Identity-Centric Security: The Zero Trust Perspective