This Zero Trust strategy provides the necessary guidance for developing the Zero Trust concept. The enhancements include gap analysis, requirements development, implementation, execution decision-making, and ultimately procurement and deployment of required ZT capabilities and activities, which will have meaningful and measurable cybersecurity impacts upon adversaries.