Zero Trust and Defense-in-Depth Models Overview