Why the castle-and-moat perimeter model is fundamentally broken
Three core pillars: Verify Explicitly, Least Privilege, Assume Breach
How Policy Decision Points and micro-segmentation work together
Zero Trust vs. traditional VPN — what SY0-701 expects you to distinguish
Zero Trust eliminates implicit trust. Every request is treated as though it originates from an open, hostile network.

The Death of the Traditional Perimeter

For decades, network security relied on the 'Castle and Moat' approach: hard outer firewall, everything inside trusted implicitly. This collapsed because of remote work, cloud adoption, and the fact that sophisticated attackers breach perimeters within 24 hours and move laterally for months undetected.

Remote Work
Users operate from uncontrolled environments
Cloud Expansion
Resources exist outside any perimeter
Lateral Movement
Attackers pivot freely once inside
BYOD
Unmanaged personal devices on corporate networks

The Three Core Pillars of Zero Trust

Every access request must be fully authenticated and authorized using ALL available data points: user identity (MFA), device health (endpoint posture: OS patched? EDR running?), location (expected geography?), service (normally accessed by this user?), and behavior (consistent with historical patterns?). No single factor grants trust.
Users receive only the permissions required for their current task. Implemented via Just-In-Time (JIT) access (elevated privileges granted only during the specific window, then auto-revoked) and Just-Enough-Access (JEA) (scoped admin sessions preventing commands outside the defined job scope).
Design every system as if the attacker is already inside. Drives micro-segmentation (isolate every workload), end-to-end encryption of all internal traffic (even East-West traffic between servers), and behavioral analytics (UEBA to detect lateral movement before data theft).
Many exam candidates confuse Zero Trust with 'strict VPN policies.' A VPN grants broad network-level access. Zero Trust grants granular application-level access per-request. This distinction is tested.

The Policy Architecture: PDP and PEP

Policy Decision Point (PDP)

  • The 'brain' — evaluates every access request
  • Receives signals: identity, device posture, location, behavior
  • Consults threat intelligence feeds in real time
  • Renders Allow, Deny, or Step-Up Auth decision
  • Examples: Zscaler ZPA, Cloudflare Access, Azure AD

Policy Enforcement Point (PEP)

  • The 'bouncer' — executes the PDP's decision
  • Sits between the user and the protected resource
  • Intercepts all traffic before it reaches the application
  • Terminates sessions if context changes mid-session
  • Can be a network gateway, reverse proxy, or API gateway
terminal
User Request
  → PEP intercepts (network gateway/proxy)
  → PDP evaluates: identity + device + location + behavior
  → PDP decision: ALLOW (session-scoped token issued)
  → PEP permits request to reach protected application

Implementing Zero Trust Micro-Segmentation

ComponentFunctionTraditional Model Equivalent
Identity Provider (IdP)Validates user via MFA + device postureOn-premise Active Directory only
Device Posture CheckVerifies OS patch level, AV status, encryptionBasic NAC / 802.1X
Micro-segmentationIsolates application workloads dynamicallyVLANs / Static subnet firewalls
Software-Defined PerimeterCloaks application endpoints from the internetHardware DMZ firewall
UEBADetects anomalous behavior within allowed sessionsSIEM rules only
On the SY0-701, Zero Trust is the answer for protecting multi-cloud and remote-worker environments where a physical perimeter definition is impossible. ZTNA replaces VPN in Zero Trust deployments.
  • Zero Trust: 'Never Trust, Always Verify' — implicit trust is the enemy.
  • Three pillars: Verify Explicitly (all context), Least Privilege (JIT/JEA), Assume Breach (segment everything).
  • PDP = the decision brain. PEP = the enforcement bouncer. Both required together.
  • VPN grants network-level access. ZTNA grants per-application access. Fundamentally different.
  • Micro-segmentation prevents lateral movement even after a perimeter breach has already occurred.

Ready to test your knowledge?

Take a free full-length practice exam with 90 questions and instant feedback.

Start Practice Exam