Objective 1.2Critical Priority9 min read

Zero Trust Overview

A security model based on the principle "never trust, always verify." Zero trust eliminates implicit trust and requires continuous verification of users, devices, and applications regardless of network location.

Understanding Zero Trust Overview

Zero trust is a security philosophy that assumes no user, device, or network should be automatically trusted—not even those inside the corporate network. Every access request must be verified, regardless of where it originates.

Traditional security used a "castle and moat" approach: strong perimeter defenses, but once inside, users were trusted. Zero trust recognizes this model fails in modern environments where users work remotely, data lives in the cloud, and attackers who breach the perimeter move freely.

The core principle: "Never trust, always verify." Every access request is authenticated, authorized, and encrypted. Trust is never assumed based on network location, device ownership, or previous access.

Why This Matters for the Exam

Zero trust is heavily emphasized in SY0-701, reflecting its adoption across enterprises. The exam tests both conceptual understanding and practical implementation components.

Understanding zero trust helps answer questions about modern network security, cloud architecture, and identity management. It also connects to multiple other exam topics: authentication, authorization, network segmentation, and encryption.

The exam specifically tests the control plane (decision-making) and data plane (enforcement) components of zero trust architecture—covered in the next two concepts.

Deep Dive

Core Zero Trust Principles

1. Never Trust, Always Verify

  • Every access request requires verification
  • Previous access doesn't guarantee future access
  • Trust is earned per session, not assumed

2. Assume Breach

  • Design as if attackers are already inside
  • Minimize blast radius of any compromise
  • Don't rely solely on perimeter defenses

3. Verify Explicitly

  • Authenticate based on all available data points
  • Consider user identity, location, device health, data classification
  • Make risk-based access decisions

4. Least Privilege Access

  • Grant minimum permissions needed
  • Time-limited access when possible
  • Just-in-time access provisioning

5. Micro-segmentation

  • Divide network into small, isolated segments
  • Control traffic between segments
  • Limit lateral movement by attackers

Traditional vs. Zero Trust Security

TraditionalZero Trust
Trust internal networkTrust no network
Perimeter-focusedIdentity-focused
Authenticate onceContinuous authentication
VPN for remote accessDirect access with verification
Implicit trust insideExplicit verification everywhere
Broad network accessMicro-segmented access

Zero Trust Architecture Components

Control Plane (Decision-Making)

  • Policy Engine — Makes access decisions
  • Policy Administrator — Executes policy decisions
  • Adaptive Identity — Risk-based authentication
  • Threat Intelligence — Informs access decisions

Data Plane (Enforcement)

  • Policy Enforcement Points — Enforce decisions
  • Subject/System — Users and devices requesting access
  • Implicit Trust Zones — Minimal trusted areas
  • Enterprise Resources — Protected assets

Key Technologies Enabling Zero Trust

Identity Providers — Centralized authentication • MFA — Strong multi-factor authentication • ZTNA — Zero Trust Network Access (replaces VPN) • Micro-segmentation — Network isolation • Endpoint Detection — Device health assessment • SIEM/SOAR — Security monitoring and automation • Encryption — Data protection in transit and at rest

Zero Trust Implementation Steps

1. Identify sensitive data and assets 2. Map transaction flows 3. Architect zero trust network 4. Create zero trust policies 5. Monitor and maintain

How CompTIA Tests This

Example Analysis

Scenario: An organization transitions from VPN-based remote access to a new system where users must authenticate with MFA for every application access, their device health is verified before each session, and access is limited to only the specific applications needed for their role—regardless of whether they're in the office or working remotely.

Analysis: This describes a zero trust architecture implementation: • Never trust, always verify: MFA for every application (not just VPN login) • Continuous verification: Device health checked each session • Least privilege: Access limited to role-specific applications • Location-independent: Same controls whether in office or remote

Key insight: In traditional VPN, once connected, users often had broad network access. Zero trust eliminates that—every application access is individually verified.

Key Terms to Know

zero trustnever trust always verifycontinuous verificationmicro-segmentationimplicit trustleast privilegezero trust architecture

Common Mistakes to Avoid

Thinking zero trust means trusting nothing—zero trust means no IMPLICIT trust. Trust is still granted, but explicitly and conditionally, based on verification.
Assuming zero trust is a product—zero trust is a philosophy and architecture, not a single product. It requires multiple technologies working together.
Forgetting that zero trust applies inside the network—the biggest shift is treating internal users/devices with the same scrutiny as external ones.
Missing the continuous aspect—zero trust isn't one-time authentication. It's continuous verification throughout the session.

Exam Tips

"Never trust, always verify" is the zero trust mantra. Any question about eliminating implicit trust or continuous verification likely relates to zero trust.
Zero trust replaces the "castle and moat" (perimeter-focused) security model with an identity-focused model.
ZTNA (Zero Trust Network Access) often replaces VPN in zero trust implementations.
Micro-segmentation is a key zero trust technique—it limits lateral movement even if an attacker breaches one segment.
Know the two planes: Control Plane (decides) and Data Plane (enforces).

Memory Trick

"Never Trust, Always Verify" = NTAV

  • Every letter represents a principle:
  • No implicit trust
  • Trust must be earned
  • Always authenticate
  • Verify continuously
  • The VIP Model:
  • Verify explicitly
  • Implicitly deny (assume hostile)
  • Privilege minimally (least privilege)
  • Traditional vs. Zero Trust:
  • Castle & Moat = Trust inside, protect the wall
  • Zero Trust = Trust no one, verify everyone
  • Technology Shift:
  • VPN → ZTNA
  • Network-based trust → Identity-based trust
  • One-time login → Continuous verification

Test Your Knowledge

Q1.Which principle BEST describes the zero trust security model?

Q2.An organization implements a security architecture where every user must authenticate for each application, device health is verified continuously, and network access is segmented so users only reach resources they're authorized for. What security model is this?

Q3.In zero trust architecture, what replaces the implicit trust previously granted to users on the corporate network?

Want more practice with instant AI feedback?

Practice with AI

Continue Learning

Ready to test your knowledge?

Practice questions on zero trust overview and other Objective 1.2 concepts.

Start Practice