtual containers that let you group subscriptions, resource groups, and individual resources across an entire tenant. Consequently, a single resource can belong to multiple groups at once, enabling overlapping views for different teams, compliance needs, or operational purposes. Furthermore, the groups can be nested up to several levels, which helps model business units or application ownership without changing resource placement. Therefore, the feature aims to separate logical organization from physical deployment boundaries to make cross-subscription visibility easier.
The video explains that service groups are created through the Microsoft.Management resource provider and that membership is managed using a relationship API, which Savill demonstrates conceptually. Because membership is a relationship overlay, policies and role-based settings do not automatically flow down through these groups; they mainly provide consolidated views for health, cost, and operational visibility. This design allows low-privilege users to create meaningful groupings without broad tenant permissions, which is useful for SREs, auditors, and finance teams who need aggregated views. Still, the overlay nature means teams must combine service groups with other governance tools when they need enforcement rather than just visibility.
Savill highlights several tradeoffs: while service groups give flexible, cross-subscription aggregation, they do not change where resources live and cannot be deployment targets, which limits some automation scenarios. On the other hand, their lightweight and decentralized model reduces blast radius for permissions, because users can manage grouping without altering access to the underlying resources. However, this convenience comes at the cost of not supporting policy inheritance or RBAC through the group overlay, so organizations must decide when a logical grouping suffices and when stronger controls are necessary. Thus, teams should weigh the benefit of improved visibility against the need for enforcement and plan governance accordingly.
Savill covers current preview limits and pragmatic concerns, noting caps on the number of groups and membership counts per tenant and subscription, and a defined maximum depth for nesting. These limits affect how large enterprises design their hierarchies; for example, very deep or highly overlapping structures may hit quotas and require a different approach. In addition, because the service group model relies on relationships, tracking and troubleshooting those relationships can add operational complexity, especially when multiple teams create overlapping views. Therefore, organizations must design naming conventions and governance around creation and lifecycle of groups to avoid confusion and duplication.
Finally, Savill outlines realistic ways to adopt service groups—start small, use them first for monitoring and reporting, and then expand into fiscal or compliance views as needed, since the feature is currently best suited to visibility tasks. He also suggests planning for integration with existing tagging, cost management, and SRE workflows while keeping in mind the preview nature of the feature and possible changes. In conclusion, Azure Service Groups provide a flexible new layer for organizing cloud resources that can reduce friction across teams, but they require thoughtful governance and awareness of limitations to deliver real value. As organizations pilot the feature, they should balance the need for flexible views with the continued use of policy and access controls for enforcement.
azure service groups, azure resource organization, azure resource grouping, flexible resource organization azure, azure resource management best practices, azure service group deployment, azure governance and organization, organize azure resources