Intrusion Detection through Zero Trust Access Control