The Components of Zero Trust