Structura.io
All AI agent use cases
Network OperationsNetwork Validation Agent

Firewall Change Validation with AI Agents

Every firewall rule change simulated against real traffic patterns before it ships, using Batfish and your production flow logs.

Integrates with
BatfishBatfish
AWS VPC Flow Logs
Palo AltoPalo Alto
Fortinet
Cisco ASA

The problem today

A change to a firewall rule looks harmless in isolation: 'remove this one allow rule, it's been there since 2019 and nobody remembers why'. You push it. At 03:17 a batch job fails because it was the only thing still using that path. The person who added the rule left the company. The runbook doesn't mention it. The rollback is easy; the trust lost with the finance team over the failed batch is not.

How AI agents solve it

The Network Validation Agent cross-references the proposed firewall change against your actual VPC flow logs from the last 30 days. If any real traffic matched the rule you're removing, the agent flags it with the source, destination, and last-seen time. The Security Agent then checks whether the traffic was legitimate or should have been blocked anyway, so you know if the rule was load-bearing or dead.

Who this is for: Network security engineers managing firewall rulesets across hybrid environments

Manual workflow vs. Network Validation Agent

Manual workflow

  • Firewall rules changed based on comments and tribal knowledge
  • Rules removed that 'nobody remembers why they exist'
  • Breakage discovered when a batch job or cron fails hours later
  • Original rule author has left the company
  • Rollback is fast; trust with affected teams is slow to rebuild

With the Network Validation Agent

  • Every rule change validated against 30 days of real flow logs
  • Evidence-based decisions: real traffic, real timestamps
  • Load-bearing rules protected even without their original author
  • Dead rules confidently removed with supporting data
  • Zero 'nobody remembers why' postmortems

How the Network Validation Agent runs this

  1. 01

    Network Validation Agent intercepts every firewall rule PR

  2. 02

    Load VPC flow logs / firewall audit logs from the last 30 days

  3. 03

    Simulate the proposed change against the historical traffic

  4. 04

    Flag any traffic that would now be blocked (source, destination, service)

  5. 05

    Security Agent classifies each flagged flow as legitimate or shouldn't-have-matched

  6. 06

    Generate a PR comment with the evidence: real traffic, real timestamps

  7. 07

    Block merge if legitimate traffic would break; allow with rationale if not

Measurable impact

  • Eliminates firewall-change-caused outages from load-bearing dead rules

  • Reduces firewall rule bloat by confidently removing dead rules

  • Builds evidence-based change decisions that survive team turnover

  • Cuts firewall PR review time by replacing speculation with data

Governed by the AI Gateway

Every agent action in this use case is audited, policy-checked, and cost-tracked

Structura's AI Gateway sits between every agent and the underlying LLM providers. Every decision made during this use case. Every plan review, every policy check, every fix PR, is routed through guardrails, logged to an immutable audit trail, and evaluated against NIST AI RMF and AIUC-1 controls.

Learn about the AI Gateway

See this use case in a live demo

We'll walk you through exactly how the Network Validation Agent handles this in a real environment with your stack, your policies, and your constraints.

Schedule a Demo