The correct answer is C. Context and Identity. In Zero Trust architecture, the earliest control decisions cannot be made effectively unless the platform first understands who is making the request and under what conditions that request is happening. That means identity must be verified, and context must be evaluated. Context includes factors such as device posture, location, group membership, application sensitivity, and risk-related conditions. Without those inputs, the architecture cannot determine whether the request should be allowed, restricted, isolated, or blocked.
SSL/TLS inspection is highly important for deeper content-aware controls, but it is not the first requirement for the initial level of control decisions. Local breakout is a traffic-forwarding design choice, not the foundational requirement for policy decision-making. Air-gapping an OT network is a segmentation strategy, but it does not represent the first control layer in Zero Trust. Zero Trust begins with verification and contextual understanding, because policy must be tied to the specific request, not to broad network assumptions. Therefore, the first levels of control policy decisions require context and identity.
Questions 22
What protects Personally Identifiable Information (PII) accidentally shared by a colleague to the entire company?
Options:
A.
SSL/TLS inspection.
B.
Verifying identity and context through a secure identity provider.
C.
Data Loss Prevention (out-of-band and inline).
D.
Virtual firewalls.
Answer:
C
Explanation:
The correct answer is C. Data Loss Prevention (out-of-band and inline). In Zero Trust architecture, protection of sensitive data such as Personally Identifiable Information (PII) is handled by controls that understand and govern the content being transmitted, not just the identity of the sender or the existence of a connection. Zscaler’s TLS/SSL inspection reference architecture explicitly identifies Data Loss Prevention (DLP) as a capability that helps prevent sensitive data from leaving the organization . That directly addresses accidental broad sharing, because DLP policies can detect sensitive patterns and stop, restrict, or alert on improper distribution.
SSL/TLS inspection helps make the content visible, but by itself it is not the control that decides whether the sensitive information should be allowed. Identity verification is important for access decisions, but it does not prevent a legitimate user from unintentionally oversharing data. Virtual firewalls also do not provide content-aware protection for PII leakage. Zero Trust requires content-aware controls in addition to identity and context, which is why inline and out-of-band DLP is the correct answer for protecting accidentally shared PII.