The Intersection of Zero Trust, Identity, and Deployment Flexibility