{"id":2101,"date":"2021-10-28T16:44:06","date_gmt":"2021-10-28T23:44:06","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2101"},"modified":"2023-11-07T16:37:09","modified_gmt":"2023-11-07T21:37:09","slug":"zero-trust-recommendations","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","title":{"rendered":"Recommandations pour une confiance z\u00e9ro"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Pour la quatri\u00e8me semaine du Mois de la sensibilisation \u00e0 la cybers\u00e9curit\u00e9, nous nous concentrons sur la priorit\u00e9 \u00e0 accorder \u00e0 la cybers\u00e9curit\u00e9 - une pr\u00e9occupation encore plus importante \u00e0 l'\u00e8re des lieux de travail hybrides et de la prolif\u00e9ration des appareils. La confiance z\u00e9ro est une approche pragmatique de l'authentification, de l'autorisation et de la validation de tous les utilisateurs, \u00e0 l'int\u00e9rieur et \u00e0 l'ext\u00e9rieur de votre r\u00e9seau. D\u00e9couvrez comment SecurID renforce votre approche de la cybers\u00e9curit\u00e9 bas\u00e9e sur la confiance z\u00e9ro.<\/p>","protected":false},"author":2,"featured_media":2102,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-2101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Recommendations for Zero Trust - RSA<\/title>\n<meta name=\"description\" content=\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/zero-trust-recommendations\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recommendations for Zero Trust\" \/>\n<meta property=\"og:description\" content=\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/zero-trust-recommendations\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-28T23:44:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T21:37:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Recommendations for Zero Trust\" \/>\n<meta name=\"twitter:description\" content=\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Recommendations for Zero Trust\",\"datePublished\":\"2021-10-28T23:44:06+00:00\",\"dateModified\":\"2023-11-07T21:37:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\"},\"wordCount\":4,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\",\"name\":\"Recommendations for Zero Trust - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"datePublished\":\"2021-10-28T23:44:06+00:00\",\"dateModified\":\"2023-11-07T21:37:09+00:00\",\"description\":\"Learn how SecurID empowers your zero-trust approach to cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/Zero-Trust-Cybersecurity.jpg\",\"width\":950,\"height\":497},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/fr\\\/resources\\\/blog\\\/zero-trust\\\/zero-trust-recommendations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recommendations for Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recommandations pour la confiance z\u00e9ro - RSA","description":"D\u00e9couvrez comment SecurID renforce votre approche de la cybers\u00e9curit\u00e9 fond\u00e9e sur la confiance z\u00e9ro.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","og_locale":"fr_CA","og_type":"article","og_title":"Recommendations for Zero Trust","og_description":"Learn how SecurID empowers your zero-trust approach to cybersecurity.","og_url":"https:\/\/www.rsa.com\/fr_ca\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","og_site_name":"RSA","article_published_time":"2021-10-28T23:44:06+00:00","article_modified_time":"2023-11-07T21:37:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Recommendations for Zero Trust","twitter_description":"Learn how SecurID empowers your zero-trust approach to cybersecurity.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Recommendations for Zero Trust","datePublished":"2021-10-28T23:44:06+00:00","dateModified":"2023-11-07T21:37:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/"},"wordCount":4,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","articleSection":["Zero Trust"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","url":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/","name":"Recommandations pour la confiance z\u00e9ro - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","datePublished":"2021-10-28T23:44:06+00:00","dateModified":"2023-11-07T21:37:09+00:00","description":"D\u00e9couvrez comment SecurID renforce votre approche de la cybers\u00e9curit\u00e9 fond\u00e9e sur la confiance z\u00e9ro.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/Zero-Trust-Cybersecurity.jpg","width":950,"height":497},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/fr\/resources\/blog\/zero-trust\/zero-trust-recommendations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Recommendations for Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"Solutions de cybers\u00e9curit\u00e9 et de gestion des risques num\u00e9riques","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/comments?post=2101"}],"version-history":[{"count":7,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2101\/revisions"}],"predecessor-version":[{"id":27157,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/posts\/2101\/revisions\/27157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media\/2102"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/media?parent=2101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/categories?post=2101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/fr_ca\/wp-json\/wp\/v2\/tags?post=2101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}