Back to Blog
โ˜…โ˜…โ˜…Advanced๐Ÿ” Network Security
Zero TrustMicrosegmentationPalo AltoSecurityBest PracticesFirewall

Zero Trust Network Segmentation: Microsegmentation and Palo Alto Policy Design

March 10, 2026ยท9 min read

Overview

Zero Trust is not a product โ€” it is an architecture principle: never trust, always verify. Every user, device, and workload must prove its identity and be authorized before accessing any resource, regardless of whether the request originates inside or outside the traditional perimeter. In practice, implementing Zero Trust means replacing flat, implicit-trust networks with explicitly segmented zones, identity-aware policy enforcement, continuous session inspection, and comprehensive logging. This guide covers how to design and implement Zero Trust segmentation using Palo Alto NGFW as the enforcement point.


// Zero Trust Zone Segmentation โ€” Explicit Allow, Implicit Deny
UNTRUST Internet Remote User Palo Alto NGFW App-ID ยท User-ID Content-ID ยท SSL Insp Explicit Allow Only Implicit Deny All DMZ Web / App Server TRUST Internal Users / DB HTTPS only VPN / ZTNA DENY DBโ†’Web

Part 1 โ€” Zero Trust Principles

The Five Core Principles

Zero Trust is built on five verifiable assertions for every access request:

  1. Verify explicitly โ€” Authenticate and authorize based on all available data: identity, location, device health, service, workload, and data classification.
  2. Use least-privilege access โ€” Limit user and workload access with just-in-time and just-enough-access policies.
  3. Assume breach โ€” Minimize blast radius, segment access, and verify end-to-end encryption. Use analytics to detect anomalies.
  4. Inspect all traffic โ€” TLS inspection, application identification, and threat prevention on every flow โ€” including east-west traffic.
  5. Log everything โ€” Every allow and deny decision must be logged with enough context to reconstruct what happened.

What Zero Trust is NOT

  • It is not just multi-factor authentication
  • It is not "buy a ZTNA product"
  • It is not achievable with a flat network, even with a perimeter firewall

Part 2 โ€” Zone Design

Start with a zone model. Every segment of your network belongs to a zone, and traffic between zones is inspected by the NGFW with an explicit policy. There is no implicit trust between zones โ€” even internal zones.

ZoneContentsTrust LevelKey Policy
UNTRUSTInternet, remote users pre-VPNNoneAllow only HTTPS inbound to DMZ, deny all else
DMZWeb servers, reverse proxies, email gatewaysLowAllow only specific ports to TRUST; no direct access to DB
TRUSTInternal users, workstationsMediumAllow outbound with App-ID inspection; no lateral movement
SERVERSApplication servers, APIsMediumAllow only app-specific ports from TRUST; log all access
DBDatabases, data warehousesHighAllow only from SERVERS zone on specific DB ports; deny all else
MGMTJump hosts, NMS, SIEMHighAllow only from defined admin IPs; MFA required
OT / IoTIndustrial, building systems, IoT devicesIsolatedNo access to TRUST or SERVERS; outbound NTP/syslog only

Part 3 โ€” Palo Alto Policy Design

Security Policy Best Practices

# Policy design rules (Panorama / CLI equivalent):
#
# 1. Use App-ID, not port-based rules
#    BAD:  from TRUST to SERVERS  any โ†’ port 443  allow
#    GOOD: from TRUST to SERVERS  ssl,web-browsing โ†’ allow
#
# 2. Use User-ID groups, not IP addresses
#    BAD:  source 10.1.0.0/24  โ†’ allow
#    GOOD: source user: finance-team@corp.com โ†’ allow
#
# 3. Attach Security Profiles to every allow rule
#    Every allow rule needs: AV + Anti-Spyware + Vulnerability + URL Filter
#    Use Security Profile Groups to keep this consistent
#
# 4. Log at session end on ALL rules including deny
#    Denied traffic logs are critical for forensics

Panorama Policy Rule Structure

# Pre-rules (pushed from Panorama โ€” apply to all devices):
# Rule 1: Block known-bad โ€” apply Threat Prevention, block C2 destinations
# Rule 2: Block high-risk applications โ€” bittorent, tor, anonymizers
# Rule 3: Allow MGMT zone โ†’ all zones on mgmt-specific apps only

# Device-local rules (per-firewall policy):
# Rule 10: UNTRUST โ†’ DMZ  |  ssl, web-browsing  |  Profile: strict  |  Log: yes
# Rule 20: DMZ โ†’ SERVERS  |  specific app only  |  Profile: strict  |  Log: yes
# Rule 30: TRUST โ†’ SERVERS  |  User-ID group  |  Profile: strict  |  Log: yes
# Rule 40: TRUST โ†’ UNTRUST  |  ssl + allowed-SaaS  |  URL Filter  |  Log: yes
# Rule 50: OT โ†’ UNTRUST  |  ntp, syslog  |  Profile: strict  |  Log: yes
# Rule 99: Catch-all deny  |  any โ†’ any  |  Log: yes  |  (explicit, for logging)

SSL/TLS Inspection

# SSL Inspection is mandatory for Zero Trust
# Without it, you cannot see what's in encrypted traffic
#
# SSL Forward Proxy โ€” for outbound user traffic (TRUST โ†’ UNTRUST)
# SSL Inbound Inspection โ€” for inbound traffic to DMZ servers
#
# Exemptions (no-decrypt list) โ€” required for:
#   - Financial / banking sites (certificate pinning)
#   - Medical record systems (HIPAA concerns)
#   - Software update servers
#   - Always document why each exemption exists

Part 4 โ€” User-ID and Device Identity

Zero Trust requires that every policy decision knows who the user is and what device they are using โ€” not just what IP address sent the packet.

# User-ID agent sources:
#   - Windows Security Event Log (domain login events)
#   - Captive portal (for non-domain devices)
#   - GlobalProtect (VPN/ZTNA โ€” strongest identity signal)
#   - Syslog from RADIUS/LDAP

# HIP (Host Information Profile) โ€” device posture checks
# HIP allows or blocks based on endpoint state:
#   - Is AV installed and up to date?
#   - Is disk encryption enabled?
#   - Is the OS patch level current?
#   - Is the device corporate-managed?

# Policy example using HIP:
# from UNTRUST to DMZ
# source user: any
# HIP profile: corporate-compliant
# application: ssl
# action: allow
# Unmanaged/non-compliant devices hit the catch-all deny

Part 5 โ€” Microsegmentation for East-West Traffic

The majority of breach-related damage happens via east-west lateral movement after an initial compromise. Microsegmentation addresses this.

# East-west segmentation options:
#
# Option 1: Inter-VLAN routing through NGFW (most common)
#   All inter-VLAN traffic routed through firewall
#   High visibility, lower throughput on large flat networks
#
# Option 2: VM-Series on hypervisor (VMware NSX / Nutanix)
#   Firewall runs inside the hypervisor, inspects VM-to-VM traffic
#   Best for data center east-west control
#
# Option 3: Prisma Access (cloud-delivered) + ZTNA
#   Users connect to cloud enforcement point
#   Application access is per-app, not network-wide

# Minimum effective east-west segmentation:
#   Separate VLANs/subnets for: users, servers, DB, OT, management
#   Route inter-VLAN traffic through NGFW (not L3 switch)
#   Deny VLAN-to-VLAN by default โ€” allow only specific, inspected flows

Zero Trust Implementation Checklist

  • Network is divided into explicit zones โ€” no flat /16 subnets with full internal trust
  • All inter-zone traffic routes through NGFW โ€” no L3 switches bypassing inspection
  • Security policies use App-ID and User-ID โ€” no port-based or IP-only rules
  • Every allow rule has a Security Profile Group attached (AV, Anti-Spyware, Vuln, URL)
  • SSL/TLS inspection is enabled for outbound and inbound traffic with documented exemptions
  • All rules log at session end โ€” including the implicit deny
  • HIP profiles enforce device posture before granting network access
  • Database zone is not directly reachable from TRUST or UNTRUST โ€” only from SERVERS zone
  • OT/IoT devices are in an isolated zone with no inbound access from any internal zone
  • SIEM receives logs from all firewall zones โ€” alerts on lateral movement patterns