Multiple Paths to Zero Trust