Protecting Privileged Access While Transitioning to Zero Trust