{"id":1961,"date":"2021-11-01T12:38:27","date_gmt":"2021-11-01T19:38:27","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=1961"},"modified":"2023-11-07T16:34:48","modified_gmt":"2023-11-07T21:34:48","slug":"what-is-zero-trust","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/what-is-zero-trust\/","title":{"rendered":"Qu'est-ce que la confiance z\u00e9ro ?"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>La s\u00e9curit\u00e9 z\u00e9ro confiance int\u00e8gre une s\u00e9rie de donn\u00e9es de s\u00e9curit\u00e9, de renseignements sur les menaces et de politiques bas\u00e9es sur les risques afin de v\u00e9rifier en permanence la fiabilit\u00e9 des utilisateurs et des ressources sur un r\u00e9seau.<\/p>","protected":false},"author":1,"featured_media":1994,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-1961","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Zero Trust? - RSA<\/title>\n<meta name=\"description\" content=\"Zero trust security incorporates a range of security data, threat intelligence and risk-based policies to continually verify the trustworthiness of users and resources on a network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/what-is-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Zero Trust?\" \/>\n<meta property=\"og:description\" content=\"Zero trust security incorporates a range of security data, threat intelligence and risk-based policies to continually verify the trustworthiness of users and resources on a network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/what-is-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-01T19:38:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:34:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"bcomroe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is Zero Trust?\" \/>\n<meta name=\"twitter:description\" content=\"Zero trust security incorporates a range of security data, threat intelligence and risk-based policies to continually verify the trustworthiness of users and resources on a network.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/\"},\"author\":{\"name\":\"bcomroe\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/1f0a34a03983def6bccdbe050b692439\"},\"headline\":\"What is Zero Trust?\",\"datePublished\":\"2021-11-01T19:38:27+00:00\",\"dateModified\":\"2023-11-07T21:34:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/\"},\"wordCount\":4,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/zero-trust-architecture.jpg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/\",\"name\":\"What is Zero Trust? - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/zero-trust-architecture.jpg\",\"datePublished\":\"2021-11-01T19:38:27+00:00\",\"dateModified\":\"2023-11-07T21:34:48+00:00\",\"description\":\"Zero trust security incorporates a range of security data, threat intelligence and risk-based policies to continually verify the trustworthiness of users and resources on a network.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/zero-trust-architecture.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/zero-trust-architecture.jpg\",\"width\":930,\"height\":517},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ja\\\/resources\\\/blog\\\/zero-trust\\\/what-is-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Zero Trust?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/1f0a34a03983def6bccdbe050b692439\",\"name\":\"bcomroe\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Qu'est-ce que la confiance z\u00e9ro ? - RSA","description":"La s\u00e9curit\u00e9 z\u00e9ro confiance int\u00e8gre une s\u00e9rie de donn\u00e9es de s\u00e9curit\u00e9, de renseignements sur les menaces et de politiques bas\u00e9es sur les risques afin de v\u00e9rifier en permanence la fiabilit\u00e9 des utilisateurs et des ressources sur un r\u00e9seau.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/what-is-zero-trust\/","og_locale":"fr_FR","og_type":"article","og_title":"What is Zero Trust?","og_description":"Zero trust security incorporates a range of security data, threat intelligence and risk-based policies to continually verify the trustworthiness of users and resources on a network.","og_url":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/what-is-zero-trust\/","og_site_name":"RSA","article_published_time":"2021-11-01T19:38:27+00:00","article_modified_time":"2023-11-07T21:34:48+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"bcomroe","twitter_card":"summary_large_image","twitter_title":"What is Zero Trust?","twitter_description":"Zero trust security incorporates a range of security data, threat intelligence and risk-based policies to continually verify the trustworthiness of users and resources on a network.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/"},"author":{"name":"bcomroe","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/1f0a34a03983def6bccdbe050b692439"},"headline":"What is Zero Trust?","datePublished":"2021-11-01T19:38:27+00:00","dateModified":"2023-11-07T21:34:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/"},"wordCount":4,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/zero-trust-architecture.jpg","articleSection":["Zero Trust"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/","url":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/","name":"Qu'est-ce que la confiance z\u00e9ro ? - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/zero-trust-architecture.jpg","datePublished":"2021-11-01T19:38:27+00:00","dateModified":"2023-11-07T21:34:48+00:00","description":"La s\u00e9curit\u00e9 z\u00e9ro confiance int\u00e8gre une s\u00e9rie de donn\u00e9es de s\u00e9curit\u00e9, de renseignements sur les menaces et de politiques bas\u00e9es sur les risques afin de v\u00e9rifier en permanence la fiabilit\u00e9 des utilisateurs et des ressources sur un r\u00e9seau.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/zero-trust-architecture.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/zero-trust-architecture.jpg","width":930,"height":517},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/ja\/resources\/blog\/zero-trust\/what-is-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"What is Zero Trust?"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/1f0a34a03983def6bccdbe050b692439","name":"bcomroe"}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/1961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/comments?post=1961"}],"version-history":[{"count":19,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/1961\/revisions"}],"predecessor-version":[{"id":27156,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/1961\/revisions\/27156"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media\/1994"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media?parent=1961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/categories?post=1961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/tags?post=1961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}