In a Zero Trust model, access is never implicitly trusted and must be continuously verified - making privileged access review critical. ISACA CRISC guidance: "Under the Zero Trust model, continuous validation and review of privileged user access is essential to prevent privilege escalation and insider threats." Integration and segmentation are design concerns; privileged access management is the ongoing control requirement. Thus, A is correct. CRISC Reference: Domain 4 - Risk and Control Monitoring and Reporting, Topic: Zero Trust and Continuous Authorization.