# Zero Trust Operations (Continuous Verification)
One-sentence definition: Operate environments assuming breach; continuously verify identity, device, and context before every access.
## Key Facts
- Enforce least privilege with policy engines; telemetry-driven decisions.
- Continual posture checks (device compliance, risk, location); session re-evaluation.
- Short-lived credentials; segment apps and data; monitor east–west.
- Measure policy hit rates, denials, and risk-based step-ups.
- **Verify:** check official (ISC)² CBK and current exam outline.
## Exam Relevance
- Choose continuous verification + segmentation over perimeter-only.
**Mnemonic:** “**Never trust, always test**.”
## Mini Scenario
Q: Token theft leads to API misuse—ZT response?
A: PoP/mTLS, session revocation, conditional access, and microsegmentation.
## Revision Checklist
- Two continuous checks.
- Short-lived credential reason.
- Metric examples.
## Related
[[Conditional Access Policies (Risk Device Location)]] · [[Network Segmentation and NAC]] · [[Cloud IAM Role Assumption and Temporary Credentials]] · [[Identity Threat Detection and Response (ITDR)]] · [[Domain 7 - Index]]