A clearer lens on Zero Trust security strategy: Part 1 - Mic