Implementing the Identity and Device Security Principles of Zero Trust