Zero Trust Is Now on the Security+ SY0-701—Here's What the Exam Actually Tests
Zero trust architecture was added explicitly to the CompTIA Security+ SY0-701 exam, and for good reason: it represents a fundamental shift in how organizations design security. The old model assumed that users and devices inside the corporate network were trustworthy. Zero trust assumes they're not. If you've worked in traditional network security but haven't studied zero trust principles, this is the new content area on SY0-701 most likely to cost you points on exam day.
What Zero Trust Architecture Actually Means
Zero trust is a security model built on the principle that no user, device, application, or network segment should be inherently trusted—regardless of whether they're inside the corporate perimeter. The shift matters because the traditional "castle and moat" network model assumed that the perimeter could be defended and that everything inside the perimeter was safe. Cloud computing, remote work, BYOD policies, and sophisticated lateral movement attacks have made this assumption dangerously wrong.
The CompTIA SY0-701 exam covers zero trust under Domain 3: Security Architecture (18%). The three core principles—which you need to know cold for the exam—are: verify explicitly, use least privilege access, and assume breach.
The Three Core Principles of Zero Trust
Verify Explicitly means always authenticate and authorize based on all available data points—identity, location, device health, service or workload, data classification, and anomalies. Instead of granting access once at login and assuming that session is safe, a zero trust system continuously evaluates each access request. A user authenticated at 9 AM from their corporate laptop in Boston shouldn't automatically have the same access when they request resources at 2 AM from an IP address in a foreign country.
The technologies that implement verify explicitly include multi-factor authentication (MFA) required for every access request, identity providers (IdP) with risk-based conditional access policies, device compliance checks before granting resource access, and continuous session monitoring that can revoke access mid-session if anomalies are detected. The exam may present scenarios where you need to identify which control implements this principle.
Use Least Privilege Access means limiting user access to only the resources, applications, and data they need to do their job—nothing more, nothing less—and only for as long as they need it. This principle applies to users, service accounts, and applications equally. A developer shouldn't have administrative access to production databases. A service account that reads from an S3 bucket shouldn't have write or delete permissions. An HR employee shouldn't have access to financial records.
Least privilege is implemented through role-based access control (RBAC), attribute-based access control (ABAC), privileged access management (PAM) solutions, just-in-time access provisioning (granting elevated access only for specific tasks and time windows), and regular access reviews (auditing who has access to what and removing unnecessary permissions). All of these are Security Operations domain topics as well—they appear in multiple exam domains because they're fundamental security controls.
Assume Breach means designing systems as if attackers are already inside the network. Instead of focusing all security investment on keeping attackers out, assume they're in and focus on minimizing the blast radius of a compromise. This changes how you design network segmentation, how you monitor traffic, and how you respond to anomalies.
Assume breach drives several architectural decisions: network microsegmentation (dividing the network into small isolated segments so a compromised device can't easily reach other resources), encrypted traffic even between internal systems (so an attacker who compromises one node can't read traffic from adjacent nodes), comprehensive logging and monitoring (so lateral movement is visible), and automated incident response (so the time from detection to containment is minimized). These aren't just principles—they're testable technologies and configurations on the SY0-701.
Zero Trust Technologies You Need to Know for the Exam
The Security+ SY0-701 doesn't test zero trust at a theoretical level only—it expects you to know the technologies that implement it. Here are the ones most likely to appear in exam questions or PBQs:
Identity and Access Management (IAM): The zero trust model puts identity at the center of security. Every access decision begins with verifying who (or what) is requesting access. Modern IAM includes single sign-on (SSO) federated across cloud and on-premises resources, conditional access policies that grant or deny access based on real-time risk signals, and privileged identity management (PIM) that controls who can elevate to administrative roles and when.
Network Access Control (NAC): NAC systems evaluate whether a device meets security standards before allowing it onto the network. In a zero trust architecture, a device must prove compliance (up-to-date patches, active endpoint protection, corporate enrollment) before receiving network access. Non-compliant devices may be quarantined to a remediation network or denied access entirely.
Microsegmentation: Traditional network segmentation divided networks into large zones (user network, server network, DMZ). Microsegmentation takes this further, creating small isolated segments where each application, workload, or even individual server can only communicate with specifically authorized peers. If an attacker compromises a web server, microsegmentation prevents them from easily reaching the database server or the HR application.
Software-Defined Perimeter (SDP): SDP creates a dynamic, application-level perimeter rather than a network-level perimeter. Users authenticate first to an SDP controller, which grants them access only to the specific applications they're authorized for—other resources remain invisible. This eliminates the traditional VPN model where authenticated users can often reach any resource on the corporate network.
Cloud Access Security Broker (CASB): CASBs sit between users and cloud services, enforcing security policies for cloud application access. In a zero trust model, a CASB ensures that access to cloud resources follows the same verify-explicitly principle as on-premises resources, regardless of which cloud service is being accessed.
How Zero Trust Questions Appear on the SY0-701
The exam tests zero trust through scenario questions. A typical question presents a situation—a company is migrating to remote work and wants to eliminate VPN—and asks which zero trust component addresses a specific requirement. Another common format asks you to identify which zero trust principle a given security control implements. A third format presents a security incident (an attacker moved laterally from a compromised workstation to a database server) and asks which zero trust control would have limited the blast radius.
Practice connecting specific technologies to specific principles. MFA implements verify explicitly. RBAC and least privilege access controls implement use least privilege. Microsegmentation and comprehensive logging implement assume breach. Performance-based questions may ask you to configure access policies or identify gaps in a proposed network architecture—both require understanding not just the principles but how to implement them.
SimpuTech's Security+ AI tutor includes scenario-based questions on zero trust architecture, cloud security, and network design—all areas of the Security Architecture domain. Try it free to test your understanding of SY0-701's newer content areas.
For a complete domain-by-domain breakdown of what the SY0-701 tests, read Security+ Domain Breakdown: Where to Focus Your Study Time.
Certification details verified against comptia.org/certifications/security as of March 2026. Requirements and fees are subject to change—confirm current details at comptia.org before registering.
Ready to put this into practice?
SimpUTech's CompTIA Security+ AI Study Coach gives you personalized practice, instant explanations, and a study plan that adapts to your level.
Start Your Free 3-Day Trial