Path to Cyber Security Through Zero Trust Architecture