Zero Trust in Complex Cybersecurity Environments