Zero Trust for Legacy Systems: Challenges and Fixes