Different security requirements mandate different security controls. It is a security best practice to segment infrastructure into zones that impose similar security controls.
Solution
Review the list of Subnet Details. If any are missing or undocumented they should be investigated.