Zero Trust, SASE, and SSE Concepts

Key Takeaways

  • Zero trust assumes no implicit trust based on network location; access decisions are explicit, contextual, and continuously evaluated.
  • Core zero trust ideas include least privilege, strong identity, device posture, segmentation, continuous monitoring, and policy enforcement.
  • SASE combines networking and security functions, commonly including SD-WAN, secure web gateway, CASB, zero trust network access, and firewall capabilities.
  • SSE is the security-services subset of SASE and commonly includes SWG, CASB, ZTNA, and data protection controls.
  • For exam scenarios, choose ZTNA or identity-aware access when the requirement is app-specific remote access without broad network VPN exposure.
Last updated: April 2026

Zero Trust, SASE, and SSE Concepts

Zero trust is an architecture approach, not a single product. It removes implicit trust from network location and makes access decisions based on identity, device, application, data sensitivity, context, and risk.

Zero Trust Principles

PrincipleMeaningExample
Verify explicitlyAuthenticate and authorize each access requestMFA plus device compliance check
Least privilegeGrant only required accessUser can reach one app, not a whole subnet
Assume breachLimit blast radius and monitor continuouslyMicrosegmentation and EDR telemetry
Continuous evaluationAccess can change as risk changesBlock session after device becomes noncompliant
Strong identityUsers and workloads are knownSSO, federation, service identity, certificate-based auth

Zero Trust Policy Inputs

A policy decision point may evaluate:

  • User identity and group.
  • Device health, encryption, EDR, and patch posture.
  • Location and impossible travel signals.
  • Application being requested.
  • Data classification.
  • Session risk.
  • Authentication strength.
  • Time and behavior patterns.

The policy enforcement point then allows, blocks, challenges, limits, or logs the session.

ZTNA vs Traditional VPN

FeatureTraditional remote access VPNZTNA
Access modelOften network-level accessApplication-specific access
Trust basisAuthenticated user joins network pathIdentity, device, and policy per app
Blast radiusCan expose many internal services if poorly scopedLimits user to approved applications
Good fitAdmin networks, legacy protocols, site-to-site needsRemote workforce access to specific apps

Exam trap: VPN is not wrong in every scenario. But when a question asks for least-privilege remote access to a specific private application, ZTNA is often the better answer.

SASE and SSE

Secure Access Service Edge, or SASE, combines wide-area networking and cloud-delivered security. Security Service Edge, or SSE, is the security-services portion without the full network transport focus.

ComponentUsually associated withPurpose
SD-WANSASEIntelligent traffic routing across WAN links
Secure web gateway (SWG)SASE/SSEWeb filtering, URL filtering, malware controls
Cloud access security broker (CASB)SASE/SSEVisibility and policy enforcement for cloud apps
Zero trust network access (ZTNA)SASE/SSEApp-specific private access
Firewall as a service (FWaaS)SASE/SSECloud-delivered firewall policy
Data loss prevention (DLP)SASE/SSEDetect and restrict sensitive data movement

PBQ-Style Scenario

A company has remote employees, unmanaged SaaS usage, and private internal applications. Users currently connect through a full-tunnel VPN, then browse to SaaS and internal systems. The security team wants app-level access, SaaS visibility, and consistent web filtering.

Reasonable target design:

  1. Use identity provider federation and MFA for users.
  2. Use ZTNA for private applications so users receive access only to approved apps.
  3. Use CASB to discover and control SaaS usage.
  4. Use SWG for web filtering and malware protection.
  5. Use device posture checks before allowing sensitive application access.
  6. Send policy and access logs to centralized monitoring.

Wrong direction: "Put every user on the internal network and trust them after login." That keeps the old perimeter model and does not satisfy least privilege.

Design Review Checklist

  • Is access based on identity and context rather than subnet alone?
  • Are users limited to required applications?
  • Are devices checked before sensitive access?
  • Is sensitive data protected in SaaS and web channels?
  • Are policy decisions logged?
  • Are exceptions documented and time-bound?

Zero trust questions often reward the answer that narrows access while increasing verification and visibility.

Test Your Knowledge

A remote employee needs access to one internal HR application but should not receive broad access to the internal network. Which technology best fits?

A
B
C
D
Test Your KnowledgeMulti-Select

Which services are commonly part of SSE? Choose three.

Select all that apply

Secure web gateway
Cloud access security broker
Zero trust network access
Diesel generator maintenance
RAID controller cache
Test Your Knowledge

Which statement best describes zero trust?

A
B
C
D