This document describes what a Zero Trust strategy is and how to implement it in your network using a five-step methodology that guides you through best practices for identifying your critical protect surfaces, mapping your critical transaction flows, architecting your Zero Trust network, creating Zero Trust policy, and maintaining the deployment. Sections include links to detailed information from Palo Alto Networks, including how to configure next-generation firewalls (physical and virtual) and security capabilities from Palo Alto Networks to prevent data breaches.