Managing consistent network access controls across a hybrid Linux fleet is becoming unsustainable and I am wondering if ZTNA is the right direction here

Posted by Unique_Buy_3905@reddit | linuxadmin | View on Reddit | 22 comments

Running around 200 Linux servers spread across on-prem bare metal, two AWS regions, and a small GCP footprint. For years we managed access with a combination of iptables rules on each host and security groups at the cloud layer, which worked fine when the environment was simpler.

The problem now is that maintaining consistent network segmentation across all three environments means keeping rules synchronized across host-level firewalls, AWS security groups, and GCP firewall rules simultaneously. We are already using Terraform for provisioning the cloud security groups but the consistency gap between the IaC layer and host-level rules during runtime changes is where things break down. When something changes urgently, it changes in three places and there is no reliable way to verify those three places are in sync at any given moment.

Started looking at whether pushing access control up to a dedicated network security layer makes more sense than maintaining it at the host level, and zero trust network access keeps coming up in that research. Most of what I find is aimed at office environments managing user access though, not infrastructure teams managing server-to-server traffic across a hybrid fleet. Any of you folks applied ZTNA principles to this specific use case and found something that actually fits? Appreciated.