What Capabilities are Required to Implement Zero Trust Security?