With the advent of cloud computing and shift toward a remote workforce, organizations are seeing a need for a shift in their traditional network security and methodology to a hybrid cloud environment that includes non-person entities, APIs, infrastructure, and microservices. As the amount of access to a network expands so does the attack surface and vectors for potential compromise. Traditional Privileged Access Management (PAM) implementation is becoming less viable as the delineation of an organization's intranet and extranet have become too blurred to be effectively enforced. PAM solutions need to be incorporated into an organization’s system with Zero Trust architecture in mind. Zero Trust introduces a “never trust, always verify” mentality which centers around enforcing a “least privilege” approach to users and devices inside or outside the network through dynamic policies based on a clear insight into the identity of the user or device. While Zero Trust is possible with current PAM offerings, current implementations could be utilized to better utilize Zero Trust methodology – for example by incorporating just in time (JIT) provisioning for authorized users that is dynamically set to expire. Organizations should be cognizant of the technical debt required to achieve a worthwhile Zero Trust environment.