The correct answer is B. False. In Zero Trust architecture, validating the user’s identity is essential, but it is not the sole attribute used to control access. Zscaler’s architecture guidance explicitly states that policy assignment evaluates factors such as the user, machine, location, group, and more to determine which policy should apply. This means Zero Trust decisions are based on a combination of identity and context, not identity alone.
This distinction is critical. If access were based only on username and authentication, then a compromised account, an unmanaged device, a risky location, or suspicious behavior could still be treated too permissively. Zero Trust avoids that weakness by continuously assessing the broader conditions of the request. Device posture, application sensitivity, session characteristics, network conditions, and dynamic risk signals can all influence whether access is allowed, restricted, isolated, deceived, or blocked. Zscaler also emphasizes that users access applications without sharing network context, which shows that access is not controlled by identity alone or by network location alone, but by a policy engine evaluating multiple attributes together. Therefore, the statement is false.
Submit