3.1. Describe Zero Trust security principles for Microsoft 365