Roadmap to Zero Trust security by applying PAM strategies