Zero Trust: How You Prove Trust and Prevent Breaches