Simplify Zero Trust Implementation Using A Five-Step Methodology