Zero Trust is a one and done solution
Unfortunately, Zero Trust is not a checklist exercise that can be done and forgotten. It requires constant monitoring and updating. Even if you followed best practice when setting it up, vendors regularly bring out new feature sets to support Zero Trust, which means constant improvements can - and should - be made to protect against evolving security threats.
This is particularly true when it comes to the ongoing challenge of securing legacy systems. As new technologies emerge, organisations need to consider how they can add things like identity and access management to legacy ERP systems, CRM, file servers or RDP farms. Luckily, the modern security tools automate a large part of the monitoring so while it can’t just be done once and left, the tools are designed to alleviate workload.