{"id":5734484,"date":"2024-11-06T11:36:59","date_gmt":"2024-11-06T11:36:59","guid":{"rendered":"https:\/\/www.oodrive.com\/?p=5734484"},"modified":"2024-11-06T11:36:00","modified_gmt":"2024-11-06T11:36:00","slug":"zero-trust","status":"publish","type":"post","link":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/","title":{"rendered":"Zero Trust, le mod\u00e8le phare en mati\u00e8re de s\u00e9curit\u00e9"},"content":{"rendered":"\n<p>Alors que les cybermenaces s\u2019intensifient et que les environnements informatiques se complexifient, les organisations sont contraintes de trouver de nouvelles mani\u00e8res pour s\u00e9curiser leurs donn\u00e9es et leurs infrastructures.<\/p>\n\n\n\n<p>Les approches traditionnelles de s\u00e9curit\u00e9 reposaient sur un mod\u00e8le de d\u00e9fense p\u00e9rim\u00e9trique et se concentraient uniquement sur les menaces externes. <strong>Le mod\u00e8le Zero Trust change de paradigme en partant du principe qu\u2019aucun utilisateur ou appareil ne doit \u00eatre consid\u00e9r\u00e9 comme fiable par d\u00e9faut, mais doit toujours \u00eatre v\u00e9rifi\u00e9<\/strong>.<\/p>\n\n\n\n<p>Qu\u2019est-ce que le mod\u00e8le Zero Trust et comment fonctionne-t-il&nbsp;? Cet article explore les concours et les avantages de ce mod\u00e8le.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Qu\u2019est-ce que la s\u00e9curit\u00e9 z\u00e9ro trust&nbsp;?<\/h2>\n\n\n\n<p><strong>Le concept \u00ab&nbsp;Zero Trust&nbsp;\u00bb<\/strong> <strong>est un mod\u00e8le de s\u00e9curit\u00e9<\/strong> <strong>qui d\u00e9passe les strat\u00e9gies traditionnelles de d\u00e9fense p\u00e9rim\u00e9trique<\/strong>. Il ne s\u2019agit pas d\u2019une technologie, mais d\u2019un concept d\u2019architecture dont l\u2019objectif est de <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/resilience-informatique\/\">renforcer la s\u00e9curit\u00e9 d\u2019acc\u00e8s aux ressources et aux services<\/a>.<\/p>\n\n\n\n<p class=\"has-blue-work-2-background-color has-background\">D\u2019apr\u00e8s le mod\u00e8le Zero Trust, chaque connexion, chaque appareil et chaque utilisateur repr\u00e9sentent une menace potentielle. Il n\u2019est donc pas possible de leur faire confiance de mani\u00e8re implicite. C\u2019est pour cela que l\u2019architecture Zero Trust (ZTA) examine avec soin chaque demande d\u2019acc\u00e8s des utilisateurs. L\u2019ANSSI pr\u00e9cise d\u2019ailleurs que <em>\u00ab&nbsp;les contr\u00f4les doivent devenir r\u00e9guliers, dynamiques et granulaires&nbsp;\u00bb<\/em>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Quel est le principe fondamental du mod\u00e8le Zero Trust&nbsp;?<\/h3>\n\n\n\n<p>Avec son mantra \u00ab&nbsp;Ne jamais faire confiance, toujours v\u00e9rifier&nbsp;\u00bb, l<strong>e mod\u00e8le Zero Trust exige que tous les utilisateurs soient authentifi\u00e9s en permanence<\/strong> avant de pouvoir acc\u00e9der au r\u00e9seau. Ses fondements sont les suivants&nbsp;:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Aucune entit\u00e9 (utilisateur, application, service, terminal) n\u2019est consid\u00e9r\u00e9e comme fiable par d\u00e9faut,<\/li>\n\n\n\n<li>Le principe du moindre privil\u00e8ge doit \u00eatre appliqu\u00e9,<\/li>\n\n\n\n<li>Une surveillance constante doit \u00eatre r\u00e9alis\u00e9e.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Comment fonctionne le mod\u00e8le Zero Trust&nbsp;?<\/h2>\n\n\n\n<p>Une architecture Zero Trust s\u2019appuie sur plusieurs grands principes. En voici quelques-uns.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contr\u00f4le d\u2019acc\u00e8s bas\u00e9 sur le principe du moindre privil\u00e8ge<\/h3>\n\n\n\n<p>Les demandes d\u2019acc\u00e8s sont examin\u00e9es en fonction du contexte (identit\u00e9 de l\u2019utilisateur, appareil, emplacement, etc.) et selon le principe de \u00ab&nbsp;l\u2019acc\u00e8s conditionnel&nbsp;\u00bb. <strong>Les utilisateurs doivent avoir uniquement acc\u00e8s aux ressources n\u00e9cessaires dans le cadre de l\u2019accomplissement de leurs t\u00e2ches<\/strong>. Les droits d\u2019acc\u00e8s sont accord\u00e9s de mani\u00e8re granulaire et r\u00e9\u00e9valu\u00e9s lorsque le contexte change.<\/p>\n\n\n\n<p>Une gestion centralis\u00e9e des identit\u00e9s et des acc\u00e8s permet de maintenir un contr\u00f4le strict sur \u00ab&nbsp;quel utilisateur a acc\u00e8s \u00e0 quelles ressources&nbsp;\u00bb et selon quelles conditions.<\/p>\n\n\n\n<a href=\"https:\/\/www.oodrive.com\/fr\/secnumcloud\/\" class=\"product__section\" id=\"snc-banner\"><div class=\"product__section-container\"><p class=\"product__section-title\">SecNumCloud : label de confiance<\/p><p class=\"product__section-description\">Le r\u00e9f\u00e9rentiel qui garantit le plus haut niveau de s\u00e9curit\u00e9 pour la protection de vos donn\u00e9es sensibles.<\/p><img decoding=\"async\" src=\"..\/..\/..\/..\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/bg-banner_work.svg\" class=\"product__section-bg\"\/><\/div><div class=\"product__section-link\"><img decoding=\"async\" src=\"..\/..\/..\/..\/wp-content\/plugins\/oodrive-blog-banners\/src\/img\/logo-snc.svg\" class=\"product__section-logo\" alt=\"oodrive snc\"\/><div class=\"cta\"><span>En savoir plus<\/span><\/div><\/div><\/a>\n\n\n\n<h3 class=\"wp-block-heading\">Micro-segmentation du r\u00e9seau<\/h3>\n\n\n\n<p>Chaque micro-segment est trait\u00e9 comme un r\u00e9seau ind\u00e9pendant, avec des r\u00e8gles de s\u00e9curit\u00e9 qui lui sont propres. Les ressources les plus sensibles peuvent ainsi b\u00e9n\u00e9ficier d\u2019une protection adapt\u00e9e. Cette strat\u00e9gie limite \u00e9galement les possibilit\u00e9s de mouvement lat\u00e9ral pour un attaquant qui aurait malgr\u00e9 tout r\u00e9ussi une intrusion initiale.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Authentification multifacteur<\/h3>\n\n\n\n<p><strong>L\u2019authentification multifacteur est g\u00e9n\u00e9ralement consid\u00e9r\u00e9e comme un pr\u00e9alable<\/strong> \u00e0 la mise en place d\u2019une approche de s\u00e9curit\u00e9 Zero Trust, permettant de renforcer la s\u00e9curit\u00e9 des acc\u00e8s.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Surveillance et analyse continues<\/h3>\n\n\n\n<p>La surveillance et l\u2019analyse continues permettent de d\u00e9tecter d\u2019\u00e9ventuelles anomalies et comportements suspects (tentative d\u2019intrusion, utilisation abusive des ressources, etc.).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Quels sont les avantages du mod\u00e8le de s\u00e9curit\u00e9 Zero Trust&nbsp;?<\/h2>\n\n\n\n<p>L\u2019approche Zero Trust offre diff\u00e9rents b\u00e9n\u00e9fices qui la rendent d\u00e9sormais incontournable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Renforcement de la s\u00e9curit\u00e9 des donn\u00e9es<\/h3>\n\n\n\n<p>L\u2019approche Zero Trust s\u2019av\u00e8re particuli\u00e8rement adapt\u00e9e aux d\u00e9fis actuels li\u00e9s \u00e0 la <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees-definition-enjeux\/\">s\u00e9curit\u00e9 des donn\u00e9es<\/a>, puisqu\u2019elle garantit un acc\u00e8s s\u00e9curis\u00e9 aux ressources, partout et tout le temps. Chaque demande d\u2019acc\u00e8s \u00e9tant soigneusement \u00e9tudi\u00e9e, le risque de fuites de donn\u00e9es est r\u00e9duit.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">R\u00e9duction de la surface d\u2019attaque<\/h3>\n\n\n\n<p>L\u2019acc\u00e8s aux ressources \u00e9tant limit\u00e9 par le principe du moindre privil\u00e8ge, <strong>le mod\u00e8le Zero Trust r\u00e9duit la surface d\u2019attaque potentiellement exploitable par des attaquants<\/strong>. M\u00eame en parvenant \u00e0 compromettre un compte utilisateur, les attaquants auraient acc\u00e8s uniquement aux ressources autoris\u00e9es pour le compte en question.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Meilleure visibilit\u00e9 sur le trafic r\u00e9seau<\/h3>\n\n\n\n<p><strong>L\u2019architecture Zero Trust offre une visibilit\u00e9 compl\u00e8te sur l\u2019ensemble du trafic r\u00e9seau<\/strong>. Les menaces, les comportements anormaux ou suspects peuvent \u00eatre d\u00e9tect\u00e9s plus rapidement. Une r\u00e9ponse plus efficace peut y \u00eatre apport\u00e9e.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Facilitation de la mise en conformit\u00e9 r\u00e9glementaire<\/h3>\n\n\n\n<p>Parce qu\u2019il offre un contr\u00f4le pr\u00e9cis et une tra\u00e7abilit\u00e9 compl\u00e8te de l\u2019acc\u00e8s aux donn\u00e9es, le mod\u00e8le Zero Trust facilite la conformit\u00e9 aux <a href=\"https:\/\/www.oodrive.com\/fr\/blog\/reglementation\/directive-nis2-tout-comprendre\/\">r\u00e9glementations relatives \u00e0 la protection des donn\u00e9es<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Comment mettre en \u0153uvre l\u2019architecture Zero Trust&nbsp;?<\/h2>\n\n\n\n<p>La mise en place d\u2019une architecture Zero Trust est un processus progressif dont voici les principales \u00e9tapes.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cartographier les actifs, utilisateurs, applications, flux de donn\u00e9es, afin de prendre en compte l\u2019ensemble des ressources et donn\u00e9es \u00e0 prot\u00e9ger.<\/li>\n\n\n\n<li>D\u00e9finir les politiques d\u2019acc\u00e8s bas\u00e9es sur le principe du moindre privil\u00e8ge&nbsp;: qui doit avoir acc\u00e8s \u00e0 quelles ressources, dans quelles conditions, etc.<\/li>\n\n\n\n<li>Mettre en place la micro-segmentation du r\u00e9seau afin d\u2019isoler les ressources critiques.<\/li>\n\n\n\n<li>Impl\u00e9menter des solutions d\u2019authentification multifacteur.<\/li>\n\n\n\n<li>D\u00e9ployer des outils de surveillance et de d\u00e9tection.<\/li>\n\n\n\n<li>Mettre en place du chiffrement.<\/li>\n\n\n\n<li>Sensibiliser les utilisateurs aux nouveaux modes d\u2019acc\u00e8s et d\u2019authentification.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Les \u00e9l\u00e9ments \u00e0 retenir sur le mod\u00e8le Zero Trust<\/h2>\n\n\n\n<p><strong>La s\u00e9curit\u00e9 Zero Trust repr\u00e9sente un v\u00e9ritable changement de paradigme<\/strong> dans la mani\u00e8re dont les organisations publiques et priv\u00e9es abordent les questions de cybers\u00e9curit\u00e9 et de protection de leurs donn\u00e9es. <\/p>\n\n\n\n<p>S\u2019appuyant sur une gestion granulaire des acc\u00e8s et une surveillance constante, <strong>l\u2019architecture Zero Trust constitue une approche robuste et efficace pour s\u00e9curiser les environnements informatiques actuels<\/strong>, de plus en plus complexes.<\/p>\n\n\n\n<p>Permettant de r\u00e9duire les risques tout en am\u00e9liorant la conformit\u00e9, <strong>le mod\u00e8le Zero Trust s\u2019affirme comme une strat\u00e9gie de choix pour les organisations soucieuses de la s\u00e9curit\u00e9 de leurs donn\u00e9es<\/strong>. Le cadre Zero Trust permet aux organisations d\u2019adopter de nouveaux modes de travail et de collaboration tout en maintenant un <a href=\"https:\/\/www.oodrive.com\/fr\/secnumcloud\/\">niveau de s\u00e9curit\u00e9 \u00e9lev\u00e9<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alors que les cybermenaces s\u2019intensifient et que les environnements informatiques se complexifient, les organisations sont contraintes de trouver de nouvelles mani\u00e8res pour s\u00e9curiser leurs donn\u00e9es et leurs infrastructures. Les approches traditionnelles de s\u00e9curit\u00e9 reposaient sur un mod\u00e8le de d\u00e9fense p\u00e9rim\u00e9trique et se concentraient uniquement sur les menaces externes. Le mod\u00e8le Zero Trust change de paradigme [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":7009980,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1229],"class_list":["post-5734484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-donnees"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Qu\u2019est-ce que le mod\u00e8le Zero Trust\u00a0?<\/title>\n<meta name=\"description\" content=\"Le mod\u00e8le de s\u00e9curit\u00e9 Zero Trust est un concept d\u2019architecture qui \u00e9limine la confiance implicite et renforce la s\u00e9curit\u00e9 d\u2019acc\u00e8s aux ressources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu\u2019est-ce que le mod\u00e8le Zero Trust\u00a0?\" \/>\n<meta property=\"og:description\" content=\"Le mod\u00e8le de s\u00e9curit\u00e9 Zero Trust est un concept d\u2019architecture qui \u00e9limine la confiance implicite et renforce la s\u00e9curit\u00e9 d\u2019acc\u00e8s aux ressources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Oodrive\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-06T11:36:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/zero_trust-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Maxime Geffray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maxime Geffray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/\"},\"author\":{\"name\":\"Maxime Geffray\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/b02195df53ceaeed086a7494fc1aa6e3\"},\"headline\":\"Zero Trust, le mod\u00e8le phare en mati\u00e8re de s\u00e9curit\u00e9\",\"datePublished\":\"2024-11-06T11:36:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/\"},\"wordCount\":1164,\"publisher\":{\"@id\":\"https:\/\/www.oodrive.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/zero_trust-1.jpeg\",\"articleSection\":[\"S\u00e9curit\u00e9 des donn\u00e9es\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/\",\"url\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/\",\"name\":\"Qu\u2019est-ce que le mod\u00e8le Zero Trust\u00a0?\",\"isPartOf\":{\"@id\":\"https:\/\/www.oodrive.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/zero_trust-1.jpeg\",\"datePublished\":\"2024-11-06T11:36:59+00:00\",\"description\":\"Le mod\u00e8le de s\u00e9curit\u00e9 Zero Trust est un concept d\u2019architecture qui \u00e9limine la confiance implicite et renforce la s\u00e9curit\u00e9 d\u2019acc\u00e8s aux ressources.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#primaryimage\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/zero_trust-1.jpeg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/zero_trust-1.jpeg\",\"width\":1000,\"height\":667,\"caption\":\"Le mod\u00e8le de s\u00e9curit\u00e9 zero trust\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.oodrive.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9\",\"item\":\"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 des donn\u00e9es\",\"item\":\"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/securite-donnees\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Zero Trust, le mod\u00e8le phare en mati\u00e8re de s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oodrive.com\/#website\",\"url\":\"https:\/\/www.oodrive.com\/\",\"name\":\"Oodrive\",\"description\":\"Plateforme souveraine et s\u00e9curis\u00e9e, Oodrive permet de g\u00e9rer vos donn\u00e9es sensibles : partage, signature, sauvegarde et plus encore.\",\"publisher\":{\"@id\":\"https:\/\/www.oodrive.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oodrive.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oodrive.com\/#organization\",\"name\":\"Oodrive\",\"url\":\"https:\/\/www.oodrive.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg\",\"width\":132,\"height\":27,\"caption\":\"Oodrive\"},\"image\":{\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/b02195df53ceaeed086a7494fc1aa6e3\",\"name\":\"Maxime Geffray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oodrive.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg\",\"contentUrl\":\"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg\",\"caption\":\"Maxime Geffray\"},\"description\":\"Communication Manager at Oodrive\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Qu\u2019est-ce que le mod\u00e8le Zero Trust\u00a0?","description":"Le mod\u00e8le de s\u00e9curit\u00e9 Zero Trust est un concept d\u2019architecture qui \u00e9limine la confiance implicite et renforce la s\u00e9curit\u00e9 d\u2019acc\u00e8s aux ressources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Qu\u2019est-ce que le mod\u00e8le Zero Trust\u00a0?","og_description":"Le mod\u00e8le de s\u00e9curit\u00e9 Zero Trust est un concept d\u2019architecture qui \u00e9limine la confiance implicite et renforce la s\u00e9curit\u00e9 d\u2019acc\u00e8s aux ressources.","og_url":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/","og_site_name":"Oodrive","article_published_time":"2024-11-06T11:36:59+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/zero_trust-1.jpeg","type":"image\/jpeg"}],"author":"Maxime Geffray","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Maxime Geffray","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/"},"author":{"name":"Maxime Geffray","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/b02195df53ceaeed086a7494fc1aa6e3"},"headline":"Zero Trust, le mod\u00e8le phare en mati\u00e8re de s\u00e9curit\u00e9","datePublished":"2024-11-06T11:36:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/"},"wordCount":1164,"publisher":{"@id":"https:\/\/www.oodrive.com\/#organization"},"image":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/zero_trust-1.jpeg","articleSection":["S\u00e9curit\u00e9 des donn\u00e9es"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/","url":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/","name":"Qu\u2019est-ce que le mod\u00e8le Zero Trust\u00a0?","isPartOf":{"@id":"https:\/\/www.oodrive.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/zero_trust-1.jpeg","datePublished":"2024-11-06T11:36:59+00:00","description":"Le mod\u00e8le de s\u00e9curit\u00e9 Zero Trust est un concept d\u2019architecture qui \u00e9limine la confiance implicite et renforce la s\u00e9curit\u00e9 d\u2019acc\u00e8s aux ressources.","breadcrumb":{"@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#primaryimage","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/zero_trust-1.jpeg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/11\/zero_trust-1.jpeg","width":1000,"height":667,"caption":"Le mod\u00e8le de s\u00e9curit\u00e9 zero trust"},{"@type":"BreadcrumbList","@id":"https:\/\/www.oodrive.com\/fr\/blog\/securite\/securite-donnees\/zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.oodrive.com\/es\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 des donn\u00e9es","item":"https:\/\/www.oodrive.com\/fr\/blog\/category\/securite\/securite-donnees\/"},{"@type":"ListItem","position":4,"name":"Zero Trust, le mod\u00e8le phare en mati\u00e8re de s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.oodrive.com\/#website","url":"https:\/\/www.oodrive.com\/","name":"Oodrive","description":"Plateforme souveraine et s\u00e9curis\u00e9e, Oodrive permet de g\u00e9rer vos donn\u00e9es sensibles : partage, signature, sauvegarde et plus encore.","publisher":{"@id":"https:\/\/www.oodrive.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oodrive.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.oodrive.com\/#organization","name":"Oodrive","url":"https:\/\/www.oodrive.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2021\/12\/oodrive_black_logo.svg","width":132,"height":27,"caption":"Oodrive"},"image":{"@id":"https:\/\/www.oodrive.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/b02195df53ceaeed086a7494fc1aa6e3","name":"Maxime Geffray","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oodrive.com\/#\/schema\/person\/image\/","url":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg","contentUrl":"https:\/\/www.oodrive.com\/wp-content\/uploads\/2024\/07\/maxime-96x96.jpg","caption":"Maxime Geffray"},"description":"Communication Manager at Oodrive"}]}},"_links":{"self":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/5734484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/comments?post=5734484"}],"version-history":[{"count":0,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/posts\/5734484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/media\/7009980"}],"wp:attachment":[{"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/media?parent=5734484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oodrive.com\/fr\/wp-json\/wp\/v2\/categories?post=5734484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}