Debunking the Myth around Implementing Zero Trust