The zero trust approach to cyber starts from the inside