{"id":2212,"date":"2021-06-03T12:11:05","date_gmt":"2021-06-03T19:11:05","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2212"},"modified":"2023-11-07T18:24:08","modified_gmt":"2023-11-07T23:24:08","slug":"zero-trust-identity-strategies-prevent-hacks","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/","title":{"rendered":"Comment les strat\u00e9gies d'identit\u00e9 sans confiance peuvent pr\u00e9venir les piratages"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Le monde en ligne repose sur la confiance. Mais les r\u00e9cents piratages, notamment celui de SolarWinds et l'exploit Nobelium de l'Agence am\u00e9ricaine pour le d\u00e9veloppement international, d\u00e9montrent que la confiance peut \u00eatre un handicap majeur. Les strat\u00e9gies d'identit\u00e9 \u00e0 confiance z\u00e9ro peuvent contribuer \u00e0 pr\u00e9venir les piratages et \u00e0 prot\u00e9ger les utilisateurs, les entreprises et les informations sensibles.<\/p>","protected":false},"author":2,"featured_media":2213,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-2212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Zero Trust Identity Strategies Can Prevent Hacks - RSA<\/title>\n<meta name=\"description\" content=\"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Zero Trust Identity Strategies Can Prevent Hacks\" \/>\n<meta property=\"og:description\" content=\"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-03T19:11:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T23:24:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How Zero Trust Identity Strategies Can Prevent Hacks\" \/>\n<meta name=\"twitter:description\" content=\"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"How Zero Trust Identity Strategies Can Prevent Hacks\",\"datePublished\":\"2021-06-03T19:11:05+00:00\",\"dateModified\":\"2023-11-07T23:24:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/\"},\"wordCount\":8,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/\",\"name\":\"How Zero Trust Identity Strategies Can Prevent Hacks - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg\",\"datePublished\":\"2021-06-03T19:11:05+00:00\",\"dateModified\":\"2023-11-07T23:24:08+00:00\",\"description\":\"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg\",\"width\":946,\"height\":526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/ar\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-identity-strategies-prevent-hacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Zero Trust Identity Strategies Can Prevent Hacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment les strat\u00e9gies d'identit\u00e9 sans confiance peuvent pr\u00e9venir les piratages - RSA","description":"Les strat\u00e9gies d'identit\u00e9 sans confiance peuvent contribuer \u00e0 prot\u00e9ger ce qui compte le plus en \u00e9vitant les piratages et en prot\u00e9geant les utilisateurs, les entreprises et les informations sensibles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/","og_locale":"fr_FR","og_type":"article","og_title":"How Zero Trust Identity Strategies Can Prevent Hacks","og_description":"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.","og_url":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/","og_site_name":"RSA","article_published_time":"2021-06-03T19:11:05+00:00","article_modified_time":"2023-11-07T23:24:08+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"How Zero Trust Identity Strategies Can Prevent Hacks","twitter_description":"Zero trust identity strategies can help protect what matters most by helping prevent hacks and protect users, businesses, and sensitive information.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"How Zero Trust Identity Strategies Can Prevent Hacks","datePublished":"2021-06-03T19:11:05+00:00","dateModified":"2023-11-07T23:24:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/"},"wordCount":8,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg","articleSection":["Zero Trust"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/","url":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/","name":"Comment les strat\u00e9gies d'identit\u00e9 sans confiance peuvent pr\u00e9venir les piratages - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg","datePublished":"2021-06-03T19:11:05+00:00","dateModified":"2023-11-07T23:24:08+00:00","description":"Les strat\u00e9gies d'identit\u00e9 sans confiance peuvent contribuer \u00e0 prot\u00e9ger ce qui compte le plus en \u00e9vitant les piratages et en prot\u00e9geant les utilisateurs, les entreprises et les informations sensibles.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/blog-How-Zero-Trust-Identity-Strategies-Prevent-Hacks.jpg","width":946,"height":526},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/ar\/resources\/blog\/zero-trust\/zero-trust-identity-strategies-prevent-hacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"How Zero Trust Identity Strategies Can Prevent Hacks"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/2212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/comments?post=2212"}],"version-history":[{"count":8,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/2212\/revisions"}],"predecessor-version":[{"id":27172,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/posts\/2212\/revisions\/27172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media\/2213"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/media?parent=2212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/categories?post=2212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr\/wp-json\/wp\/v2\/tags?post=2212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}