I'm sure you'll find plenty of people in the Cisco Community forums that would be happy to discuss your topology with you. Are you able to share more of the assignment specifics with the community? Networks have become very versatile, and I'm not how helpful any of use can be just "giving feedback" (I have a background in secure private networks which would be different than the feedback you'd get from someone who, say, works for a web services company and has a focus on high availability and fault tolerance).
Off the cuff, there are a few things I notice about your network topology that you may want to consider revisiting.
1) You seem to have made a very traditional 3-tier (access, distribution, core) L2 topology here... to support 4 servers and a SAN. Can I ask why? A collapsed-core model (where core and distribution layers are combined) would be a more common choice in 2019, especially since you appear to be using all layer 3 switches?
2) There are no subnets indicated on this topology, but is your intention to have 2 separate points of ingress and egress on the network? At a glance, this looks like one network segment hosting a few servers--have you considered using Hot Standby Redundancy Protocol or Gateway Load Balancing Protocol to merge your 2 routers into one logical gateway? If your goal is fault-tolerance, I would recommend using HSRP or GLBP. If you have a very compelling reason to use 2 gateways to return to the same parent network (route tagging for unidirectional routing??? I doubt it?), then it's fine the way it is.
3) You may want to consider looking into a Virtual Switching System (VSS), which would allow you to logically merge pairs of switches in the topology (presumably you don't have a budget for this imaginary topology--so you could use expensive enterprise gear). VSS eliminates the needs for redundant switches (that's actually why it was invented) and would make your topology look a little cleaner.
4) I'm actually working on a project at work right now using RD servers in an off-campus subnet for maintenance access to specialty services servers. I can tell you that our RD servers are basically the back end of our Threat Management Gateway ( [Untrusted internet] --> [Threat Management/Fireway :: Remote Desktop Servers] --> [Specialty Services servers] ).
Which brings us to
5) Firewalls: If this topology is in fact meant to connect to an intranet (another trusted network) I'm not sure what the need for a firewall would be. You use firewalls to police potentially untrusted traffic from coming into your network from an external network. That being said, if you were running some sort of high-security service out of this network, you may put a firewall at the edge of either the service or the network if you didn't think a regular router with Access Control Entries would do it (typically in a topology like this, if you wanted to police traffic, you would put ingress ACEs on your gateway routers to prevent traffic from coming in except from authorized sources). For the scope of this project, based on my best guess, your firewalls should on the external side of your routers OR (less likely) at the edge of the "dev backbone" area.
I hope this information has been helpful, and please let me know if you have any more questions or would like more feedback.
Please rate/mark this answer if it's been helpful to you.
Good luck on your assignment!