An Overview of the Zero Trust Security Model: A Comprehensive Guide