{"id":11858,"date":"2021-12-21T09:54:00","date_gmt":"2021-12-21T07:54:00","guid":{"rendered":"https:\/\/www.thegreenbow.com\/?post_type=resource&#038;p=11858"},"modified":"2023-06-08T12:19:58","modified_gmt":"2023-06-08T10:19:58","slug":"four-preconceived-ideas-about-zero-trust","status":"publish","type":"resource","link":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/","title":{"rendered":"Four preconceived ideas about zero trust"},"content":{"rendered":"\n<div class=\"wp-block-ch-resource-content alignfull\">\n<p><strong>Author : Nicolas Tondre, <strong>Product Marketing Manager<\/strong><\/strong><\/p>\n\n\n\n<p>Zero trust is a term that Forrester popularized in 2010, and Gartner cemented its use a few years later. It builds on the concept of de\u2011perimiterization, which dates back to the early 2000s. While the term is essentially a buzzword and has disheartened more than one IT Security Officer, zero trust nevertheless covers a set of useful principles and practices.<\/p>\n\n\n\n<p>Overall, the concept is worthy of attention, particularly considering that the National Institute of Standards and Technology (NIST) ended up imposing it on the United States federal government. It can be considered as a set of rules and practices aimed at improving the security of a company&#8217;s or organization&#8217;s information systems (IS). It consists in implementing multiple and complementary security components (MFA, SSO, IAM, VPN, least privilege, network segmentation, SIEM, etc.) to reduce the risk of intrusion and data leakage.<\/p>\n\n\n\n<p>However, it is still enshrouded in a number of persistent misconceptions and hampered by inaccuracies. This article aims to demystify four preconceived ideas about zero trust:<\/p>\n\n\n\n<p>What should we do? As Einstein said \u201cConcern for man and his fate must always form the chief interest of all technical endeavors.\u201d, so, work agile which means that cybersecurity questions should be taken in account from your project day one until the end. Turn cyber-security topics into daily ones, make it the new normal to avoid having people taking it \u201clightly\u201d. It is important for people to understand that cyber-security isn\u2019t an option, when a hospital isn\u2019t working for 3 days (Dax Hospital in France), the consequences of people not getting care or surgery are real.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li>Zero trust replaces the use of corporate VPNs<\/li>\n\n\n\n<li>Zero trust only applies to the cloud<\/li>\n\n\n\n<li>Zero trust frees us from recommended cyber hygiene rules<\/li>\n\n\n\n<li>Corporate VPNs do not offer any zero trust features<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>1. <strong>Zero trust replaces the use of corporate VPNs<\/strong><\/strong><\/h2>\n\n\n\n<p>Some vendors of security solutions pit zero trust against VPNs in their marketing presentations. However, zero trust solutions support end-to-end encryption of communications, guaranteed data integrity, as well as server-side user authentication and vice versa\u2014the exact same services a VPN provides.<\/p>\n\n\n\n<p>It then becomes quite obvious that all zero trust solutions include VPN tunnels, but they do so within an architecture in which VPNs are only one of many security components, with which they integrate natively.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:40% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-1024x683.jpeg\" alt=\"thegreenbow-cas-usage-diffusion-restreinte\" class=\"wp-image-7306 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-1024x683.jpeg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-300x200.jpeg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-768x513.jpeg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-1536x1025.jpeg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-2048x1367.jpeg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-100x67.jpeg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-301x201.jpeg 301w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-343x229.jpeg 343w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-scaled-727x486.jpeg 727w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-scaled-602x402.jpeg 602w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/05\/thegreenbow-cas-usage-diffusion-restreinte-scaled-686x458.jpeg 686w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Sensitive data management for industrial plants<\/figcaption><\/figure><div class=\"wp-block-media-text__content\">\n<p>There are also many situations in which zero trust is not the appropriate solution for the network architecture that has been implemented. <\/p>\n\n\n\n<p>For example, when it comes to controlling a nuclear power plant, no solution is more comprehensive and simple than using a VPN access from a secure workstation that is restricted to a limited number of people.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>Likewise, accessing sensitive data or <a href=\"https:\/\/www.thegreenbow.com\/en\/vpn-use-cases\/restricted-circulation\/\" target=\"_blank\" rel=\"noreferrer noopener\">restricted data from critical market operators<\/a> and government bodies warrants the use of a VPN on a dedicated workstation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>2. Zero trust only applies to the cloud<\/strong><\/strong><\/h2>\n\n\n\n<p>The preconceived notion that zero trust only applies to the cloud is equally hard to budge.<\/p>\n\n\n\n<p>When accessing cloud services, such as Microsoft 365, Google Workspace, or Salesforce, it is the browser that provides authentication, encryption, and data integrity through TLS tunnels. In this context, the software provider &nbsp;or operator of the cloud service becomes responsible for securing communications. This also means that the software provider or cloud service operator has control over your data, which raises concerns with regard to independence, trust, and sovereignty\u2014but that is another debate. Software vendors and cloud service operators often provide mechanisms to delegate authentication (SSOs), so as to reduce the number of accounts and passwords they need to manage.<\/p>\n\n\n\n<p>However, it is with on-premises networks that zero trust makes the most sense, as it aims to give employees access to no more information than they are entitled to in the local information system, a public cloud, or a private cloud, regardless of whether they access it from a remote location or on premises.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. Zero trust frees us from recommended cyber hygiene rules<\/strong><\/h2>\n\n\n\n<p>Zero trust is in fact a set of cyber hygiene and common sense rules that everyone should follow to ensure network and data security.<\/p>\n\n\n\n<p>These rules can, for example, be found on <a href=\"https:\/\/www.ssi.gouv.fr\/guide\/guide-dhygiene-informatique\/\" target=\"_blank\" rel=\"noreferrer noopener\">the ANSSI\u2019s website<\/a> (in French). Among other things, they consist in the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Granting users no more privileges than they require, centralizing their identification as well as the management of their rights<\/li>\n\n\n\n<li>Regularly updating the operating system and software to avoid leaving known security vulnerabilities unpatched<\/li>\n\n\n\n<li>Implementing a workstation compliance check, e.g. using the mechanisms built into Microsoft Windows GPO<\/li>\n\n\n\n<li>Limiting access to the IS to the sole workstations that the IT Security Department manages and blocking any internet connection from these workstations established outside a VPN tunnel<\/li>\n\n\n\n<li>Using robust data encryption protocols, i.e. IPsec and IKEv2<\/li>\n\n\n\n<li>Using strong authentication based on certificates, where possible with smart cards or security tokens<\/li>\n\n\n\n<li>Blocking split tunneling to prevent data from leaking outside the IS<\/li>\n\n\n\n<li>Using software and network devices that have received recognized security certifications<\/li>\n\n\n\n<li>etc.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>4. Corporate VPNs do not offer any zero trust features<\/strong><\/strong><\/h2>\n\n\n\n<p>Vendors of enterprise VPNs did not wait for the concept become a buzzword before they started integrating features to support the implementation of zero trust concepts.<\/p>\n\n\n\n<p>For instance, administrator logs in TheGreenBow VPN Clients keep track of all security-related events, so that SIEM tools can process them to detect any inconsistencies that may reflect an intrusion attempt.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 46%\"><div class=\"wp-block-media-text__content\">\n<p>Support for USB security tokens and smart cards enable our Windows and Linux VPN Clients to implement multi-factor authentication (physical object + PIN code).<\/p>\n\n\n\n<p>Administrators can easily block split tunneling to prevent data from leaking outside the secure tunnel.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"592\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-1024x592.jpeg\" alt=\"\" class=\"wp-image-11863 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-1024x592.jpeg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-300x174.jpeg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-768x444.jpeg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-1536x889.jpeg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite-100x58.jpeg 100w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/12\/Zero-Trust_lite.jpeg 1903w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>The \u201cGINA mode\u201d allows users to automatically open a secure connection even before they open their Windows session.<\/p>\n\n\n\n<p>The filtering mode in <a href=\"https:\/\/www.thegreenbow.com\/en\/products\/endpoint-secure-connection\/\" target=\"_blank\" rel=\"noreferrer noopener\">version 6.8 of the Windows Enterprise VPN Client<\/a> can be configured to block unauthorized ports and protocols, sealing the workstation against intrusions from outside the trusted network.<\/p>\n\n\n\n<p>TheGreenBow VPN Clients implement the IKEv2 protocol and the most robust encryption algorithms recommended by global cybersecurity agencies, such as ANSSI. Version 6.52 for Windows and version 1.5 for Linux both have achieved EAL3+ certification and obtained security visas from the ANSSI.<\/p>\n\n\n\n<p>At TheGreenBow, our credo is to design software that is both robust and easy to use, as the more a system is easy to implement, the less vulnerable it becomes.<\/p>\n\n\n\n<p>Download a free trial of our VPN Clients to <a href=\"https:\/\/www.thegreenbow.com\/en\/products\/thegreenbow-vpn-clients-download\/\">put all the features described above to the test free of charge for 30 days<\/a>. Feel free to contact us should you need help with implementing your zero trust concept.<\/p>\n<\/div>\n","protected":false},"featured_media":11793,"template":"","meta":{"_acf_changed":false,"resource_type":"internal"},"resource_category":[30,342],"class_list":["post-11858","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_category-blog","resource_category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Four preconceived ideas about zero trust - TheGreenBow<\/title>\n<meta name=\"description\" content=\"Some vendors of security solutions pit zero trust against VPNs. Get to know the four preconceived ideas about Zero Trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Four preconceived ideas about zero trust - TheGreenBow\" \/>\n<meta property=\"og:description\" content=\"Some vendors of security solutions pit zero trust against VPNs. Get to know the four preconceived ideas about Zero Trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"TheGreenBow\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-08T10:19:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/11\/security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@thegreenbow\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/four-preconceived-ideas-about-zero-trust\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/four-preconceived-ideas-about-zero-trust\\\/\",\"name\":\"Four preconceived ideas about zero trust - TheGreenBow\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/four-preconceived-ideas-about-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/four-preconceived-ideas-about-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/security.jpg\",\"datePublished\":\"2021-12-21T07:54:00+00:00\",\"dateModified\":\"2023-06-08T10:19:58+00:00\",\"description\":\"Some vendors of security solutions pit zero trust against VPNs. Get to know the four preconceived ideas about Zero Trust.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/four-preconceived-ideas-about-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/four-preconceived-ideas-about-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/four-preconceived-ideas-about-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/security.jpg\",\"width\":960,\"height\":600,\"caption\":\"Cybers\u00e9curit\u00e9\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/four-preconceived-ideas-about-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/resources\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Four preconceived ideas about zero trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"name\":\"TheGreenBow\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\",\"name\":\"TheGreenBow\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"width\":422,\"height\":84,\"caption\":\"TheGreenBow\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thegreenbow\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/thegreenbow\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCZKtI7_fmgFcmovgGSy8AnQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Four preconceived ideas about zero trust - TheGreenBow","description":"Some vendors of security solutions pit zero trust against VPNs. Get to know the four preconceived ideas about Zero Trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Four preconceived ideas about zero trust - TheGreenBow","og_description":"Some vendors of security solutions pit zero trust against VPNs. Get to know the four preconceived ideas about Zero Trust.","og_url":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/","og_site_name":"TheGreenBow","article_modified_time":"2023-06-08T10:19:58+00:00","og_image":[{"width":960,"height":600,"url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/11\/security.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@thegreenbow","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/","url":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/","name":"Four preconceived ideas about zero trust - TheGreenBow","isPartOf":{"@id":"https:\/\/www.thegreenbow.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/11\/security.jpg","datePublished":"2021-12-21T07:54:00+00:00","dateModified":"2023-06-08T10:19:58+00:00","description":"Some vendors of security solutions pit zero trust against VPNs. Get to know the four preconceived ideas about Zero Trust.","breadcrumb":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/#primaryimage","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/11\/security.jpg","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/11\/security.jpg","width":960,"height":600,"caption":"Cybers\u00e9curit\u00e9"},{"@type":"BreadcrumbList","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/four-preconceived-ideas-about-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thegreenbow.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.thegreenbow.com\/en\/resources\/blog-en\/"},{"@type":"ListItem","position":3,"name":"Four preconceived ideas about zero trust"}]},{"@type":"WebSite","@id":"https:\/\/www.thegreenbow.com\/en\/#website","url":"https:\/\/www.thegreenbow.com\/en\/","name":"TheGreenBow","description":"","publisher":{"@id":"https:\/\/www.thegreenbow.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thegreenbow.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.thegreenbow.com\/en\/#organization","name":"TheGreenBow","url":"https:\/\/www.thegreenbow.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","width":422,"height":84,"caption":"TheGreenBow"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/thegreenbow","https:\/\/fr.linkedin.com\/company\/thegreenbow","https:\/\/www.youtube.com\/channel\/UCZKtI7_fmgFcmovgGSy8AnQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource\/11858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media\/11793"}],"wp:attachment":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media?parent=11858"}],"wp:term":[{"taxonomy":"resource_category","embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource_category?post=11858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}