1. Juniper Networks TechLibrary
"Security Policies Overview": "Security policies are rules that control traffic flow from one zone to another zone... A policy consists of a set of match criteria and a set of actions." This establishes that the zone context (from-zone
to-zone) and the action are fundamental components.
URL: https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/concept/security-policy-overview.html
2. Juniper Networks TechLibrary
"Understanding Security Policies": "Each policy must include criteria for matching a connection and actions to be taken when a match occurs." This explicitly states that match criteria and actions are required. The context for the policy is always the from-zone and to-zone.
URL: https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/concept/security-policy-understanding.html
3. Juniper Networks TechLibrary
Configuration Hierarchy for security policies: The configuration structure [edit security policies from-zone to-zone policy then ] demonstrates that the zone context (from-zone
to-zone) and the action (then) are mandatory structural elements of any policy.
URL: https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/ref/statement/security-edit-policies.html