How zero-trust architectures can prevent supply chain attacks