Steps to Take for Zero Trust Security