Zero Trust Architecture for Access Management

Has your organization implemented a zero trust architecture for access management yet?

If not, what’s your actionable plan for doing it and securing your infrastructure?

What blockers, if any, are preventing you from implementing a zero trust architecture?