Nope. IMHO if you take the pain, cost and effort to create a DMZ VDOM in the first place you are obliged to adhere to these principles. I tend to explain to customers what a DMZ is for in saying "imagine the servers in the DMZ are hacked and now under control of some evil guy - what can happen?". Which prevents policies from DMZ to LAN, for instance. Sometimes workflows have to be redesigned for this, but better you put some effort here than fix a leak later.
Whenever I encounter VIP access rules in a firewall I feel uncomfortable. Sometimes you can replace them with VPN access and tight policies, which is way more secure. But it'll take more effort.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.