1. Palo Alto Networks, "Zero Trust Enterprise: An Implementation Guide": This guide outlines the methodology for implementing Zero Trust. Step 2, "Map the Transaction Flows," and Step 3, "Architect a Zero Trust Network," emphasize using a Segmentation Gateway (a Next-Generation Firewall) to create microsegments and enforce policy. Using an existing core firewall fulfills this role cost-effectively. (See "The Zero Trust Five-Step Methodology," pages 6-9).
2. Palo Alto Networks, PAN-OS® Administrator’s Guide 10.2, "Security Zones": "Zones are a logical way to group physical and virtual interfaces on the firewall to control and log the traffic that traverses your network... By default, traffic between interfaces in the same zone is allowed and traffic between interfaces in different zones is denied. To allow traffic to flow between different zones, you must configure a Security policy rule." This directly supports using zones on an existing firewall for segmentation and enforcement.
3. Palo Alto Networks, "What Is Network Segmentation?": "Network segmentation firewalls divide a network into zones with individual security controls for each zone... A segmentation firewall enforces security policies on all traffic that moves between zones." This document establishes the firewall as the primary tool for creating and enforcing policy between network segments, which is the core of the solution in option C.