Intent based firewall rules
Every company I have worked with has always had a transactional firewall process. Yes there are some that use automations in the backend, but from a customer perspective it works like this:
- Customer decides they need connectivity through the network.
- Customer submits a request to allow that connectivity
- The connectivity is analysed, it is decided if changes are required, the changes are the made
- The customer then tests the connectivity
Then thats it!
Thats a bit weird though isn't it, normally when something that is critical to the infrastructure you are deploying is done, you want to have some ownership of it.....you want a receipt, or maybe an easy path to follow it up and see if it is still working.