security Zero Trust Architectures Why Zero Trust architectures exists, what it is and how it can be implemented.