Getting a Security Roadmap: The Zero Trust Approach