Assess
Assess your environment including identifying high value assets and determine your classification policy, conduct a gap analysis between your Zero Trust use cases and your existing security architecture, determine success criteria and develop a Zero Trust roadmap.