Architecture

Zero Trust and Firewall Change Management: Why ZT Doesn't Eliminate Firewalls and How Change Controls Must Scale

Fw
Nicholas Falshaw
||9 min read

Zero Trust is sold as the end of perimeter security. In production, ZT architectures still depend on firewalls as policy enforcement points at network boundaries. The shift is not from firewalls to no-firewalls; it is from a small number of high-impact firewall rules to a large number of fine-grained ones. Change management must scale to accommodate the volume increase, or ZT collapses into "more rules, less governance."

After 17 years operating firewall estates and three years observing ZT deployments at DAX-30 clients, I see the same failure pattern: ZT increases firewall rule volume by ten times or more without scaling the change-management process to match. The audit posture degrades within twelve months of ZT adoption even when the underlying technical architecture is sound.

Why ZT Architectures Still Need Firewalls

Zero Trust is an architectural model, not a product category. The model relies on policy enforcement points (PEPs) that evaluate access requests against a policy decision point (PDP). At network boundaries, the PEP is typically a firewall or a firewall-equivalent (cloud security group, service mesh sidecar, SASE node). ZT does not eliminate the PEP; it changes how the PEP makes decisions and who configures it.

The two architectural changes that matter for change management: first, PEPs become identity-aware, so policy is expressed in terms of principals (users, services, devices) rather than only IPs and ports. Second, segmentation becomes finer-grained, so the number of distinct PEPs and the rules per PEP both increase substantially.

The 4 ZT Tenets Applied to Change Management

1. Verify explicitly — in change reviews

Every firewall change must verify the requestor's identity, role authorization, and the technical correctness of the proposed rule explicitly. Implicit trust based on team membership or ticket source is anti-ZT. The change-management workflow itself becomes a ZT-shaped enforcement layer, not a paperwork ritual.

2. Use least privilege — in rule scope

ZT extends least-privilege from runtime access decisions to the rule-design phase. A rule that grants any-source or any-destination is a ZT violation regardless of whether it passes a basic security review. The change-review checklist must explicitly check rule scope against documented purpose.

3. Assume breach — in rollback design

Every change must include a rollback plan that assumes the change will need to be reverted under incident pressure. The rollback must be testable in a non-production environment before the change is approved, not improvised during the incident.

4. Continuous verification — in post-change review

ZT requires continuous verification, which extends to firewall changes after deployment. Post-change verification confirms the rule is enforced as intended, that telemetry shows expected traffic patterns, and that no unintended side effects occurred. Without this, the change-management process ends at deployment; ZT requires it to continue.

How Micro-Segmentation Multiplies Change Volume

A traditional perimeter design might have 200-500 firewall rules across two or three boundary firewalls. A micro-segmentation design covering the same applications might have 5,000-20,000 rules across dozens of enforcement points. The total amount of traffic enforced is the same; the granularity of enforcement is different.

The change volume scales linearly with the rule count. A production environment generating 20 rule changes per week at the perimeter scale generates 200-400 changes per week at the micro-segmentation scale. Change-management processes designed for the lower volume break: queue depth grows, approvals stall, emergency-change shortcuts proliferate, audit trails degrade.

The mitigation is not "more reviewers." Linear scaling of reviewers is impractical at most organizations. The mitigation is automation of the deterministic parts of review (syntax validation, conflict detection, scope analysis) so human attention focuses on the semantic parts (does this rule still match documented purpose).

Pre-Change ZT Checks

For each proposed firewall change in a ZT environment, six automated checks should run before the change reaches a human reviewer.

  1. Identity context. Source/destination resolved to identity (principal) where possible, not just IP.
  2. Posture. If endpoints involved, current posture (patch level, EDR status) must be verified.
  3. Scope. Rule scope check against documented purpose; reject any-any.
  4. Conflict. Overlap analysis against existing rules.
  5. Lateral-movement impact. Simulation of east-west traffic implications.
  6. Compliance. Mapping to applicable framework controls (NIST 800-53, CISA CPGs, NIS2 if EU).

Post-Change Verification

After deployment, three checks confirm the change behaves as intended.

  • Enforcement evidence: traffic logs showing the rule matching expected flows.
  • Side-effect detection: alert review for the 24 hours following deployment, looking for unexpected drops or grants.
  • Rollback readiness: last validation that the documented rollback procedure still works given current state.

Mapping to DoD Zero Trust Reference Architecture

The DoD ZTRA defines seven pillars. Three of them touch firewall change management directly.

  • Pillar 4 (Network & Environment): micro-segmentation, software-defined networking, encrypted flows. Firewall change controls must support fine-grained rule expression and rapid deployment without sacrificing governance.
  • Pillar 5 (Application & Workload): per-application authorization, runtime policy enforcement. Firewall changes integrate with application deployment pipelines, not separate ticket queues.
  • Pillar 7 (Visibility & Analytics): telemetry from PEPs feeds the analytics platform; analytics inform PDP decisions. The change-management audit trail is part of this telemetry.

Federal contractors and DoD-adjacent commercial operators face ZTRA-aligned compliance pressure. Firewall change-management processes that worked at the perimeter scale do not satisfy DoD ZTRA expectations at the micro-segmentation scale.

About the Author

Nicholas Falshaw is a Principal Security Architect with 17+ years of enterprise firewall and network security experience across DAX-30 clients, KRITIS-regulated operators, and EU financial services. He authored the FwChange methodology after analyzing 280+ firewall migrations.

Author and Methodology Behind FwChange

FwChange is built and authored by Nicholas Falshaw, drawing on 17+ years of enterprise firewall experience and 280+ migrations. Read the methodology behind the platform.

Stay Updated

Get firewall management tips, compliance guides, and product updates.

No spam. Unsubscribe anytime.

Fw

Nicholas Falshaw

Principal Security Architect & AI Systems Engineer. 17+ years of enterprise firewall and network security across DAX-30 and KRITIS-regulated operators. Author of FwChange and the 280-migrations dataset.

Ready to Automate Firewall Changes?

See how FwChange streamlines multi-vendor firewall management with compliance automation and AI-powered rule analysis.