What You'll Learn
Why the castle-and-moat perimeter model is fundamentally broken
Three core pillars: Verify Explicitly, Least Privilege, Assume Breach
How Policy Decision Points and micro-segmentation work together
Zero Trust vs. traditional VPN — what SY0-701 expects you to distinguish
Zero Trust eliminates implicit trust. Every request is treated as though it originates from an open, hostile network.
The Death of the Traditional Perimeter
For decades, network security relied on the 'Castle and Moat' approach: hard outer firewall, everything inside trusted implicitly. This collapsed because of remote work, cloud adoption, and the fact that sophisticated attackers breach perimeters within 24 hours and move laterally for months undetected.
Remote Work
Users operate from uncontrolled environments
Cloud Expansion
Resources exist outside any perimeter
Lateral Movement
Attackers pivot freely once inside
BYOD
Unmanaged personal devices on corporate networks
The Three Core Pillars of Zero Trust
Every access request must be fully authenticated and authorized using ALL available data points: user identity (MFA), device health (endpoint posture: OS patched? EDR running?), location (expected geography?), service (normally accessed by this user?), and behavior (consistent with historical patterns?). No single factor grants trust.
Users receive only the permissions required for their current task. Implemented via Just-In-Time (JIT) access (elevated privileges granted only during the specific window, then auto-revoked) and Just-Enough-Access (JEA) (scoped admin sessions preventing commands outside the defined job scope).
Design every system as if the attacker is already inside. Drives micro-segmentation (isolate every workload), end-to-end encryption of all internal traffic (even East-West traffic between servers), and behavioral analytics (UEBA to detect lateral movement before data theft).
Many exam candidates confuse Zero Trust with 'strict VPN policies.' A VPN grants broad network-level access. Zero Trust grants granular application-level access per-request. This distinction is tested.
The Policy Architecture: PDP and PEP
Policy Decision Point (PDP)
- The 'brain' — evaluates every access request
- Receives signals: identity, device posture, location, behavior
- Consults threat intelligence feeds in real time
- Renders Allow, Deny, or Step-Up Auth decision
- Examples: Zscaler ZPA, Cloudflare Access, Azure AD
Policy Enforcement Point (PEP)
- The 'bouncer' — executes the PDP's decision
- Sits between the user and the protected resource
- Intercepts all traffic before it reaches the application
- Terminates sessions if context changes mid-session
- Can be a network gateway, reverse proxy, or API gateway
terminal
User Request
→ PEP intercepts (network gateway/proxy)
→ PDP evaluates: identity + device + location + behavior
→ PDP decision: ALLOW (session-scoped token issued)
→ PEP permits request to reach protected applicationImplementing Zero Trust Micro-Segmentation
| Component | Function | Traditional Model Equivalent |
|---|---|---|
| Identity Provider (IdP) | Validates user via MFA + device posture | On-premise Active Directory only |
| Device Posture Check | Verifies OS patch level, AV status, encryption | Basic NAC / 802.1X |
| Micro-segmentation | Isolates application workloads dynamically | VLANs / Static subnet firewalls |
| Software-Defined Perimeter | Cloaks application endpoints from the internet | Hardware DMZ firewall |
| UEBA | Detects anomalous behavior within allowed sessions | SIEM rules only |
On the SY0-701, Zero Trust is the answer for protecting multi-cloud and remote-worker environments where a physical perimeter definition is impossible. ZTNA replaces VPN in Zero Trust deployments.
Key Takeaways
- Zero Trust: 'Never Trust, Always Verify' — implicit trust is the enemy.
- Three pillars: Verify Explicitly (all context), Least Privilege (JIT/JEA), Assume Breach (segment everything).
- PDP = the decision brain. PEP = the enforcement bouncer. Both required together.
- VPN grants network-level access. ZTNA grants per-application access. Fundamentally different.
- Micro-segmentation prevents lateral movement even after a perimeter breach has already occurred.
Next Steps
Ready to test your knowledge?
Take a free full-length practice exam with 90 questions and instant feedback.
Start Practice Exam