Different security requirements mandate different security controls. It is a security best practice to segment infrastructure into zones that impose similar security controls.
Solution
Review the list of Ports. If any are missing or undocumented they should be investigated.