Zero trust architecture continues to be at the forefront of government agency cyber strategies, but how are agencies implementing and managing their strategies?