East West Firewalls Cannot Enforce Workload Trust

Dec 22, 2025

Failure Pattern

East west firewalls filter traffic but still trust the identity of workloads incorrectly. Attackers exploit this gap to spread quickly.

 

What We See in the Field

Encrypted traffic between workloads appears allowed. East west firewalls permit it because it originates from trusted IP ranges. Malicious behavior blends into normal patterns.

 

Underlying Causes

IP-based identity assumptions
Lack of cryptographic workload identity
East-west traffic too dynamic
Metadata-based rules
Inability to inspect encrypted flows

 

Trust-Native Network Resolution

DTL ensures every east-west session is authenticated using TrustKeys. Firewalls enforce identity rather than metadata. Attackers cannot create trusted pathways.

 

Broken Trust Assumption

The attacks that exposed this failure pattern were not stealthy break-ins. They were trusted operations.

During incidents such as SolarWinds, Capital One, and Okta, malicious activity was carried out using valid identities and approved execution paths. Certificates were valid. Tokens were accepted. Sessions were authenticated. From the system’s point of view, nothing appeared wrong.

This is the risk of trust inferred from credentials, location, or prior authentication.