Zero trust security concept, adopted by almost two-thirds of organizations, is still in progress for many, covering less than half of infrastructure.Implementing zero trust requires understanding the obstacles and best practices, viewing all connections, devices, and applications as untrusted.Guidelines like NIST SP 800-207 and SP 1800-35B offer detailed components and implementation recommendations for zero trust.Zero trust implementation often requires mixing guidance from various sources and key IT suppliers like Microsoft.Zero trust migration needs support at administrative and executive levels and significant effort from departments, including HR.Defining priorities involves analyzing critical IT assets and finding areas needing zero trust migration.Phased implementation of zero trust architecture starts with small steps like multi-factor authentication for quick wins.Phased implementation avoids the risks associated with a 'big bang' approach and allows for adjustments in a minimally disruptive manner.A mature Identity Access Management system is crucial for zero trust, requiring technical and administrative support.Zero trust implementation involves training employees on new authentication procedures and tools and involving them in the process.